华硕网络产品技术交流平台

 找回密码
 立即注册

QQ登录

只需一步,快速开始

手机号码,快捷登录

查看: 14049|回复: 27

[求助] RT-AC1900P又断网了。。。

[复制链接]

11

主题

176

回帖

1092

积分

金牌会员

Rank: 6Rank: 6

积分
1092
发表于 2018-5-18 05:50:43 | 显示全部楼层 |阅读模式
应该是凌晨的事,具体时间不清楚了,早上起来看UT,全是红种,再一看是网断了。

特意看了下手机,也没有WiFi了,确认是路由器断网了,而不是电脑的事。

重启路由器之后一切正常,然后进路由器保存了记录。

专家能不能看出问题,把RT-AC1900P的断网毛病揪出来。

我也不确定哪段有用,就全部保存粘贴过来了。
  1. Feb 14 00:00:16 syslogd started: BusyBox v1.17.4
  2. Feb 14 00:00:16 kernel: klogd started: BusyBox v1.17.4 (2018-03-26 10:27:41 CST)
  3. Feb 14 00:00:16 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Mon Mar 26 10:32:21 CST 2018
  4. Feb 14 00:00:16 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
  5. Feb 14 00:00:16 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
  6. Feb 14 00:00:16 kernel: Machine: Northstar Prototype
  7. Feb 14 00:00:16 kernel: Ignoring unrecognised tag 0x00000000
  8. Feb 14 00:00:16 kernel: Memory policy: ECC disabled, Data cache writealloc
  9. Feb 14 00:00:16 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 60416
  10. Feb 14 00:00:16 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
  11. Feb 14 00:00:16 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
  12. Feb 14 00:00:16 kernel: Virtual kernel memory layout:
  13. Feb 14 00:00:16 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
  14. Feb 14 00:00:16 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
  15. Feb 14 00:00:16 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
  16. Feb 14 00:00:16 kernel:     vmalloc : 0xd0800000 - 0xf0000000   ( 504 MB)
  17. Feb 14 00:00:16 kernel:     lowmem  : 0xc0000000 - 0xd0000000   ( 256 MB)
  18. Feb 14 00:00:16 kernel:     modules : 0xbf000000 - 0xc0000000   (  16 MB)
  19. Feb 14 00:00:16 kernel:       .init : 0xc0008000 - 0xc003d000   ( 212 kB)
  20. Feb 14 00:00:17 kernel:       .text : 0xc003d000 - 0xc03a6000   (3492 kB)
  21. Feb 14 00:00:17 kernel:       .data : 0xc03be000 - 0xc03e1160   ( 141 kB)
  22. Feb 14 00:00:17 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
  23. Feb 14 00:00:17 kernel: Mount-cache hash table entries: 512
  24. Feb 14 00:00:17 kernel: CPU1: Booted secondary processor
  25. Feb 14 00:00:17 kernel: Found a AMD NAND flash:
  26. Feb 14 00:00:17 kernel: Total size:  128MB
  27. Feb 14 00:00:17 kernel: Block size:  128KB
  28. Feb 14 00:00:17 kernel: Page Size:   2048B
  29. Feb 14 00:00:17 kernel: OOB Size:    64B
  30. Feb 14 00:00:17 kernel: Sector size: 512B
  31. Feb 14 00:00:17 kernel: Spare size:  16B
  32. Feb 14 00:00:17 kernel: ECC level:   8 (8-bit)
  33. Feb 14 00:00:17 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
  34. Feb 14 00:00:17 kernel: bio: create slab <bio-0> at 0
  35. Feb 14 00:00:17 kernel: PCI: no core
  36. Feb 14 00:00:17 kernel: PCI: no core
  37. Feb 14 00:00:17 kernel: PCI: Fixing up bus 0
  38. Feb 14 00:00:17 kernel: PCI: Fixing up bus 0
  39. Feb 14 00:00:17 kernel: PCI: Fixing up bus 1
  40. Feb 14 00:00:17 kernel: PCI: Fixing up bus 0
  41. Feb 14 00:00:17 kernel: PCI: Fixing up bus 2
  42. Feb 14 00:00:17 kernel: VFS: Disk quotas dquot_6.5.2
  43. Feb 14 00:00:17 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
  44. Feb 14 00:00:17 kernel: pflash: found no supported devices
  45. Feb 14 00:00:17 kernel: bcmsflash: found no supported devices
  46. Feb 14 00:00:17 kernel: Boot partition size = 524288(0x80000)
  47. Feb 14 00:00:17 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
  48. Feb 14 00:00:17 kernel: nflash: squash filesystem with lzma found at block 28
  49. Feb 14 00:00:17 kernel: Creating 4 MTD partitions on "nflash":
  50. Feb 14 00:00:17 kernel: 0x000000000000-0x000000080000 : "boot"
  51. Feb 14 00:00:18 kernel: 0x000000080000-0x000000200000 : "nvram"
  52. Feb 14 00:00:18 kernel: 0x000000200000-0x000004000000 : "linux"
  53. Feb 14 00:00:18 kernel: 0x00000039b230-0x000004000000 : "rootfs"
  54. Feb 14 00:00:18 kernel: Registering the dns_resolver key type
  55. Feb 14 00:00:18 nat: apply redirect rules
  56. Feb 14 00:00:18 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
  57. Feb 14 00:00:18 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
  58. Feb 14 00:00:18 kernel: Available 7 bytes at (off,len):
  59. Feb 14 00:00:18 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
  60. Feb 14 00:00:18 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
  61. Feb 14 00:00:18 kernel: Creating 2 MTD partitions on "brcmnand":
  62. Feb 14 00:00:18 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
  63. Feb 14 00:00:18 kernel: 0x000007ec0000-0x000008000000 : "asus"
  64. Feb 14 00:00:18 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
  65. Feb 14 00:00:18 kernel: ctf: module license 'Proprietary' taints kernel.
  66. Feb 14 00:00:18 kernel: Disabling lock debugging due to kernel taint
  67. Feb 14 00:00:18 kernel: et_module_init: passivemode set to 0x0
  68. Feb 14 00:00:18 kernel: et_module_init: txworkq set to 0x0
  69. Feb 14 00:00:18 kernel: et_module_init: et_txq_thresh set to 0xce4
  70. Feb 14 00:00:18 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
  71. Feb 14 00:00:18 kernel: et_probe: mvlan vid[0]: 0
  72. Feb 14 00:00:18 kernel: et_probe: mvlan vid[1]: 0
  73. Feb 14 00:00:18 kernel: et_probe: mvlan en 0
  74. Feb 14 00:00:18 kernel: dpsta_init: msglevel set to 0x1
  75. Feb 14 00:00:18 kernel: wl_module_init: passivemode set to 0x0
  76. Feb 14 00:00:18 kernel: wl_module_init: igs set to 0x0
  77. Feb 14 00:00:18 kernel: wl_module_init: txworkq set to 0x0
  78. Feb 14 00:00:18 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  79. Feb 14 00:00:18 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  80. Feb 14 00:00:18 kernel: et0: et_mvlan_netdev_event: event 16 for vlan1 mvlan_en 0
  81. Feb 14 00:00:18 kernel: et0: et_mvlan_netdev_event: event 5 for vlan1 mvlan_en 0
  82. Feb 14 00:00:18 kernel: et0: et_mvlan_netdev_event: event 16 for vlan2 mvlan_en 0
  83. Feb 14 00:00:18 kernel: et0: et_mvlan_netdev_event: event 5 for vlan2 mvlan_en 0
  84. Feb 14 00:00:18 kernel: et0: et_mvlan_netdev_event: event 13 for vlan1 mvlan_en 0
  85. Feb 14 00:00:18 kernel: et0: et_mvlan_netdev_event: event 1 for vlan1 mvlan_en 0
  86. Feb 14 00:00:18 dnsmasq[239]: warning: no upstream servers configured
  87. Feb 14 00:00:18 RT-AC1900P: start httpd:80
  88. Feb 14 00:00:19 syslog: Generating SSL certificate...
  89. Feb 14 00:00:19 NAT Tunnel: AAE Service is stopped
  90. Feb 14 00:00:19 AAE: AAE Service is started
  91. Feb 14 00:00:19 disk monitor: be idle
  92. Feb 14 00:00:19 jffs2: valid logs(1)
  93. Feb 14 00:00:19 hour monitor: daemon is starting
  94. Feb 14 00:00:19 hour monitor: daemon terminates
  95. Feb 14 00:00:19 miniupnpd[310]: version 1.9 started
  96. Feb 14 00:00:19 miniupnpd[310]: HTTP listening on port 60167
  97. Feb 14 00:00:19 miniupnpd[310]: Listening for NAT-PMP/PCP traffic on port 5351
  98. Feb 14 00:00:19 Mastiff: init
  99. Feb 14 00:00:19 lldpd[320]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
  100. Feb 14 00:00:19 lldpd[320]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
  101. Feb 14 00:00:22 kernel: wl_module_init: passivemode set to 0x0
  102. Feb 14 00:00:22 kernel: wl_module_init: igs set to 0x0
  103. Feb 14 00:00:22 kernel: wl_module_init: txworkq set to 0x0
  104. Feb 14 00:00:22 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  105. Feb 14 00:00:22 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  106. Feb 14 00:00:23 WAN Connection: ISP's DHCP did not function properly.
  107. Feb 14 00:00:28 wan: [deconfig] udhcpc done[286]
  108. Feb 14 00:00:31 syslog: module ledtrig-usbdev not found in modules.dep
  109. Feb 14 00:00:31 syslog: module leds-usb not found in modules.dep
  110. Feb 14 00:00:31 kernel: SCSI subsystem initialized
  111. Feb 14 00:00:33 rc_service: httpd 247:notify_rc start_autodet
  112. Feb 14 00:00:34 roamast: eth1: add client [b0:f8:93:1d:f3:f9] to monitor list
  113. Feb 14 00:01:16 rc_service: httpd 247:notify_rc reboot
  114. Feb 14 00:01:17 kernel: Attempt to kill tasklet from interrupt
  115. Feb 14 00:01:17 kernel: et0: et_mvlan_netdev_event: event 9 for vlan1 mvlan_en 0
  116. Feb 14 00:01:17 kernel: et0: et_mvlan_netdev_event: event 2 for vlan1 mvlan_en 0
  117. Feb 14 00:01:17 kernel: et0: et_mvlan_netdev_event: event 13 for vlan1 mvlan_en 0
  118. Feb 14 00:01:17 kernel: et0: et_mvlan_netdev_event: event 1 for vlan1 mvlan_en 0
  119. Feb 14 00:01:17 kernel: et0: et_mvlan_netdev_event: event 13 for vlan2 mvlan_en 0
  120. Feb 14 00:01:17 kernel: et0: et_mvlan_netdev_event: event 1 for vlan2 mvlan_en 0
  121. Feb 14 00:01:17 kernel: et0: et_mvlan_netdev_event: event 4 for vlan1 mvlan_en 0
  122. Feb 14 00:01:17 iTunes: daemon is stoped
  123. Feb 14 00:01:17 FTP Server: daemon is stoped
  124. Feb 14 00:01:17 Samba Server: smb daemon is stoped
  125. Feb 14 00:01:17 kernel: gro disabled
  126. Feb 14 00:01:17 Timemachine: daemon is stoped
  127. Feb 14 00:01:18 WEBDAV Server: daemon is stoped
  128. Feb 14 08:00:10 syslogd started: BusyBox v1.17.4
  129. Feb 14 08:00:10 kernel: klogd started: BusyBox v1.17.4 (2018-03-26 10:27:41 CST)
  130. Feb 14 08:00:10 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Mon Mar 26 10:32:21 CST 2018
  131. Feb 14 08:00:10 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
  132. Feb 14 08:00:10 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
  133. Feb 14 08:00:10 kernel: Machine: Northstar Prototype
  134. Feb 14 08:00:10 kernel: Ignoring unrecognised tag 0x00000000
  135. Feb 14 08:00:10 kernel: Memory policy: ECC disabled, Data cache writealloc
  136. Feb 14 08:00:10 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 60416
  137. Feb 14 08:00:10 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
  138. Feb 14 08:00:10 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
  139. Feb 14 08:00:10 kernel: Virtual kernel memory layout:
  140. Feb 14 08:00:10 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
  141. Feb 14 08:00:10 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
  142. Feb 14 08:00:10 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
  143. Feb 14 08:00:10 kernel:     vmalloc : 0xd0800000 - 0xf0000000   ( 504 MB)
  144. Feb 14 08:00:10 kernel:     lowmem  : 0xc0000000 - 0xd0000000   ( 256 MB)
  145. Feb 14 08:00:10 kernel:     modules : 0xbf000000 - 0xc0000000   (  16 MB)
  146. Feb 14 08:00:10 kernel:       .init : 0xc0008000 - 0xc003d000   ( 212 kB)
  147. Feb 14 08:00:10 kernel:       .text : 0xc003d000 - 0xc03a6000   (3492 kB)
  148. Feb 14 08:00:10 kernel:       .data : 0xc03be000 - 0xc03e1160   ( 141 kB)
  149. Feb 14 08:00:10 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
  150. Feb 14 08:00:10 kernel: Mount-cache hash table entries: 512
  151. Feb 14 08:00:10 kernel: CPU1: Booted secondary processor
  152. Feb 14 08:00:10 kernel: Found a AMD NAND flash:
  153. Feb 14 08:00:10 kernel: Total size:  128MB
  154. Feb 14 08:00:10 kernel: Block size:  128KB
  155. Feb 14 08:00:10 kernel: Page Size:   2048B
  156. Feb 14 08:00:10 kernel: OOB Size:    64B
  157. Feb 14 08:00:10 kernel: Sector size: 512B
  158. Feb 14 08:00:10 kernel: Spare size:  16B
  159. Feb 14 08:00:10 kernel: ECC level:   8 (8-bit)
  160. Feb 14 08:00:10 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
  161. Feb 14 08:00:10 kernel: bio: create slab <bio-0> at 0
  162. Feb 14 08:00:11 kernel: PCI: no core
  163. Feb 14 08:00:11 kernel: PCI: no core
  164. Feb 14 08:00:11 kernel: PCI: Fixing up bus 0
  165. Feb 14 08:00:11 kernel: PCI: Fixing up bus 0
  166. Feb 14 08:00:11 kernel: PCI: Fixing up bus 1
  167. Feb 14 08:00:11 kernel: PCI: Fixing up bus 0
  168. Feb 14 08:00:11 nat: apply redirect rules
  169. Feb 14 08:00:11 kernel: PCI: Fixing up bus 2
  170. Feb 14 08:00:11 kernel: VFS: Disk quotas dquot_6.5.2
  171. Feb 14 08:00:11 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
  172. Feb 14 08:00:11 kernel: pflash: found no supported devices
  173. Feb 14 08:00:11 kernel: bcmsflash: found no supported devices
  174. Feb 14 08:00:11 kernel: Boot partition size = 524288(0x80000)
  175. Feb 14 08:00:11 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
  176. Feb 14 08:00:11 kernel: nflash: squash filesystem with lzma found at block 28
  177. Feb 14 08:00:11 kernel: Creating 4 MTD partitions on "nflash":
  178. Feb 14 08:00:11 kernel: 0x000000000000-0x000000080000 : "boot"
  179. Feb 14 08:00:11 kernel: 0x000000080000-0x000000200000 : "nvram"
  180. Feb 14 08:00:11 kernel: 0x000000200000-0x000004000000 : "linux"
  181. Feb 14 08:00:11 kernel: 0x00000039b230-0x000004000000 : "rootfs"
  182. Feb 14 08:00:11 kernel: Registering the dns_resolver key type
  183. Feb 14 08:00:11 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
  184. Feb 14 08:00:11 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
  185. Feb 14 08:00:11 kernel: Available 7 bytes at (off,len):
  186. Feb 14 08:00:11 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
  187. Feb 14 08:00:11 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
  188. Feb 14 08:00:11 kernel: Creating 2 MTD partitions on "brcmnand":
  189. Feb 14 08:00:11 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
  190. Feb 14 08:00:11 kernel: 0x000007ec0000-0x000008000000 : "asus"
  191. Feb 14 08:00:11 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
  192. Feb 14 08:00:11 kernel: ctf: module license 'Proprietary' taints kernel.
  193. Feb 14 08:00:11 kernel: Disabling lock debugging due to kernel taint
  194. Feb 14 08:00:11 kernel: et_module_init: passivemode set to 0x0
  195. Feb 14 08:00:11 kernel: et_module_init: txworkq set to 0x0
  196. Feb 14 08:00:11 kernel: et_module_init: et_txq_thresh set to 0xce4
  197. Feb 14 08:00:11 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
  198. Feb 14 08:00:11 kernel: et_probe: mvlan vid[0]: 0
  199. Feb 14 08:00:11 kernel: et_probe: mvlan vid[1]: 0
  200. Feb 14 08:00:11 kernel: et_probe: mvlan en 0
  201. Feb 14 08:00:11 kernel: dpsta_init: msglevel set to 0x1
  202. Feb 14 08:00:11 kernel: wl_module_init: passivemode set to 0x0
  203. Feb 14 08:00:12 kernel: wl_module_init: igs set to 0x0
  204. Feb 14 08:00:12 kernel: wl_module_init: txworkq set to 0x0
  205. Feb 14 08:00:12 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  206. Feb 14 08:00:12 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  207. Feb 14 08:00:12 kernel: et0: et_mvlan_netdev_event: event 16 for vlan1 mvlan_en 0
  208. Feb 14 08:00:12 kernel: et0: et_mvlan_netdev_event: event 5 for vlan1 mvlan_en 0
  209. Feb 14 08:00:12 kernel: et0: et_mvlan_netdev_event: event 16 for vlan2 mvlan_en 0
  210. Feb 14 08:00:12 kernel: et0: et_mvlan_netdev_event: event 5 for vlan2 mvlan_en 0
  211. Feb 14 08:00:12 kernel: et0: et_mvlan_netdev_event: event 13 for vlan1 mvlan_en 0
  212. Feb 14 08:00:12 kernel: et0: et_mvlan_netdev_event: event 1 for vlan1 mvlan_en 0
  213. Feb 14 08:00:16 WAN Connection: Fail to connect with some issues.
  214. Feb 14 08:00:17 dnsmasq[266]: warning: no upstream servers configured
  215. Feb 14 08:00:17 RT-AC1900P: start httpd:80
  216. Feb 14 08:00:17 NAT Tunnel: AAE Service is stopped
  217. Feb 14 08:00:17 AAE: AAE Service is started
  218. Feb 14 08:00:17 disk monitor: be idle
  219. Feb 14 08:00:17 syslog: Generating SSL certificate...
  220. Feb 14 08:00:17 hour monitor: daemon is starting
  221. Feb 14 08:00:17 hour monitor: daemon terminates
  222. Feb 14 08:00:17 jffs2: valid logs(1)
  223. Feb 14 08:00:17 Mastiff: init
  224. Feb 14 08:00:18 lldpd[338]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
  225. Feb 14 08:00:18 lldpd[338]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
  226. Feb 14 08:00:19 wan: [deconfig] udhcpc done[286]
  227. Feb 14 08:00:19 pppd[366]: pppd 2.4.7 started by i5151, uid 0
  228. Feb 14 08:00:19 pppd[366]: Connected to a4:dc:be:fa:3e:d1 via interface eth0
  229. Feb 14 08:00:19 pppd[366]: Connect: ppp0 <--> eth0
  230. Feb 14 08:00:22 syslog: module ledtrig-usbdev not found in modules.dep
  231. Feb 14 08:00:22 syslog: module leds-usb not found in modules.dep
  232. Feb 14 08:00:22 kernel: SCSI subsystem initialized
  233. Feb 14 08:00:24 pppd[366]: PAP authentication succeeded
  234. Feb 14 08:00:24 pppd[366]: peer from calling number A4:DC:BE:FA:3E:D1 authorized
  235. Feb 14 08:00:25 roamast: eth1: add client [bc:1c:81:31:0b:51] to monitor list
  236. Feb 14 08:00:25 roamast: eth1: add client [b0:f8:93:1d:f3:f9] to monitor list
  237. Feb 14 08:00:25 pppd[366]: local  IP address 123.117.232.133
  238. Feb 14 08:00:25 pppd[366]: remote IP address 123.117.232.1
  239. Feb 14 08:00:25 pppd[366]: primary   DNS address 202.106.195.68
  240. Feb 14 08:00:25 pppd[366]: secondary DNS address 202.106.46.151
  241. Feb 14 08:00:25 rc_service: ip-up 449:notify_rc start_firewall
  242. Feb 14 08:00:26 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  243. Feb 14 08:00:26 wan: finish adding multi routes
  244. Feb 14 08:00:26 rc_service: ip-up 449:notify_rc stop_upnp
  245. Feb 14 08:00:26 rc_service: waitting "start_firewall" via ip-up ...
  246. Feb 14 08:00:26 WAN Connection: WAN was restored.
  247. Feb 14 08:00:26 ntp: start NTP update
  248. Feb 14 08:00:27 kernel: nf_conntrack_rtsp v0.6.21 loading
  249. Feb 14 08:00:27 kernel: nf_nat_rtsp v0.6.21 loading
  250. Apr  7 15:09:41 rc_service: ntp 470:notify_rc restart_upnp
  251. Apr  7 15:09:41 rc_service: ntp 470:notify_rc restart_diskmon
  252. Apr  7 15:09:41 disk_monitor: Finish
  253. Apr  7 15:09:42 disk monitor: be idle
  254. Apr  7 15:09:42 rc_service: ip-up 449:notify_rc start_upnp
  255. Apr  7 15:09:42 rc_service: waitting "stop_upnp" via ip-up ...
  256. Apr  7 15:09:57 rc_service: zcip 526:notify_rc start_firewall
  257. Apr  7 15:09:57 zcip client: configured 169.254.238.90
  258. Apr  7 15:09:57 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  259. Apr  7 15:09:58 kernel: SHN Release Version: 2.0.1 3529123_patch
  260. Apr  7 15:09:58 kernel: UDB Core Version: 0.2.14 r3529123
  261. Apr  7 15:09:58 kernel: sizeof forward pkt param = 192
  262. Apr  7 15:10:02 rc_service: ip-up 449:notify_rc start_firewall
  263. Apr  7 15:10:03 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  264. Apr  7 15:10:15 crond[273]: time disparity of 600909 minutes detected
  265. Apr  7 15:11:09 rc_service: rc 1001:notify_rc restart_wrs
  266. Apr  7 15:18:44 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  267. Apr  7 15:21:29 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  268. Apr  7 15:41:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  269. Apr  7 15:59:34 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  270. Apr  7 16:14:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  271. Apr  7 16:32:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  272. Apr  7 16:38:09 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  273. Apr  7 16:50:04 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  274. Apr  7 18:50:54 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  275. Apr  7 23:09:42 disk_monitor: Got SIGALRM...
  276. Apr  8 03:09:38 ntp: start NTP update
  277. Apr  8 07:04:37 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  278. Apr  8 15:09:34 ntp: start NTP update
  279. Apr  8 18:48:12 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  280. Apr  9 03:09:34 ntp: start NTP update
  281. Apr  9 09:27:15 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  282. Apr  9 12:41:40 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  283. Apr  9 15:09:29 ntp: start NTP update
  284. Apr  9 17:08:45 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  285. Apr  9 20:28:45 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  286. Apr  9 20:30:05 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  287. Apr 10 03:09:29 ntp: start NTP update
  288. Apr 10 07:58:32 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  289. Apr 10 08:57:34 Mastiff: Got AAE_SIG_EULA_FLAG_SIGNED
  290. Apr 10 08:57:34 Mastiff: Got AAE_SIG_REMOTE_CONNECTION_TURNED_ON
  291. Apr 10 08:58:16 rc_service: httpd 274:notify_rc restart_httpd
  292. Apr 10 08:58:16 watchdog: restart httpd
  293. Apr 10 08:58:16 rc_service: watchdog 278:notify_rc stop_httpd
  294. Apr 10 08:58:16 rc_service: waitting "restart_httpd" via  ...
  295. Apr 10 08:58:16 RT-AC1900P: start https:8443
  296. Apr 10 08:58:16 RT-AC1900P: start httpd:80
  297. Apr 10 08:58:17 rc_service: watchdog 278:notify_rc start_httpd
  298. Apr 10 08:58:17 RT-AC1900P: start https:8443
  299. Apr 10 08:58:17 RT-AC1900P: start httpd:80
  300. Apr 10 09:05:07 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  301. Apr 10 12:18:37 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  302. Apr 10 13:39:47 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  303. Apr 10 15:09:24 ntp: start NTP update
  304. Apr 10 15:35:12 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  305. Apr 10 17:27:07 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  306. Apr 10 18:51:22 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  307. Apr 10 23:42:27 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  308. Apr 10 23:54:12 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  309. Apr 11 00:09:02 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  310. Apr 11 00:09:57 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  311. Apr 11 03:09:24 ntp: start NTP update
  312. Apr 11 07:16:32 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  313. Apr 11 07:45:57 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  314. Apr 11 09:09:27 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  315. Apr 11 13:12:22 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  316. Apr 11 15:09:24 ntp: start NTP update
  317. Apr 11 17:20:17 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  318. Apr 11 17:20:27 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  319. Apr 11 17:21:47 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  320. Apr 11 18:52:02 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  321. Apr 11 19:10:32 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  322. Apr 11 19:33:17 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  323. Apr 11 20:02:47 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  324. Apr 12 03:09:24 ntp: start NTP update
  325. Apr 12 07:49:06 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  326. Apr 12 11:46:11 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  327. Apr 12 13:43:56 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  328. Apr 12 15:09:15 ntp: start NTP update
  329. Apr 13 03:09:11 ntp: start NTP update
  330. Apr 13 09:31:43 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  331. Apr 13 10:03:01 WAN Connection: Fail to connect with some issues.
  332. Apr 13 10:03:02 nat: apply redirect rules
  333. Apr 13 10:03:03 pppd[366]: Connection terminated.
  334. Apr 13 10:03:03 pppd[366]: Modem hangup
  335. Apr 13 10:03:13 pppd[366]: Connected to a4:dc:be:fa:3e:d1 via interface eth0
  336. Apr 13 10:03:13 pppd[366]: Connect: ppp0 <--> eth0
  337. Apr 13 10:03:18 pppd[366]: PAP authentication succeeded
  338. Apr 13 10:03:18 pppd[366]: peer from calling number A4:DC:BE:FA:3E:D1 authorized
  339. Apr 13 10:03:18 pppd[366]: local  IP address 123.117.239.147
  340. Apr 13 10:03:18 pppd[366]: remote IP address 123.117.232.1
  341. Apr 13 10:03:18 pppd[366]: primary   DNS address 202.106.195.68
  342. Apr 13 10:03:18 pppd[366]: secondary DNS address 202.106.46.151
  343. Apr 13 10:03:18 rc_service: ip-up 27150:notify_rc start_firewall
  344. Apr 13 10:03:19 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  345. Apr 13 10:03:19 wan: finish adding multi routes
  346. Apr 13 10:03:19 rc_service: ip-up 27150:notify_rc stop_upnp
  347. Apr 13 10:03:19 rc_service: waitting "start_firewall" via ip-up ...
  348. Apr 13 10:03:19 ntp: start NTP update
  349. Apr 13 10:03:20 rc_service: ip-up 27150:notify_rc start_upnp
  350. Apr 13 10:03:20 rc_service: waitting "stop_upnp" via ip-up ...
  351. Apr 13 10:03:21 WAN Connection: WAN was restored.
  352. Apr 13 10:03:39 rc_service: ip-up 27150:notify_rc start_firewall
  353. Apr 13 10:03:40 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  354. Apr 13 14:01:33 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  355. Apr 13 14:51:43 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  356. Apr 13 18:32:08 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  357. Apr 13 18:41:08 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  358. Apr 13 22:03:19 ntp: start NTP update
  359. Apr 14 02:01:20 rc_service: rc 22647:notify_rc restart_wrs
  360. Apr 14 08:07:36 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  361. Apr 14 09:37:01 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  362. Apr 14 09:55:21 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  363. Apr 14 10:03:14 ntp: start NTP update
  364. Apr 14 10:22:21 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  365. Apr 14 12:41:06 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  366. Apr 14 18:54:21 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  367. Apr 14 22:03:14 ntp: start NTP update
  368. Apr 15 07:58:08 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  369. Apr 15 10:03:09 ntp: start NTP update
  370. Apr 15 12:53:03 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  371. Apr 15 14:36:08 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  372. Apr 15 19:06:08 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  373. Apr 15 22:03:09 ntp: start NTP update
  374. Apr 16 00:19:33 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  375. Apr 16 01:41:03 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  376. Apr 16 07:19:08 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  377. Apr 16 08:58:48 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  378. Apr 16 10:03:09 ntp: start NTP update
  379. Apr 16 12:35:28 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  380. Apr 16 13:57:13 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  381. Apr 16 17:24:58 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  382. Apr 16 19:15:08 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  383. Apr 16 20:01:03 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  384. Apr 16 20:44:58 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  385. Apr 16 22:03:09 ntp: start NTP update
  386. Apr 16 23:33:13 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  387. Apr 17 09:03:33 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  388. Apr 17 10:03:01 ntp: start NTP update
  389. Apr 17 14:45:18 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  390. Apr 17 17:53:13 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  391. Apr 17 22:03:01 ntp: start NTP update
  392. Apr 18 10:03:01 ntp: start NTP update
  393. Apr 18 10:12:08 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  394. Apr 18 13:45:43 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  395. Apr 18 16:07:18 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  396. Apr 18 18:54:33 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  397. Apr 18 19:42:08 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  398. Apr 18 19:55:33 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  399. Apr 18 22:02:54 ntp: start NTP update
  400. Apr 18 22:07:38 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  401. Apr 19 04:56:39 WAN Connection: Fail to connect with some issues.
  402. Apr 19 04:56:40 nat: apply redirect rules
  403. Apr 19 04:56:42 pppd[366]: Connection terminated.
  404. Apr 19 04:56:42 pppd[366]: Modem hangup
  405. Apr 19 04:56:52 pppd[366]: Connected to a4:dc:be:fa:3e:d1 via interface eth0
  406. Apr 19 04:56:52 pppd[366]: Connect: ppp0 <--> eth0
  407. Apr 19 04:56:57 pppd[366]: PAP authentication succeeded
  408. Apr 19 04:56:57 pppd[366]: peer from calling number A4:DC:BE:FA:3E:D1 authorized
  409. Apr 19 04:56:57 pppd[366]: local  IP address 123.117.232.158
  410. Apr 19 04:56:57 pppd[366]: remote IP address 123.117.232.1
  411. Apr 19 04:56:57 pppd[366]: primary   DNS address 202.106.195.68
  412. Apr 19 04:56:57 pppd[366]: secondary DNS address 202.106.46.151
  413. Apr 19 04:56:57 rc_service: ip-up 25049:notify_rc start_firewall
  414. Apr 19 04:56:58 wan: finish adding multi routes
  415. Apr 19 04:56:58 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  416. Apr 19 04:56:58 rc_service: ip-up 25049:notify_rc stop_upnp
  417. Apr 19 04:56:58 rc_service: waitting "start_firewall" via ip-up ...
  418. Apr 19 04:56:58 ntp: start NTP update
  419. Apr 19 04:56:59 rc_service: ip-up 25049:notify_rc start_upnp
  420. Apr 19 04:56:59 rc_service: waitting "stop_upnp" via ip-up ...
  421. Apr 19 04:57:00 WAN Connection: WAN was restored.
  422. Apr 19 04:57:23 rc_service: ip-up 25049:notify_rc start_firewall
  423. Apr 19 04:57:23 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  424. Apr 19 08:02:48 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  425. Apr 19 13:45:58 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  426. Apr 19 16:07:53 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  427. Apr 19 16:56:58 ntp: start NTP update
  428. Apr 19 19:04:30 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  429. Apr 20 00:37:55 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  430. Apr 20 04:56:52 ntp: start NTP update
  431. Apr 20 10:05:48 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  432. Apr 20 11:41:48 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  433. Apr 20 12:34:48 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  434. Apr 20 14:15:13 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  435. Apr 20 16:56:48 ntp: start NTP update
  436. Apr 20 19:14:07 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  437. Apr 20 21:39:47 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  438. Apr 21 02:05:07 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  439. Apr 21 04:56:44 ntp: start NTP update
  440. Apr 21 10:12:12 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  441. Apr 21 10:29:42 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  442. Apr 21 12:51:27 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  443. Apr 21 13:08:47 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  444. Apr 21 13:19:17 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  445. Apr 21 13:27:02 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  446. Apr 21 13:43:47 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  447. Apr 21 13:52:47 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  448. Apr 21 14:08:57 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  449. Apr 21 14:27:07 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  450. Apr 21 14:45:42 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  451. Apr 21 15:08:32 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  452. Apr 21 15:25:37 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  453. Apr 21 16:07:47 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  454. Apr 21 16:15:47 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  455. Apr 21 16:56:44 ntp: start NTP update
  456. Apr 21 19:26:49 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  457. Apr 22 04:56:39 ntp: start NTP update
  458. Apr 22 10:37:29 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  459. Apr 22 12:02:39 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  460. Apr 22 13:56:54 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  461. Apr 22 16:56:39 ntp: start NTP update
  462. Apr 22 19:07:06 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  463. Apr 23 04:56:33 ntp: start NTP update
  464. Apr 23 08:37:25 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  465. Apr 23 14:02:20 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  466. Apr 23 16:56:29 ntp: start NTP update
  467. Apr 23 18:53:19 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  468. Apr 23 20:37:49 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  469. Apr 23 21:27:24 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  470. Apr 24 04:56:25 ntp: start NTP update
  471. Apr 24 09:38:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  472. Apr 24 10:25:44 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  473. Apr 24 13:51:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  474. Apr 24 16:56:25 ntp: start NTP update
  475. Apr 24 19:54:26 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  476. Apr 24 23:50:19 pppd[366]: Connection terminated.
  477. Apr 24 23:50:19 pppd[366]: Modem hangup
  478. Apr 24 23:50:20 WAN Connection: Fail to connect with some issues.
  479. Apr 24 23:50:21 nat: apply redirect rules
  480. Apr 24 23:50:29 pppd[366]: Connected to a4:dc:be:fa:3e:d1 via interface eth0
  481. Apr 24 23:50:29 pppd[366]: Connect: ppp0 <--> eth0
  482. Apr 24 23:50:34 pppd[366]: PAP authentication succeeded
  483. Apr 24 23:50:34 pppd[366]: peer from calling number A4:DC:BE:FA:3E:D1 authorized
  484. Apr 24 23:50:34 pppd[366]: local  IP address 123.117.234.76
  485. Apr 24 23:50:34 pppd[366]: remote IP address 123.117.232.1
  486. Apr 24 23:50:34 pppd[366]: primary   DNS address 202.106.195.68
  487. Apr 24 23:50:34 pppd[366]: secondary DNS address 202.106.46.151
  488. Apr 24 23:50:34 rc_service: ip-up 14711:notify_rc start_firewall
  489. Apr 24 23:50:35 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  490. Apr 24 23:50:35 wan: finish adding multi routes
  491. Apr 24 23:50:35 rc_service: ip-up 14711:notify_rc stop_upnp
  492. Apr 24 23:50:35 rc_service: waitting "start_firewall" via ip-up ...
  493. Apr 24 23:50:35 ntp: start NTP update
  494. Apr 24 23:50:35 WAN Connection: WAN was restored.
  495. Apr 24 23:50:36 rc_service: ip-up 14711:notify_rc start_upnp
  496. Apr 24 23:50:36 rc_service: waitting "stop_upnp" via ip-up ...
  497. Apr 24 23:50:57 rc_service: ip-up 14711:notify_rc start_firewall
  498. Apr 24 23:50:57 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  499. Apr 25 07:39:36 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  500. Apr 25 11:50:35 ntp: start NTP update
  501. Apr 25 15:50:21 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  502. Apr 25 18:45:41 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  503. Apr 25 19:14:06 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  504. Apr 25 23:50:35 ntp: start NTP update
  505. Apr 26 06:19:17 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  506. Apr 26 11:50:29 ntp: start NTP update
  507. Apr 26 12:50:48 syslogd started: BusyBox v1.17.4
  508. Apr 26 12:50:48 kernel: klogd started: BusyBox v1.17.4 (2018-03-26 10:27:41 CST)
  509. Apr 26 12:50:48 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  510. Apr 26 12:50:49 RT-AC1900P: start https:8443
  511. Apr 26 12:50:49 RT-AC1900P: start httpd:80
  512. Apr 26 12:50:49 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
  513. Apr 26 12:50:50 hour monitor: daemon is starting
  514. Apr 26 12:50:50 hour monitor: daemon terminates
  515. Apr 26 12:50:50 ddns update: ez-ipupdate: starting...
  516. Apr 26 12:50:50 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
  517. Apr 26 12:50:50 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 26 Apr 2018 04:50:50 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
  518. Apr 26 12:50:50 ddns update: retval= 0, ddns_return_code (,200)
  519. Apr 26 12:50:50 ddns update: asusddns_update: 0
  520. Apr 26 12:50:51 ddns: ddns update ok
  521. Apr 26 12:50:54 watchdog: start ddns.
  522. Apr 26 12:50:54 rc_service: watchdog 278:notify_rc restart_ddns
  523. Apr 26 12:50:54 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
  524. Apr 26 12:50:55 ddns update: ez-ipupdate: starting...
  525. Apr 26 12:50:55 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
  526. Apr 26 12:50:55 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 26 Apr 2018 04:50:55 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
  527. Apr 26 12:50:55 ddns update: retval= 0, ddns_return_code (,200)
  528. Apr 26 12:50:55 ddns update: asusddns_update: 0
  529. Apr 26 12:50:56 ddns: ddns update ok
  530. Apr 26 13:56:26 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  531. Apr 26 19:24:16 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  532. Apr 27 00:50:47 ntp: start NTP update
  533. Apr 27 07:36:09 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  534. Apr 27 08:40:54 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  535. Apr 27 08:48:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  536. Apr 27 08:49:54 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  537. Apr 27 08:50:49 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  538. Apr 27 12:10:44 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  539. Apr 27 12:50:43 ntp: start NTP update
  540. Apr 27 13:53:59 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  541. Apr 27 20:07:49 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  542. Apr 27 20:35:39 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  543. Apr 28 00:50:43 ntp: start NTP update
  544. Apr 28 00:55:46 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  545. Apr 28 02:38:21 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  546. Apr 28 07:17:41 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  547. Apr 28 08:05:16 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  548. Apr 28 10:51:26 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  549. Apr 28 12:05:21 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  550. Apr 28 12:25:36 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  551. Apr 28 12:50:38 ntp: start NTP update
  552. Apr 28 14:48:10 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  553. Apr 28 15:06:35 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  554. Apr 28 15:22:55 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  555. Apr 28 16:22:55 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  556. Apr 28 18:55:30 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  557. Apr 29 00:50:34 ntp: start NTP update
  558. Apr 29 08:39:29 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  559. Apr 29 12:50:30 ntp: start NTP update
  560. Apr 29 13:41:44 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  561. Apr 29 14:01:24 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  562. Apr 29 15:16:29 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  563. Apr 29 19:25:44 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  564. Apr 30 00:50:30 ntp: start NTP update
  565. Apr 30 01:32:31 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  566. Apr 30 02:05:59 rc_service: rc 7784:notify_rc restart_wrs
  567. Apr 30 08:06:46 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  568. Apr 30 09:12:11 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  569. Apr 30 12:50:24 ntp: start NTP update
  570. Apr 30 14:04:56 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  571. Apr 30 14:13:16 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  572. Apr 30 18:43:56 WAN Connection: Fail to connect with some issues.
  573. Apr 30 18:43:57 nat: apply redirect rules
  574. Apr 30 18:43:59 pppd[366]: Connection terminated.
  575. Apr 30 18:43:59 pppd[366]: Modem hangup
  576. Apr 30 18:44:09 pppd[366]: Connected to a4:dc:be:fa:3e:d1 via interface eth0
  577. Apr 30 18:44:09 pppd[366]: Connect: ppp0 <--> eth0
  578. Apr 30 18:44:14 pppd[366]: PAP authentication succeeded
  579. Apr 30 18:44:14 pppd[366]: peer from calling number A4:DC:BE:FA:3E:D1 authorized
  580. Apr 30 18:44:14 pppd[366]: local  IP address 123.117.232.166
  581. Apr 30 18:44:14 pppd[366]: remote IP address 123.117.232.1
  582. Apr 30 18:44:14 pppd[366]: primary   DNS address 202.106.195.68
  583. Apr 30 18:44:14 pppd[366]: secondary DNS address 202.106.46.151
  584. Apr 30 18:44:14 rc_service: ip-up 1585:notify_rc start_firewall
  585. Apr 30 18:44:15 wan: finish adding multi routes
  586. Apr 30 18:44:15 rc_service: ip-up 1585:notify_rc stop_upnp
  587. Apr 30 18:44:15 rc_service: waitting "start_firewall" via ip-up ...
  588. Apr 30 18:44:15 ntp: start NTP update
  589. Apr 30 18:44:15 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  590. Apr 30 18:44:14 rc_service: ip-up 1585:notify_rc start_upnp
  591. Apr 30 18:44:14 rc_service: waitting "stop_upnp" via ip-up ...
  592. Apr 30 18:44:15 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
  593. Apr 30 18:44:15 WAN Connection: WAN was restored.
  594. Apr 30 18:44:15 ddns update: ez-ipupdate: starting...
  595. Apr 30 18:44:15 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
  596. Apr 30 18:44:15 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Mon, 30 Apr 2018 10:44:15 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
  597. Apr 30 18:44:15 ddns update: retval= 0, ddns_return_code (,200)
  598. Apr 30 18:44:15 ddns update: asusddns_update: 0
  599. Apr 30 18:44:16 ddns: ddns update ok
  600. Apr 30 18:44:33 rc_service: ip-up 1585:notify_rc start_firewall
  601. Apr 30 18:44:34 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  602. Apr 30 19:45:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  603. Apr 30 19:45:14 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  604. May  1 06:44:10 ntp: start NTP update
  605. May  1 07:59:19 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  606. May  1 11:51:29 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  607. May  1 12:31:34 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  608. May  1 13:51:29 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  609. May  1 15:36:09 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  610. May  1 16:40:09 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  611. May  1 18:44:10 ntp: start NTP update
  612. May  1 18:46:19 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  613. May  1 18:49:24 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  614. May  1 19:34:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  615. May  1 19:35:49 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  616. May  1 20:29:24 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  617. May  1 20:34:34 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  618. May  1 23:45:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  619. May  2 02:02:49 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  620. May  2 02:20:39 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  621. May  2 06:44:10 ntp: start NTP update
  622. May  2 08:56:39 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  623. May  2 10:16:29 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  624. May  2 12:17:19 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  625. May  2 13:25:39 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  626. May  2 14:23:19 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  627. May  2 16:22:34 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  628. May  2 16:32:54 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  629. May  2 18:44:10 ntp: start NTP update
  630. May  2 18:59:28 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  631. May  2 19:50:48 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  632. May  2 21:04:28 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  633. May  3 06:44:02 ntp: start NTP update
  634. May  3 08:29:13 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  635. May  3 10:21:38 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  636. May  3 10:34:48 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  637. May  3 10:40:03 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  638. May  3 11:17:08 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  639. May  3 11:44:23 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  640. May  3 11:49:08 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  641. May  3 11:54:58 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  642. May  3 12:17:43 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  643. May  3 13:15:23 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  644. May  3 13:20:38 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  645. May  3 13:24:28 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  646. May  3 13:36:38 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  647. May  3 14:00:08 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  648. May  3 14:26:33 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  649. May  3 14:38:48 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  650. May  3 14:56:53 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  651. May  3 15:54:28 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  652. May  3 16:16:43 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  653. May  3 16:32:13 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  654. May  3 16:36:33 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  655. May  3 16:39:43 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  656. May  3 17:02:58 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  657. May  3 17:07:58 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  658. May  3 18:44:02 ntp: start NTP update
  659. May  3 18:55:20 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  660. May  3 21:41:35 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  661. May  3 22:00:55 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  662. May  3 23:48:05 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  663. May  4 00:12:05 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  664. May  4 00:22:40 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  665. May  4 00:39:45 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  666. May  4 00:59:35 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  667. May  4 06:43:56 ntp: start NTP update
  668. May  4 07:20:05 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  669. May  4 07:37:00 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  670. May  4 12:24:45 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  671. May  4 15:04:35 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  672. May  4 18:43:56 ntp: start NTP update
  673. May  4 19:18:10 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  674. May  4 19:19:20 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  675. May  4 22:20:05 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  676. May  4 22:36:50 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  677. May  5 01:21:25 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  678. May  5 01:24:00 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  679. May  5 06:43:56 ntp: start NTP update
  680. May  5 10:54:45 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  681. May  5 12:26:35 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  682. May  5 12:31:05 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  683. May  5 12:34:25 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  684. May  5 13:06:00 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  685. May  5 13:23:05 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  686. May  5 13:26:45 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  687. May  5 13:42:40 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  688. May  5 13:59:45 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  689. May  5 14:03:10 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  690. May  5 14:29:50 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  691. May  5 15:45:45 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  692. May  5 16:47:55 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  693. May  5 18:43:56 ntp: start NTP update
  694. May  5 18:50:50 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  695. May  5 19:36:50 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  696. May  5 22:41:50 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  697. May  5 23:35:05 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  698. May  5 23:41:35 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  699. May  5 23:56:30 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  700. May  6 00:12:50 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  701. May  6 00:28:10 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  702. May  6 01:50:35 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  703. May  6 06:04:10 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  704. May  6 06:43:57 ntp: start NTP update
  705. May  6 10:23:05 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  706. May  6 13:21:35 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  707. May  6 13:37:41 WAN Connection: Fail to connect with some issues.
  708. May  6 13:37:42 nat: apply redirect rules
  709. May  6 13:37:43 pppd[366]: Connection terminated.
  710. May  6 13:37:43 pppd[366]: Modem hangup
  711. May  6 13:37:53 pppd[366]: Connected to a4:dc:be:fa:3e:d1 via interface eth0
  712. May  6 13:37:53 pppd[366]: Connect: ppp0 <--> eth0
  713. May  6 13:37:58 pppd[366]: PAP authentication succeeded
  714. May  6 13:37:58 pppd[366]: peer from calling number A4:DC:BE:FA:3E:D1 authorized
  715. May  6 13:37:58 pppd[366]: local  IP address 123.117.235.92
  716. May  6 13:37:58 pppd[366]: remote IP address 123.117.232.1
  717. May  6 13:37:58 pppd[366]: primary   DNS address 202.106.195.68
  718. May  6 13:37:58 pppd[366]: secondary DNS address 202.106.46.151
  719. May  6 13:37:58 rc_service: ip-up 18290:notify_rc start_firewall
  720. May  6 13:37:59 wan: finish adding multi routes
  721. May  6 13:37:59 ntp: start NTP update
  722. May  6 13:37:59 rc_service: ip-up 18290:notify_rc stop_upnp
  723. May  6 13:37:59 rc_service: waitting "start_firewall" via ip-up ...
  724. May  6 13:37:59 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  725. May  6 13:38:00 rc_service: ip-up 18290:notify_rc start_upnp
  726. May  6 13:38:00 rc_service: waitting "stop_upnp" via ip-up ...
  727. May  6 13:38:01 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
  728. May  6 13:38:01 ddns update: ez-ipupdate: starting...
  729. May  6 13:38:01 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
  730. May  6 13:38:01 WAN Connection: WAN was restored.
  731. May  6 13:38:01 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sun, 06 May 2018 05:37:53 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
  732. May  6 13:38:01 ddns update: retval= 0, ddns_return_code (,200)
  733. May  6 13:38:01 ddns update: asusddns_update: 0
  734. May  6 13:38:02 ddns: ddns update ok
  735. May  6 13:38:19 rc_service: ip-up 18290:notify_rc start_firewall
  736. May  6 13:38:20 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  737. May  6 13:41:40 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  738. May  6 20:18:30 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  739. May  6 20:22:20 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  740. May  7 00:33:45 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  741. May  7 01:37:59 ntp: start NTP update
  742. May  7 06:13:21 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  743. May  7 07:08:57 syslogd started: BusyBox v1.17.4
  744. May  7 07:08:57 kernel: klogd started: BusyBox v1.17.4 (2018-03-26 10:27:41 CST)
  745. May  7 07:08:58 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  746. May  7 07:08:59 hour monitor: daemon is starting
  747. May  7 07:08:59 hour monitor: daemon terminates
  748. May  7 13:09:11 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  749. May  7 15:12:16 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  750. May  7 18:59:46 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  751. May  7 19:08:57 ntp: start NTP update
  752. May  7 19:41:51 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  753. May  7 19:46:11 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  754. May  8 01:53:56 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  755. May  8 07:08:57 ntp: start NTP update
  756. May  8 09:10:52 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  757. May  8 11:35:57 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  758. May  8 11:52:57 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  759. May  8 15:34:12 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  760. May  8 18:55:42 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  761. May  8 19:08:51 ntp: start NTP update
  762. May  9 01:57:41 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  763. May  9 07:08:47 ntp: start NTP update
  764. May  9 07:42:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  765. May  9 12:51:09 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  766. May  9 18:56:29 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  767. May  9 19:08:43 ntp: start NTP update
  768. May  9 20:08:39 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  769. May 10 01:16:39 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  770. May 10 07:08:43 ntp: start NTP update
  771. May 10 07:52:17 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  772. May 10 08:06:17 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  773. May 10 12:50:27 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  774. May 10 12:56:47 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  775. May 10 14:32:12 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  776. May 10 18:53:02 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  777. May 10 19:08:38 ntp: start NTP update
  778. May 10 20:24:12 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  779. May 10 21:29:22 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  780. May 11 00:10:02 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  781. May 11 01:31:22 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  782. May 11 06:00:42 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  783. May 11 07:08:38 ntp: start NTP update
  784. May 11 10:13:09 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  785. May 11 12:54:29 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  786. May 11 18:51:09 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  787. May 11 19:08:32 ntp: start NTP update
  788. May 11 19:42:29 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  789. May 11 22:18:44 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  790. May 11 23:29:54 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  791. May 11 23:48:29 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  792. May 12 02:11:08 rc_service: rc 27341:notify_rc restart_wrs
  793. May 12 05:26:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  794. May 12 06:04:39 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  795. May 12 07:08:32 ntp: start NTP update
  796. May 12 07:22:04 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  797. May 12 07:39:24 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  798. May 12 07:52:24 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  799. May 12 08:01:54 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  800. May 12 08:31:16 pppd[366]: Connection terminated.
  801. May 12 08:31:17 pppd[366]: Modem hangup
  802. May 12 08:31:18 WAN Connection: Fail to connect with some issues.
  803. May 12 08:31:19 nat: apply redirect rules
  804. May 12 08:31:27 pppd[366]: Connected to a4:dc:be:fa:3e:d1 via interface eth0
  805. May 12 08:31:27 pppd[366]: Connect: ppp0 <--> eth0
  806. May 12 08:31:32 pppd[366]: PAP authentication succeeded
  807. May 12 08:31:32 pppd[366]: peer from calling number A4:DC:BE:FA:3E:D1 authorized
  808. May 12 08:31:32 pppd[366]: local  IP address 123.117.239.228
  809. May 12 08:31:32 pppd[366]: remote IP address 123.117.232.1
  810. May 12 08:31:32 pppd[366]: primary   DNS address 202.106.195.68
  811. May 12 08:31:32 pppd[366]: secondary DNS address 202.106.46.151
  812. May 12 08:31:32 rc_service: ip-up 4996:notify_rc start_firewall
  813. May 12 08:31:33 wan: finish adding multi routes
  814. May 12 08:31:33 ntp: start NTP update
  815. May 12 08:31:33 rc_service: ip-up 4996:notify_rc stop_upnp
  816. May 12 08:31:33 rc_service: waitting "start_firewall" via ip-up ...
  817. May 12 08:31:33 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  818. May 12 08:31:33 wan: finish adding multi routes
  819. May 12 08:31:33 nat: apply redirect rules
  820. May 12 08:31:34 rc_service: ip-up 4996:notify_rc start_upnp
  821. May 12 08:31:34 rc_service: waitting "stop_upnp" via ip-up ...
  822. May 12 08:31:35 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
  823. May 12 08:31:35 ddns update: ez-ipupdate: starting...
  824. May 12 08:31:35 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
  825. May 12 08:31:35 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Sat, 12 May 2018 00:31:32 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
  826. May 12 08:31:35 ddns update: retval= 0, ddns_return_code (,200)
  827. May 12 08:31:35 ddns update: asusddns_update: 0
  828. May 12 08:31:36 ddns: ddns update ok
  829. May 12 08:31:38 WAN Connection: WAN was restored.
  830. May 12 08:31:38 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  831. May 12 08:31:39 ntp: start NTP update
  832. May 12 08:31:50 rc_service: ip-up 4996:notify_rc start_firewall
  833. May 12 08:31:51 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  834. May 12 08:48:36 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  835. May 12 09:12:36 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  836. May 12 09:29:46 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  837. May 12 09:42:41 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  838. May 12 09:51:56 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  839. May 12 10:09:11 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  840. May 12 10:21:46 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  841. May 12 11:13:01 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  842. May 12 11:27:11 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  843. May 12 12:40:11 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  844. May 12 14:38:46 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  845. May 12 18:59:46 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  846. May 12 20:31:33 ntp: start NTP update
  847. May 12 23:06:56 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  848. May 13 08:31:33 ntp: start NTP update
  849. May 13 10:20:21 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  850. May 13 14:20:01 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  851. May 13 15:46:26 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  852. May 13 18:52:31 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  853. May 13 20:24:16 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  854. May 13 20:31:33 ntp: start NTP update
  855. May 13 21:06:11 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  856. May 13 22:53:46 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  857. May 13 23:03:16 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  858. May 14 01:05:01 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  859. May 14 01:25:11 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  860. May 14 01:33:31 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  861. May 14 01:39:31 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  862. May 14 08:31:33 ntp: start NTP update
  863. May 14 08:44:30 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  864. May 14 14:18:20 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  865. May 14 18:49:55 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  866. May 14 18:56:00 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  867. May 14 20:31:25 ntp: start NTP update
  868. May 15 06:37:09 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  869. May 15 08:31:21 ntp: start NTP update
  870. May 15 10:42:09 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  871. May 15 12:25:59 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  872. May 15 13:45:44 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  873. May 15 17:21:39 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  874. May 15 18:55:54 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  875. May 15 20:31:21 ntp: start NTP update
  876. May 15 22:47:44 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  877. May 16 04:39:04 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  878. May 16 07:02:44 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  879. May 16 08:14:44 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  880. May 16 08:31:21 ntp: start NTP update
  881. May 16 12:22:24 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  882. May 16 13:18:04 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  883. May 16 17:31:34 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  884. May 16 17:41:34 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  885. May 16 19:34:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  886. May 16 19:46:39 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  887. May 16 20:31:21 ntp: start NTP update
  888. May 16 23:58:14 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  889. May 17 08:31:21 ntp: start NTP update
  890. May 17 08:53:11 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  891. May 17 09:36:41 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  892. May 17 11:00:46 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  893. May 17 13:00:46 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  894. May 17 15:16:41 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  895. May 17 17:40:11 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  896. May 17 18:52:51 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list
  897. May 17 20:31:11 ntp: start NTP update
  898. May 18 03:24:53 pppd[366]: Connection terminated.
  899. May 18 03:24:53 pppd[366]: Modem hangup
  900. May 18 03:24:54 WAN Connection: Fail to connect with some issues.
  901. May 18 03:24:54 nat: apply redirect rules
  902. May 18 03:25:03 pppd[366]: Connected to a4:dc:be:fa:3e:d1 via interface eth0
  903. May 18 03:25:03 pppd[366]: Connect: ppp0 <--> eth0
  904. May 18 03:25:09 pppd[366]: PAP authentication succeeded
  905. May 18 03:25:09 pppd[366]: peer from calling number A4:DC:BE:FA:3E:D1 authorized
  906. May 18 03:25:09 pppd[366]: local  IP address 123.117.235.207
  907. May 18 03:25:09 pppd[366]: remote IP address 123.117.232.1
  908. May 18 03:25:09 pppd[366]: primary   DNS address 202.106.195.68
  909. May 18 03:25:09 pppd[366]: secondary DNS address 202.106.46.151
  910. May 18 03:25:09 rc_service: ip-up 23510:notify_rc start_firewall
  911. May 18 03:25:09 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  912. Feb 14 08:00:11 syslogd started: BusyBox v1.17.4
  913. Feb 14 08:00:11 kernel: klogd started: BusyBox v1.17.4 (2018-03-26 10:27:41 CST)
  914. Feb 14 08:00:11 kernel: Linux version 2.6.36.4brcmarm (root@asus) (gcc version 4.5.3 (Buildroot 2012.02) ) #1 SMP PREEMPT Mon Mar 26 10:32:21 CST 2018
  915. Feb 14 08:00:11 kernel: CPU: ARMv7 Processor [413fc090] revision 0 (ARMv7), cr=10c53c7f
  916. Feb 14 08:00:11 kernel: CPU: VIPT nonaliasing data cache, VIPT nonaliasing instruction cache
  917. Feb 14 08:00:11 kernel: Machine: Northstar Prototype
  918. Feb 14 08:00:11 kernel: Ignoring unrecognised tag 0x00000000
  919. Feb 14 08:00:11 kernel: Memory policy: ECC disabled, Data cache writealloc
  920. Feb 14 08:00:11 kernel: Built 1 zonelists in Zone order, mobility grouping on.  Total pages: 60416
  921. Feb 14 08:00:11 kernel: Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit earlyprintk debug
  922. Feb 14 08:00:11 kernel: Memory: 255504k/255504k available, 6640k reserved, 0K highmem
  923. Feb 14 08:00:11 kernel: Virtual kernel memory layout:
  924. Feb 14 08:00:11 kernel:     vector  : 0xffff0000 - 0xffff1000   (   4 kB)
  925. Feb 14 08:00:11 kernel:     fixmap  : 0xfff00000 - 0xfffe0000   ( 896 kB)
  926. Feb 14 08:00:11 kernel:     DMA     : 0xf7e00000 - 0xffe00000   ( 128 MB)
  927. Feb 14 08:00:11 kernel:     vmalloc : 0xd0800000 - 0xf0000000   ( 504 MB)
  928. Feb 14 08:00:11 kernel:     lowmem  : 0xc0000000 - 0xd0000000   ( 256 MB)
  929. Feb 14 08:00:11 kernel:     modules : 0xbf000000 - 0xc0000000   (  16 MB)
  930. Feb 14 08:00:11 kernel:       .init : 0xc0008000 - 0xc003d000   ( 212 kB)
  931. Feb 14 08:00:11 kernel:       .text : 0xc003d000 - 0xc03a6000   (3492 kB)
  932. Feb 14 08:00:11 kernel:       .data : 0xc03be000 - 0xc03e1160   ( 141 kB)
  933. Feb 14 08:00:11 kernel: * Invalid signature of oopsbuf: 44-1B-68-9A-41-5A-84-A0 (len 2557606032)
  934. Feb 14 08:00:11 kernel: External imprecise Data abort at addr=0x0, fsr=0x1c06 ignored.
  935. Feb 14 08:00:11 kernel: Mount-cache hash table entries: 512
  936. Feb 14 08:00:11 kernel: CPU1: Booted secondary processor
  937. Feb 14 08:00:11 kernel: Found a AMD NAND flash:
  938. Feb 14 08:00:11 kernel: Total size:  128MB
  939. Feb 14 08:00:11 kernel: Block size:  128KB
  940. Feb 14 08:00:11 kernel: Page Size:   2048B
  941. Feb 14 08:00:11 kernel: OOB Size:    64B
  942. Feb 14 08:00:11 kernel: Sector size: 512B
  943. Feb 14 08:00:11 kernel: Spare size:  16B
  944. Feb 14 08:00:11 kernel: ECC level:   8 (8-bit)
  945. Feb 14 08:00:11 kernel: Device ID: 0x 1 0xf1 0x80 0x1d 0x 1 0xf1
  946. Feb 14 08:00:11 kernel: bio: create slab <bio-0> at 0
  947. Feb 14 08:00:11 kernel: PCI: no core
  948. Feb 14 08:00:11 kernel: PCI: no core
  949. Feb 14 08:00:11 kernel: PCI: Fixing up bus 0
  950. Feb 14 08:00:11 kernel: PCI: Fixing up bus 0
  951. Feb 14 08:00:12 kernel: PCI: Fixing up bus 1
  952. Feb 14 08:00:12 kernel: PCI: Fixing up bus 0
  953. Feb 14 08:00:12 kernel: PCI: Fixing up bus 2
  954. Feb 14 08:00:12 kernel: VFS: Disk quotas dquot_6.5.2
  955. Feb 14 08:00:12 kernel: Dquot-cache hash table entries: 1024 (order 0, 4096 bytes)
  956. Feb 14 08:00:12 kernel: pflash: found no supported devices
  957. Feb 14 08:00:12 kernel: bcmsflash: found no supported devices
  958. Feb 14 08:00:12 kernel: Boot partition size = 524288(0x80000)
  959. Feb 14 08:00:12 kernel: lookup_nflash_rootfs_offset: offset = 0x200000
  960. Feb 14 08:00:12 kernel: nflash: squash filesystem with lzma found at block 28
  961. Feb 14 08:00:12 kernel: Creating 4 MTD partitions on "nflash":
  962. Feb 14 08:00:12 kernel: 0x000000000000-0x000000080000 : "boot"
  963. Feb 14 08:00:12 kernel: 0x000000080000-0x000000200000 : "nvram"
  964. Feb 14 08:00:12 kernel: 0x000000200000-0x000004000000 : "linux"
  965. Feb 14 08:00:12 kernel: 0x00000039b230-0x000004000000 : "rootfs"
  966. Feb 14 08:00:12 kernel: Registering the dns_resolver key type
  967. Feb 14 08:00:12 kernel: Spare area=64 eccbytes 56, ecc bytes located at:
  968. Feb 14 08:00:12 kernel:  2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63
  969. Feb 14 08:00:12 kernel: Available 7 bytes at (off,len):
  970. Feb 14 08:00:12 kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0)
  971. Feb 14 08:00:12 kernel: Options: NO_AUTOINCR,NO_READRDY,BBT_SCAN2NDPAGE,
  972. Feb 14 08:00:12 kernel: Creating 2 MTD partitions on "brcmnand":
  973. Feb 14 08:00:12 kernel: 0x000004000000-0x000007ec0000 : "brcmnand"
  974. Feb 14 08:00:12 kernel: 0x000007ec0000-0x000008000000 : "asus"
  975. Feb 14 08:00:12 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
  976. Feb 14 08:00:12 kernel: ctf: module license 'Proprietary' taints kernel.
  977. Feb 14 08:00:12 kernel: Disabling lock debugging due to kernel taint
  978. Feb 14 08:00:12 kernel: et_module_init: passivemode set to 0x0
  979. Feb 14 08:00:12 kernel: et_module_init: txworkq set to 0x0
  980. Feb 14 08:00:12 kernel: et_module_init: et_txq_thresh set to 0xce4
  981. Feb 14 08:00:12 kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 6.37.14.126 (r561982)
  982. Feb 14 08:00:12 kernel: et_probe: mvlan vid[0]: 0
  983. Feb 14 08:00:12 kernel: et_probe: mvlan vid[1]: 0
  984. Feb 14 08:00:12 kernel: et_probe: mvlan en 0
  985. Feb 14 08:00:12 kernel: dpsta_init: msglevel set to 0x1
  986. Feb 14 08:00:12 nat: apply redirect rules
  987. Feb 14 08:00:12 kernel: wl_module_init: passivemode set to 0x0
  988. Feb 14 08:00:12 kernel: wl_module_init: igs set to 0x0
  989. Feb 14 08:00:12 kernel: wl_module_init: txworkq set to 0x0
  990. Feb 14 08:00:12 kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  991. Feb 14 08:00:12 kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 6.37.14.126 (r561982)
  992. Feb 14 08:00:12 kernel: et0: et_mvlan_netdev_event: event 16 for vlan1 mvlan_en 0
  993. Feb 14 08:00:12 kernel: et0: et_mvlan_netdev_event: event 5 for vlan1 mvlan_en 0
  994. Feb 14 08:00:12 kernel: et0: et_mvlan_netdev_event: event 16 for vlan2 mvlan_en 0
  995. Feb 14 08:00:12 kernel: et0: et_mvlan_netdev_event: event 5 for vlan2 mvlan_en 0
  996. Feb 14 08:00:12 kernel: et0: et_mvlan_netdev_event: event 13 for vlan1 mvlan_en 0
  997. Feb 14 08:00:12 kernel: et0: et_mvlan_netdev_event: event 1 for vlan1 mvlan_en 0
  998. Feb 14 08:00:17 WAN Connection: Fail to connect with some issues.
  999. Feb 14 08:00:18 dnsmasq[264]: warning: no upstream servers configured
  1000. Feb 14 08:00:18 RT-AC1900P: start https:8443
  1001. Feb 14 08:00:18 RT-AC1900P: start httpd:80
  1002. Feb 14 08:00:18 NAT Tunnel: AAE Service is stopped
  1003. Feb 14 08:00:19 AAE: AAE Service is started
  1004. Feb 14 08:00:19 jffs2: valid logs(1)
  1005. Feb 14 08:00:19 hour monitor: daemon is starting
  1006. Feb 14 08:00:19 hour monitor: daemon terminates
  1007. Feb 14 08:00:19 disk monitor: be idle
  1008. Feb 14 08:00:19 syslog: Generating SSL certificate...
  1009. Feb 14 08:00:19 syslog: Generating SSL certificate...
  1010. Feb 14 08:00:19 Mastiff: init
  1011. Feb 14 08:00:19 lldpd[347]: cannot get ethtool link information with GLINKSETTINGS (requires 4.9+): Operation not permitted
  1012. Feb 14 08:00:19 lldpd[347]: cannot get ethtool link information with GSET (requires 2.6.19+): Operation not permitted
  1013. Feb 14 08:00:20 wan: [deconfig] udhcpc done[286]
  1014. Feb 14 08:00:21 pppd[372]: pppd 2.4.7 started by i5151, uid 0
  1015. Feb 14 08:00:21 pppd[372]: Connected to a4:dc:be:fa:3e:d1 via interface eth0
  1016. Feb 14 08:00:21 pppd[372]: Connect: ppp0 <--> eth0
  1017. Feb 14 08:00:24 syslog: module ledtrig-usbdev not found in modules.dep
  1018. Feb 14 08:00:24 syslog: module leds-usb not found in modules.dep
  1019. Feb 14 08:00:24 kernel: SCSI subsystem initialized
  1020. Feb 14 08:00:26 roamast: eth1: add client [b0:f8:93:1d:f3:f9] to monitor list
  1021. Feb 14 08:00:26 pppd[372]: PAP authentication succeeded
  1022. Feb 14 08:00:26 pppd[372]: peer from calling number A4:DC:BE:FA:3E:D1 authorized
  1023. Feb 14 08:00:27 pppd[372]: local  IP address 123.117.239.9
  1024. Feb 14 08:00:27 pppd[372]: remote IP address 123.117.232.1
  1025. Feb 14 08:00:27 pppd[372]: primary   DNS address 202.106.195.68
  1026. Feb 14 08:00:27 pppd[372]: secondary DNS address 202.106.46.151
  1027. Feb 14 08:00:27 rc_service: ip-up 456:notify_rc start_firewall
  1028. Feb 14 08:00:28 wan: finish adding multi routes
  1029. Feb 14 08:00:28 rc_service: ip-up 456:notify_rc stop_upnp
  1030. Feb 14 08:00:28 rc_service: waitting "start_firewall" via ip-up ...
  1031. Feb 14 08:00:28 wan: finish adding multi routes
  1032. Feb 14 08:00:28 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  1033. Feb 14 08:00:29 nat: apply redirect rules error!
  1034. Feb 14 08:00:30 kernel: nf_conntrack_rtsp v0.6.21 loading
  1035. Feb 14 08:00:30 kernel: nf_nat_rtsp v0.6.21 loading
  1036. Feb 14 08:00:31 roamast: eth1: add client [bc:1c:81:31:0b:51] to monitor list
  1037. Feb 14 08:00:31 rc_service: ip-up 456:notify_rc start_upnp
  1038. Feb 14 08:00:31 rc_service: waitting "stop_upnp" via ip-up ...
  1039. Feb 14 08:00:34 WAN Connection: WAN was restored.
  1040. Feb 14 08:00:35 ntp: start NTP update
  1041. May 18 05:03:21 rc_service: ntp 484:notify_rc restart_upnp
  1042. May 18 05:03:21 rc_service: ntp 484:notify_rc restart_diskmon
  1043. May 18 05:03:21 disk_monitor: Finish
  1044. May 18 05:03:21 disk monitor: be idle
  1045. May 18 05:03:22 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
  1046. May 18 05:03:22 ddns update: ez-ipupdate: starting...
  1047. May 18 05:03:22 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
  1048. May 18 05:03:22 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 17 May 2018 21:03:22 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
  1049. May 18 05:03:22 ddns update: retval= 0, ddns_return_code (,200)
  1050. May 18 05:03:22 ddns update: asusddns_update: 0
  1051. May 18 05:03:22 ddns: ddns update ok
  1052. May 18 05:03:27 rc_service: zcip 560:notify_rc start_firewall
  1053. May 18 05:03:27 zcip client: configured 169.254.238.90
  1054. May 18 05:03:28 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  1055. May 18 05:03:31 roamast: eth2: add client [a4:ca:a0:20:93:aa] to monitor list
  1056. May 18 05:03:34 watchdog: start ddns.
  1057. May 18 05:03:34 rc_service: watchdog 277:notify_rc restart_ddns
  1058. May 18 05:03:34 start_ddns: update WWW.ASUS.COM dyndns, wan_unit 0
  1059. May 18 05:03:34 ddns update: ez-ipupdate: starting...
  1060. May 18 05:03:34 ddns update: connected to nwsrv-ns1.asus.com (103.10.4.108) on port 80.
  1061. May 18 05:03:34 ddns update: Asus update entry:: return: HTTP/1.1 200 OK^M Date: Thu, 17 May 2018 21:03:34 GMT^M Server: Apache^M X-Powered-By: PHP/5.6.30^M Content-Length: 0^M Connection: close^M Content-Type: text/html; charset=UTF-8^M ^M
  1062. May 18 05:03:34 ddns update: retval= 0, ddns_return_code (,200)
  1063. May 18 05:03:34 ddns update: asusddns_update: 0
  1064. May 18 05:03:35 ddns: ddns update ok
  1065. May 18 05:03:37 kernel: SHN Release Version: 2.0.1 3529123_patch
  1066. May 18 05:03:37 kernel: UDB Core Version: 0.2.14 r3529123
  1067. May 18 05:03:38 kernel: sizeof forward pkt param = 192
  1068. May 18 05:03:42 rc_service: ip-up 456:notify_rc start_firewall
  1069. May 18 05:03:42 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
  1070. May 18 05:03:46 crond[271]: time disparity of 659343 minutes detected
  1071. May 18 05:08:46 roamast: eth2: add client [10:02:b5:aa:df:b6] to monitor list


复制代码

微信扫一扫,阅读更方便^_^

16

主题

495

回帖

1283

积分

金牌会员

Rank: 6Rank: 6

积分
1283

GT-AC5300

发表于 2018-5-18 09:28:51 | 显示全部楼层
是不是ISP自动更换IP时,没有给你分发新IP啊。
你看一下现在 WAN -> 互联网连接 -> 网络监测   是选的哪个?选别的选项试试看

649

主题

6525

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
17937

RT-AC88URT-AX68URT-BE88U

发表于 2018-5-18 09:47:14 | 显示全部楼层
观察你的日志,从4/7开机第一次WAN拨号成功,之后4/13、4/19、4/24(接近25号)、4/30、5/6、5/12、5/18,都有断线重连的信息。

像这样比较有规律的断线重连,如果你没有做过特殊设定的话(这里不是指你在设定管理页面做设定,而是说你通过后台下命令或者写特殊脚本),就应该是ISP刻意为之,让你的RT-AC1900P断线。

你5/18 RT-AC1900P断线之后,确实重新拨号成功了,且获得了WAN IP。问题的关键,看日志5/18拨号成功后,RT-AC1900P只运行了
May 18 03:25:09 rc_service: ip-up 23510:notify_rc start_firewall
May 18 03:25:09 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)

而之前断线重连之后,RT-AC1900P会运行
May 12 08:31:32 rc_service: ip-up 4996:notify_rc start_firewall
May 12 08:31:33 wan: finish adding multi routes
May 12 08:31:33 ntp: start NTP update
May 12 08:31:33 rc_service: ip-up 4996:notify_rc stop_upnp
May 12 08:31:33 rc_service: waitting "start_firewall" via ip-up ...
May 12 08:31:33 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
May 12 08:31:33 wan: finish adding multi routes
May 12 08:31:33 nat: apply redirect rules
May 12 08:31:34 rc_service: ip-up 4996:notify_rc start_upnp
May 12 08:31:34 rc_service: waitting "stop_upnp" via ip-up ...
... ...
May 12 08:31:38 WAN Connection: WAN was restored.
May 12 08:31:38 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)
May 12 08:31:39 ntp: start NTP updateMay 12 08:31:50 rc_service: ip-up 4996:notify_rc start_firewall
May 12 08:31:51 nat: apply nat rules (/tmp/nat_rules_ppp0_eth0)

所以RT-AC1900P的异常出现在5/18拨号获得IP之后。

11

主题

176

回帖

1092

积分

金牌会员

Rank: 6Rank: 6

积分
1092
 楼主| 发表于 2018-5-18 10:20:11 | 显示全部楼层
maple_1994 发表于 2018-5-18 09:28
是不是ISP自动更换IP时,没有给你分发新IP啊。
你看一下现在 WAN -> 互联网连接 -> 网络监测   是选的哪个 ...

关闭,我选其他的试试。

11

主题

176

回帖

1092

积分

金牌会员

Rank: 6Rank: 6

积分
1092
 楼主| 发表于 2018-5-18 10:29:15 | 显示全部楼层
Master 发表于 2018-5-18 09:47
观察你的日志,从4/7开机第一次WAN拨号成功,之后4/13、4/19、4/24(接近25号)、4/30、5/6、5/12、5/18,都 ...

我7X24在下载,肯定不会设定自动断线重连的,说实话也知道怎么设置。

你的意思的ISP这么做的,是正常的更换IP还是看我一直下载就是让我断线?结果在尝试几次之后终于成功了?

但是之前的路由器从没断过线,也没有做过什么设置。我相信华硕也能做到这一点,但如何设置呢?

649

主题

6525

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
17937

RT-AC88URT-AX68URT-BE88U

发表于 2018-5-18 10:36:07 | 显示全部楼层
i5151 发表于 2018-5-18 10:29
我7X24在下载,肯定不会设定自动断线重连的,说实话也知道怎么设置。

你的意思的ISP这么做的,是正常的 ...

你没有做过特殊设定的话,那就是ISP帮你断的,至于为什么要断,那ISP应该有自己的规则。

像我们这边的中国电信一般就是两天断一次,然后路由器会重连。

11

主题

176

回帖

1092

积分

金牌会员

Rank: 6Rank: 6

积分
1092
 楼主| 发表于 2018-5-18 10:56:14 | 显示全部楼层
Master 发表于 2018-5-18 10:36
你没有做过特殊设定的话,那就是ISP帮你断的,至于为什么要断,那ISP应该有自己的规则。

像我们这边的中 ...

你那两天一断路由器会重连成功吗?是两天必须断网一次,还是在路由器坚持重连几次之后顶不住了,不得不断网一次?

华硕的路由器就不能设定成每次重连成功吗?

649

主题

6525

回帖

1万

积分

管理员

正品行货

Rank: 9Rank: 9Rank: 9

积分
17937

RT-AC88URT-AX68URT-BE88U

发表于 2018-5-18 11:34:20 | 显示全部楼层
i5151 发表于 2018-5-18 10:56
你那两天一断路由器会重连成功吗?是两天必须断网一次,还是在路由器坚持重连几次之后顶不住了,不得不断 ...

我这边基本上两天左右,中国电信就会把你的PPPoE链接断开,然后路由器会主动重连上。

你RT-AC1900P的断网,实际上PPPoE链接断开后,拨号重连这个过程是正常的,异常发生在拨号获得WAN IP之后,RT-AC1900P本身出现问题了。

11

主题

176

回帖

1092

积分

金牌会员

Rank: 6Rank: 6

积分
1092
 楼主| 发表于 2018-5-18 12:39:07 | 显示全部楼层
Master 发表于 2018-5-18 11:34
我这边基本上两天左右,中国电信就会把你的PPPoE链接断开,然后路由器会主动重连上。

你RT-AC1900P的断 ...

那RT-AC1900P出的这个问题是固件的问题还是硬件的问题?可否避免?如何避免?

261

主题

3832

回帖

9567

积分

管理员

Rank: 9Rank: 9Rank: 9

积分
9567

RT-AX86U

发表于 2018-5-18 13:31:27 | 显示全部楼层
i5151 发表于 2018-5-18 12:39
那RT-AC1900P出的这个问题是固件的问题还是硬件的问题?可否避免?如何避免?

如果是ISP强制断线, 出现断线是无法避免的
你将internet detected选项设定为PPP ECHO,确认是否会重新拨号
主要请使用官方最新固件,不然不方便看问题.

另外你上面说是wifi也没有? 是WiFi消失了?
Using wireless to connect to life
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

站长推荐上一条 /1 下一条

快速回复 返回列表 搜索 官方QQ群
×

秒后自动关闭

小黑屋|手机版|Archiver|华硕网络产品技术交流平台 ( 苏ICP备16010857号-1 )苏公网安备 32050502000499号

GMT+8, 2025-4-27 14:30 , Processed in 1.624761 second(s), 35 queries , Gzip On.

Powered by Discuz! X3.4

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表