Skocz do zawartości

Recommended Posts

Dzień dobry! NA początku proszę o wyrozumiałość, gdyż nie bardzo znam się na tych sprawach, jestem po prostu zwykłym, przeciętnym użytkownikiem internetu. :)  Kupiłem ostatnio router, tak jak w temacie Dlink 605L, podłączyłem, skonfigurowałem i jest ok, pomijając pewien uciążliwy dla mnie bardzo fakt. Otóż router po jakimś tam czasie, bliżej nieokreślonym zrywa połączenie sam od siebie. nie ma internetu ani bezprzewodowego ani na komputerze, pomaga tylko wypięcie i wpięcie kabla ethernet :cry: . Jedyne co ja zauważyłem to to że mój modem ma gniazdo lan, w którym jest ok nw 8 styków a w routerze w gnieździe Lan 1,2 itd jest ich tylko 4 :o . Tak samo kabel ethernet dołączony do zestawu ma 4 żyłki, a mój wcześniejszy kabel, który idzie od modema do routera ma ok 8. ( 8 styków - 8 żył - 4 styki i Lan: 4 styki - 4 żyły - gniazdo w komputerze) :?: . Chyba trochę pokręciłem xD ale nie umiem tego inaczej wytłumaczyć. Ps router resetowałem i dalej się to powtarza. proszę o pomoc

 


A i internet radiowy

Link to post
Share on other sites

Logi routera - znajdziesz w odpowiedniej zakładce po zalogowaniu. Jeśli są wyłączone to włącz i poczekaj aż zerwie połączenie. Wtedy sprawdź.

 

Nie znam tego routera więc za rączkę nie poprowadzę, ale praktycznie każdy router logi posiada.

Link to post
Share on other sites

Ok, jak znajde to wkleje


Jan 21 05:39:45  Per-source ACK Flood Attack Detect Packet Dropped<br>
Jan 21 05:39:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:38:45  Per-source ACK Flood Attack Detect Packet Dropped<br>
Jan 21 05:38:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:36:45  Per-source ACK Flood Attack Detect Packet Dropped<br>
Jan 21 05:36:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:35:45  Per-source ACK Flood Attack Detect Packet Dropped<br>
Jan 21 05:35:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:34:45  Per-source ACK Flood Attack Detect Packet Dropped<br>
Jan 21 05:34:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:33:45  Per-source ACK Flood Attack Detect Packet Dropped<br>
Jan 21 05:33:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:31:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:30:45  Per-source UDP Flood Attack Detect Packet Dropped<br>
Jan 21 05:30:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:30:45 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:29:45  Per-source ACK Flood Attack Detect Packet Dropped<br>
Jan 21 05:29:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:28:45  Per-source ACK Flood Attack Detect Packet Dropped<br>
Jan 21 05:28:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:27:45  Per-source ACK Flood Attack Detect Packet Dropped<br>
Jan 21 05:27:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:26:45  Per-source ACK Flood Attack Detect Packet Dropped<br>
Jan 21 05:26:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:25:45  Per-source UDP Flood Attack Detect Packet Dropped<br>
Jan 21 05:25:45 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:24:45  Per-source UDP Flood Attack Detect Packet Dropped<br>
Jan 21 05:24:45 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:15:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 05:15:30 DHCP request success 10.0.0.198<br>
Jan 21 05:15:26 Remote management is disabled. <br>
Jan 21 05:15:26 Anti-spoofing enabled. <br>
Jan 21 05:15:26 Block WAN PING enabled. <br>
Jan 21 05:15:26 URL Blocking disabled. <br>
Jan 21 05:15:26 RTSP ALG enabled. <br>
Jan 21 05:15:26 VPN (IPsec) Pass-Through enabled. <br>
Jan 21 05:15:26 VPN (PPTP) Pass-Through enabled. <br>
Jan 21 05:15:26 VPN (L2TP) Pass-Through enabled. <br>
Jan 21 05:15:23 REQUESTING here <br>
Jan 21 05:15:23 DHCP request 10.0.0.198<br>
Jan 21 05:15:23 DHCP Discover <br>
Jan 21 05:15:21 DHCP Discover <br>
Jan 21 05:15:19 DHCP Discover <br>
Jan 21 05:15:18 DHCP renew <br>
Jan 21 05:15:18 DHCP release <br>
Jan 21 04:58:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 04:58:18 DHCP request success 10.0.0.198<br>
Jan 21 04:58:15 Remote management is disabled. <br>
Jan 21 04:58:15 Anti-spoofing enabled. <br>
Jan 21 04:58:15 Block WAN PING enabled. <br>
Jan 21 04:58:15 URL Blocking disabled. <br>
Jan 21 04:58:15 RTSP ALG enabled. <br>
Jan 21 04:58:15 VPN (IPsec) Pass-Through enabled. <br>
Jan 21 04:58:15 VPN (PPTP) Pass-Through enabled. <br>
Jan 21 04:58:15 VPN (L2TP) Pass-Through enabled. <br>
Jan 21 04:58:11 REQUESTING here <br>
Jan 21 04:58:11 DHCP request 10.0.0.198<br>
Jan 21 04:58:11 DHCP Discover <br>
Jan 21 04:58:09 DHCP Discover <br>
Jan 21 04:58:09 DHCP renew <br>
Jan 21 04:58:09 DHCP release <br>
Jan 21 04:57:45  Per-source ACK Flood Attack Detect Packet Dropped<br>
Jan 21 04:57:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 04:55:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Jan 21 04:55:35 Wireless PC connected e0-63-e5-56-9a-df<br>
Jan 21 04:55:29 Wireless PC connected e0-63-e5-56-9a-df<br>
Sep 05 10:04:01 DHCP request success 10.0.0.198<br>
Sep 05 10:03:57 Remote management is disabled. <br>
Sep 05 10:03:57 Anti-spoofing enabled. <br>
Sep 05 10:03:57 Block WAN PING enabled. <br>
Sep 05 10:03:57 URL Blocking disabled. <br>
Sep 05 10:03:57 RTSP ALG enabled. <br>
Sep 05 10:03:56 VPN (IPsec) Pass-Through enabled. <br>
Sep 05 10:03:56 VPN (PPTP) Pass-Through enabled. <br>
Sep 05 10:03:56 VPN (L2TP) Pass-Through enabled. <br>
Sep 05 10:03:53 REQUESTING here <br>
Sep 05 10:03:53 DHCP request 10.0.0.198<br>
Sep 05 10:03:53 DHCP Discover <br>
Sep 05 10:02:52 DHCP Discover no response <br>
Sep 05 10:02:48 DHCP Discover <br>
Sep 05 10:02:47 System started <br>
Sep 05 10:02:46 DHCP Discover <br>
Sep 05 10:02:46 AP 2.4GHz mode Ready. Channel : 3 TxRate : best SSID : dlink <br>
Sep 05 10:02:46 Access Point: dlink started at channel 3 <br>
Sep 05 10:02:44 DHCP Discover <br>
 
 
 
 
Oto ci chodziło, bo jeśli tak to  jak zerwie połączenie to to jeszcze raz wkleje, bo to jest skopiowane gdy wszystko działa ok

Jan 21 05:54:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:53:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:52:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:51:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:50:45  Per-source UDP Flood Attack Detect Packet Dropped<br>

Jan 21 05:50:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:50:45 Whole System UDP Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:49:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:49:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:48:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:48:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:47:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:47:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:46:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:45:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:44:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:43:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:42:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:42:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:41:45  Per-source UDP Flood Attack Detect Packet Dropped<br>

Jan 21 05:41:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:41:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:41:45 Whole System UDP Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:40:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:40:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:39:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:39:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:38:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:38:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:36:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:36:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:35:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:35:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:34:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:34:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:33:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:33:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:31:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:30:45  Per-source UDP Flood Attack Detect Packet Dropped<br>

Jan 21 05:30:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:30:45 Whole System UDP Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:29:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:29:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:28:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:28:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:27:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:27:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:26:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 05:26:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:25:45  Per-source UDP Flood Attack Detect Packet Dropped<br>

Jan 21 05:25:45 Whole System UDP Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:24:45  Per-source UDP Flood Attack Detect Packet Dropped<br>

Jan 21 05:24:45 Whole System UDP Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:15:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 05:15:30 DHCP request success 10.0.0.198<br>

Jan 21 05:15:26 Remote management is disabled. <br>

Jan 21 05:15:26 Anti-spoofing enabled. <br>

Jan 21 05:15:26 Block WAN PING enabled. <br>

Jan 21 05:15:26 URL Blocking disabled. <br>

Jan 21 05:15:26 RTSP ALG enabled. <br>

Jan 21 05:15:26 VPN (IPsec) Pass-Through enabled. <br>

Jan 21 05:15:26 VPN (PPTP) Pass-Through enabled. <br>

Jan 21 05:15:26 VPN (L2TP) Pass-Through enabled. <br>

Jan 21 05:15:23 REQUESTING here <br>

Jan 21 05:15:23 DHCP request 10.0.0.198<br>

Jan 21 05:15:23 DHCP Discover <br>

Jan 21 05:15:21 DHCP Discover <br>

Jan 21 05:15:19 DHCP Discover <br>

Jan 21 05:15:18 DHCP renew <br>

Jan 21 05:15:18 DHCP release <br>

Jan 21 04:58:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 04:58:18 DHCP request success 10.0.0.198<br>

Jan 21 04:58:15 Remote management is disabled. <br>

Jan 21 04:58:15 Anti-spoofing enabled. <br>

Jan 21 04:58:15 Block WAN PING enabled. <br>

Jan 21 04:58:15 URL Blocking disabled. <br>

Jan 21 04:58:15 RTSP ALG enabled. <br>

Jan 21 04:58:15 VPN (IPsec) Pass-Through enabled. <br>

Jan 21 04:58:15 VPN (PPTP) Pass-Through enabled. <br>

Jan 21 04:58:15 VPN (L2TP) Pass-Through enabled. <br>

Jan 21 04:58:11 REQUESTING here <br>

Jan 21 04:58:11 DHCP request 10.0.0.198<br>

Jan 21 04:58:11 DHCP Discover <br>

Jan 21 04:58:09 DHCP Discover <br>

Jan 21 04:58:09 DHCP renew <br>

Jan 21 04:58:09 DHCP release <br>

Jan 21 04:57:45  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 21 04:57:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 04:55:45 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 21 04:55:35 Wireless PC connected e0-63-e5-56-9a-df<br>

Jan 21 04:55:29 Wireless PC connected e0-63-e5-56-9a-df<br>

Sep 05 10:04:01 DHCP request success 10.0.0.198<br>

Sep 05 10:03:57 Remote management is disabled. <br>

Sep 05 10:03:57 Anti-spoofing enabled. <br>

Sep 05 10:03:57 Block WAN PING enabled. <br>

Sep 05 10:03:57 URL Blocking disabled. <br>

Sep 05 10:03:57 RTSP ALG enabled. <br>

Sep 05 10:03:56 VPN (IPsec) Pass-Through enabled. <br>

Sep 05 10:03:56 VPN (PPTP) Pass-Through enabled. <br>

Sep 05 10:03:56 VPN (L2TP) Pass-Through enabled. <br>

Sep 05 10:03:53 REQUESTING here <br>

Sep 05 10:03:53 DHCP request 10.0.0.198<br>

Sep 05 10:03:53 DHCP Discover <br>

Sep 05 10:02:52 DHCP Discover no response <br>

Sep 05 10:02:48 DHCP Discover <br>

Sep 05 10:02:47 System started <br>

Sep 05 10:02:46 DHCP Discover <br>

Sep 05 10:02:46 AP 2.4GHz mode Ready. Channel : 3 TxRate : best SSID : dlink <br>

Sep 05 10:02:46 Access Point: dlink started at channel 3 <br>

Sep 05 10:02:44 DHCP Discover <br>

ep 05 10:02:46 Access Point: dlink started at channel 3 <br>

 

Sep 05 10:02:44 DHCP Discover <br>


Skopiowane po zerwaniu połączenia :)

Link to post
Share on other sites

W którym momencie on zrywa połączenie? W logach widać star maszyny, później żadanie IP, dołączenie dwóch kompóterów po WiFi, otrzymanie IP i... masę ataków floodowych od strony WAN. W tym drugim logu następuje zwrócenie adresu i pobranie ponownie. Nie wiem co może być powodem. Dziwne natomiast jest to, że dostajesz adres niepubliczny na WANie od operatora. Co to jest za wynalazek, radiówka od lokalnego ISP?

 

Czy jak nastąpi rozłączenie netu to na router możesz się zalogować? Czy musisz go restartować odpinając od zasilania?

Link to post
Share on other sites

Tak, to jest radiówka. tak po zerwaniu  połączenie mogę zalogować się na router i pisze: status- odłączone. Jeśli wypnę i wepnę kabell ethernet znów wraca i strona routera się aktualizuje i zmienia się status na połączone.


Wczoraj jeszcze raz go zresetowałem do domyślnych i już nie konfigurowałem na ich stronie. O dziwo nie zerwało połączenia  16 h :roll:

Link to post
Share on other sites

status połączenia, router jest skonfigurowany, jest wgrany najnowszy firmware 2.06UI, lecz dalej ten sam problem.


Jan 22 14:39:35 REQUESTING here <br>

Jan 22 14:39:35 DHCP request 10.0.0.198<br>

Jan 22 14:39:35 DHCP Discover <br>

Jan 22 14:39:33 DHCP Discover <br>

Jan 22 14:39:33 DHCP renew <br>

Jan 22 14:39:33 DHCP release <br>

Jan 22 14:36:33  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 22 14:36:33 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 22 14:35:33  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 22 14:35:33 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 22 14:35:33 DHCP request success 10.0.0.198<br>

Jan 22 14:35:29 Remote management is disabled. <br>

Jan 22 14:35:29 Anti-spoofing enabled. <br>

Jan 22 14:35:29 Block WAN PING enabled. <br>

Jan 22 14:35:29 URL Blocking disabled. <br>

Jan 22 14:35:29 RTSP ALG enabled. <br>

Jan 22 14:35:29 VPN (IPsec) Pass-Through enabled. <br>

Jan 22 14:35:29 VPN (PPTP) Pass-Through enabled. <br>

Jan 22 14:35:29 VPN (L2TP) Pass-Through enabled. <br>

Jan 22 14:35:25 REQUESTING here <br>

Jan 22 14:35:25 DHCP request 10.0.0.198<br>

Jan 22 14:35:25 DHCP Discover <br>

Jan 22 14:35:25 DHCP renew <br>

Jan 22 14:35:25 DHCP release <br>

Jan 22 14:34:33  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 22 14:34:33 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 22 14:33:33  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 22 14:33:33 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 22 14:32:33  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 22 14:32:33 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 22 14:31:33  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 22 14:31:33 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 22 14:30:33  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 22 14:30:33 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 22 14:29:33  Port Scan Attack Detect Packet Dropped<br>

Jan 22 14:29:33  Per-source UDP Flood Attack Detect Packet Dropped<br>

Jan 22 14:29:33  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 22 14:29:33 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 22 14:29:33 Whole System UDP Flood Attack from WAN Rule:Default deny<br>

Jan 22 14:28:33  Per-source UDP Flood Attack Detect Packet Dropped<br>

Jan 22 14:28:33 Whole System UDP Flood Attack from WAN Rule:Default deny<br>

Jan 22 14:22:38 DHCP lease IP 192.168.0.100 to aa26f8cb7d45410 40-61-86-90-ff-af<br>

Jan 22 12:13:33  Per-source ACK Flood Attack Detect Packet Dropped<br>

Jan 22 12:13:33 Whole System ACK Flood Attack from WAN Rule:Default deny<br>

Jan 22 12:13:11 Wireless PC connected e0-63-e5-56-9a-df<br>

Jan 22 12:13:05 Wireless PC connected e0-63-e5-56-9a-df<br>

 

 

Oto jeszcze raz najnowsze Logi, o 14:22:38 Już nie było internetu :cry: 

Link to post
Share on other sites

Dołącz do dyskusji

Możesz dodać zawartość już teraz a zarejestrować się później. Jeśli posiadasz już konto, zaloguj się aby dodać zawartość za jego pomocą.

Gość
Odpowiedz w tym wątku...

×   Wklejono zawartość z formatowaniem.   Usuń formatowanie

  Dozwolonych jest tylko 75 emoji.

×   Odnośnik został automatycznie osadzony.   Przywróć wyświetlanie jako odnośnik

×   Przywrócono poprzednią zawartość.   Wyczyść edytor

×   Nie możesz bezpośrednio wkleić grafiki. Dodaj lub załącz grafiki z adresu URL.

  • Ostatnio przeglądający   0 użytkowników

    Brak zarejestrowanych użytkowników przeglądających tę stronę.

×
×
  • Dodaj nową pozycję...