Wracając do tematu zawieszającego się routera, który tutaj był wałkowany na wszystkie strony jakiś czas temu (ostatni mój wpis był 27/01) i sugestia była, że jest to problem z zasilaniem. Otóż nic takiego. Mam to teraz czarno na białym.
Dla przypomnienia... router "wiesza" się w nieregularnych odstępach czasu, czasem wytrzyma parę dni, a czasem nawet nie wytrzyma jednej godziny. Gdy routerem był Linksys WRT54GS (z firmware Tomato wersja 124), wtedy żadnego problemu nie było. Nawet teraz gdy podepnę ten stary router problem znika. Niestety jest on stary i wolny, więc parę lat temu wymieniłem go na ASUSa RT-N16. Na początku też nie było z tym nowym routerem problemu. Dopiero po długim czasie (chyba ponad rok albo nawet półtora) zaczął się problem. Wydawało mi się że problem został wprowadzony przy zainstalowaniu nowej wersji firmware i wygląda na to, że się nie myliłem. Dla wyeliminowania problemu ze sprzętem wymieniłem router na innego ASUSa RT-N16 a w grudniu na ASUSa RT-AC66U i cały czas jest ten sam problem. Obecnie zainstalowana wersja jest 1.28.0000 MIPSR2-132 K26AC USB AIO-64K.
Teraz zebrałem trochę dowodów na to co się dzieje, choć jeszcze nie wiem dlaczego się to dzieje. Otóż router się nie wiesza, on "głupieje". Przestaje obsługiwać komunikację internetową i wygląda jakby się zawiesił, ale wcale tak nie jest. Nie odpowiada na pingi ani na adres WAN ani LAN, nie przepuszcza nic, nie można się do niego zalogować, ale po przekierowaniu logów na zewnętrzny dysk widać dokładnie że jest jakby w pętli. I wcale nie trzeba go resetować żeby z powrotem zaczął działać. Tak myślałem na początku, ale teraz wiem że wystarczy odłączyć kabel sieciowy biegnący do adaptera PNA i router wraca do życia.
Adapter PNA jest połączony poprzez sieć elektryczną z drugim adapterem, a do tego podłączony jest inny stary Linksys WRT54GS (z oprogramowaniem firmowym), który działa tylko jako access point do komunikacji Wi-Fi (kabel od adaptera PNA jest podłączony do portu LAN). Wygląda na to, że cokolwiek przychodzi od Linksysa do ASUSa "ogłupia" go do tego stopnia, że wydaje się że się zawiesił. Ale tak nie jest (jak już wspomniałem) i wystarczy przerwać komunikację między Linksysem i ASUSem, i ASUS wraca do życia bez żadnej innej interwencji. Gdzie tu problem z zasilaniem? Ano nigdzie.
Przytoczę teraz duże fragmenty logów z moim komentarzem gdzieniegdzie dla jasności sytuacji. Wygląda na to, że problem jest z obsługą DHCP i w pewnych warunkach router głupieje do tego stopnia, że zapętla się w "obsłudze" DHCP aż do czasu, gdy się odetnie źródło requests (zapytań?) o adres dynamiczny. Pewne rzeczy z logów (np. zewnętrzny adres IP) zostały celowo zmienione dla zapewnienia anonimowości i "bezpieczeństwa".
Poniższy fragment loga pochodzi z czasu kiedy router "wisiał". W tym czasie generował 50 KB loga w 15 minut wypełniony powtarzającymi się w kółko wiadomościami.
Mar 31 13:10:44 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:10:44 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:10:49 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:10:49 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:10:53 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.140 00:1a:a0:b6:73:71
Mar 31 13:10:53 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.140 00:1a:a0:b6:73:71
Mar 31 13:10:54 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:10:54 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:10:59 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:10:59 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:04 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:04 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:06 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:11:06 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:11:09 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:09 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:09 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:11:09 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:11:14 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:14 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:18 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:11:18 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:11:19 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:19 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:24 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:24 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:29 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:29 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:34 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:34 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:35 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:11:35 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:11:39 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:39 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:44 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:44 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:49 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:49 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:54 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:54 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:59 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:11:59 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:04 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:04 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:09 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:09 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:14 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:14 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:19 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:19 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:24 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:24 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:29 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:29 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:34 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:34 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:39 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:39 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:44 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:44 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:49 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:49 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:54 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:54 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:59 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:12:59 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:13:04 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:13:04 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:24:30 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:24:30 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:24:33 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:24:33 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:24:35 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:24:35 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:24:36 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:24:36 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:24:40 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:24:40 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:24:40 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:24:40 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:24:57 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.188 00:13:b6:0f:9a:4a
Mar 31 13:24:57 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.188 00:13:b6:0f:9a:4a
Mar 31 13:24:57 firewall daemon.info dnsmasq-dhcp[595]: DHCPREQUEST(br0) 192.168.0.188 00:13:b6:0f:9a:4a
Mar 31 13:24:57 firewall daemon.info dnsmasq-dhcp[595]: DHCPACK(br0) 192.168.0.188 00:13:b6:0f:9a:4a Slingbox-350
Mar 31 13:25:38 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.185 00:90:a9:db:ac:4a
Mar 31 13:25:38 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.185 00:90:a9:db:ac:4a
Mar 31 13:25:38 firewall daemon.info dnsmasq-dhcp[595]: DHCPREQUEST(br0) 192.168.0.185 00:90:a9:db:ac:4a
Mar 31 13:25:38 firewall daemon.info dnsmasq-dhcp[595]: DHCPACK(br0) 192.168.0.185 00:90:a9:db:ac:4a WDMyCloud
Mar 31 13:25:39 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:25:39 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:25:40 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:25:40 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:25:43 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:25:43 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:25:45 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:25:45 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:25:50 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:25:50 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:25:51 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:25:51 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Mar 31 13:25:55 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:25:55 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:26:00 firewall daemon.info dnsmasq-dhcp[595]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Mar 31 13:26:00 firewall daemon.info dnsmasq-dhcp[595]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Natknąłem się też na taki wpis:
Apr 2 09:58:43 firewall user.warn kernel: nf_ct_ras: decoding error: out of bound
Innym razem router "wisiał" ale nic nie logował. Tym razem zasilanie zostało mu zresetowane.
Apr 3 01:00:00 firewall syslog.info root: -- MARK --
Apr 3 01:00:00 firewall cron.info crond[609]: USER root pid 14465 cmd logger -p syslog.info -- -- MARK --
Apr 3 01:01:39 firewall daemon.info dnsmasq-dhcp[596]: DHCPREQUEST(br0) 192.168.0.185 00:90:a9:db:ac:4a
Apr 3 01:01:39 firewall daemon.info dnsmasq-dhcp[596]: DHCPACK(br0) 192.168.0.185 00:90:a9:db:ac:4a WDMyCloud
Apr 3 01:10:00 firewall cron.info crond[609]: USER root pid 14556 cmd ntpsync --cron
Apr 3 01:10:01 firewall user.info ntpc[14557]: Time Updated: Sun, 03 Apr 2016 01:10:01 -0500 [+1s]
Apr 3 01:10:28 firewall daemon.info dnsmasq-dhcp[596]: DHCPREQUEST(br0) 192.168.0.148 28:18:78:ed:60:7a
Apr 3 01:10:28 firewall daemon.info dnsmasq-dhcp[596]: DHCPACK(br0) 192.168.0.148 28:18:78:ed:60:7a XboxOne
Apr 3 01:20:13 firewall daemon.info dnsmasq-dhcp[596]: DHCPREQUEST(br0) 192.168.0.156 6c:40:08:51:5b:d0
Apr 3 01:20:13 firewall daemon.info dnsmasq-dhcp[596]: DHCPACK(br0) 192.168.0.156 6c:40:08:51:5b:d0 LILAs-iPhone
Apr 3 01:34:08 firewall daemon.info dnsmasq-dhcp[596]: DHCPREQUEST(br0) 192.168.0.157 ac:3c:0b:53:b1:4a
Apr 3 01:34:08 firewall daemon.info dnsmasq-dhcp[596]: DHCPACK(br0) 192.168.0.157 ac:3c:0b:53:b1:4a LILAs-iPad
Apr 3 01:38:28 firewall daemon.info dnsmasq-dhcp[596]: DHCPREQUEST(br0) 192.168.0.148 28:18:78:ed:60:7a
Apr 3 01:38:28 firewall daemon.info dnsmasq-dhcp[596]: DHCPACK(br0) 192.168.0.148 28:18:78:ed:60:7a XboxOne
Apr 3 02:00:00 firewall cron.info crond[609]: USER root pid 15016 cmd logger -p syslog.info -- -- MARK --
Apr 3 02:00:00 firewall syslog.info root: -- MARK --
Apr 3 02:02:41 firewall daemon.info dnsmasq-dhcp[596]: DHCPREQUEST(br0) 192.168.0.148 28:18:78:ed:60:7a
Apr 3 02:02:41 firewall daemon.info dnsmasq-dhcp[596]: DHCPACK(br0) 192.168.0.148 28:18:78:ed:60:7a XboxOne
Apr 3 03:00:00 firewall cron.info crond[609]: USER root pid 15207 cmd logger -p syslog.info -- -- MARK --
Apr 3 03:00:00 firewall syslog.info root: -- MARK --
Apr 3 04:00:00 firewall cron.info crond[609]: USER root pid 15388 cmd logger -p syslog.info -- -- MARK --
Apr 3 04:00:00 firewall syslog.info root: -- MARK --
Apr 3 05:00:00 firewall syslog.info root: -- MARK --
Apr 3 05:00:00 firewall cron.info crond[609]: USER root pid 15568 cmd logger -p syslog.info -- -- MARK --
Apr 3 05:10:00 firewall cron.info crond[609]: USER root pid 15600 cmd ntpsync --cron
Apr 3 06:00:00 firewall syslog.info root: -- MARK --
Apr 3 06:00:00 firewall cron.info crond[609]: USER root pid 15751 cmd logger -p syslog.info -- -- MARK --
Apr 3 07:00:00 firewall syslog.info root: -- MARK --
Apr 3 07:00:00 firewall cron.info crond[609]: USER root pid 15932 cmd logger -p syslog.info -- -- MARK --
Apr 3 07:21:17 firewall daemon.info udhcpc[1250]: Sending renew...
Apr 3 08:00:00 firewall syslog.info root: -- MARK --
Apr 3 08:00:00 firewall cron.info crond[609]: USER root pid 16113 cmd logger -p syslog.info -- -- MARK --
Apr 3 09:00:00 firewall syslog.info root: -- MARK --
Apr 3 09:00:00 firewall cron.info crond[609]: USER root pid 16293 cmd logger -p syslog.info -- -- MARK --
Apr 3 09:10:00 firewall cron.info crond[609]: USER root pid 16326 cmd ntpsync --cron
Apr 3 10:00:00 firewall syslog.info root: -- MARK --
Apr 3 10:00:00 firewall cron.info crond[609]: USER root pid 16476 cmd logger -p syslog.info -- -- MARK --
Apr 3 11:00:00 firewall cron.info crond[609]: USER root pid 16657 cmd logger -p syslog.info -- -- MARK --
Apr 3 11:00:00 firewall syslog.info root: -- MARK --
Apr 3 12:00:00 firewall cron.info crond[609]: USER root pid 16838 cmd logger -p syslog.info -- -- MARK --
Apr 3 12:00:00 firewall syslog.info root: -- MARK --
Apr 3 13:00:00 firewall cron.info crond[609]: USER root pid 17019 cmd logger -p syslog.info -- -- MARK --
Apr 3 13:00:00 firewall syslog.info root: -- MARK --
Apr 3 13:10:00 firewall cron.info crond[609]: USER root pid 17051 cmd ntpsync --cron
Dec 31 18:00:16 firewall user.warn kernel: ufsd: sda1 without journal
Dec 31 18:00:16 firewall user.info hotplug[585]: USB ntfs fs at /dev/sda1 mounted on /tmp/mnt/CAV_EXT_USB
Dec 31 18:00:16 firewall daemon.info dnsmasq[594]: reading /etc/resolv.dnsmasq
I ponownie router "wisi":
Apr 4 18:24:58 firewall daemon.info dnsmasq-dhcp[594]: DHCPREQUEST(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 4 18:24:58 firewall daemon.info dnsmasq-dhcp[594]: DHCPACK(br0) 192.168.0.144 00:21:5c:59:04:fd LILA1
Apr 4 18:24:59 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 6c:40:08:51:5b:d0
Apr 4 18:24:59 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.156 6c:40:08:51:5b:d0
Apr 4 18:25:02 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:02 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:03 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 28:18:78:ed:60:7a
Apr 4 18:25:03 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.148 28:18:78:ed:60:7a
Apr 4 18:25:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 28:18:78:ed:60:7a
Apr 4 18:25:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.148 28:18:78:ed:60:7a
Apr 4 18:25:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 6c:40:08:51:5b:d0
Apr 4 18:25:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.156 6c:40:08:51:5b:d0
Apr 4 18:25:12 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:12 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:15 firewall daemon.info dnsmasq-dhcp[594]: DHCPREQUEST(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 4 18:25:15 firewall daemon.info dnsmasq-dhcp[594]: DHCPACK(br0) 192.168.0.144 00:21:5c:59:04:fd LILA1
Apr 4 18:25:15 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 6c:40:08:51:5b:d0
Apr 4 18:25:15 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.156 6c:40:08:51:5b:d0
Apr 4 18:25:16 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 28:18:78:ed:60:7a
Apr 4 18:25:16 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.148 28:18:78:ed:60:7a
Apr 4 18:25:17 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:17 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:20 firewall daemon.info dnsmasq-dhcp[594]: DHCPREQUEST(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 4 18:25:20 firewall daemon.info dnsmasq-dhcp[594]: DHCPACK(br0) 192.168.0.144 00:21:5c:59:04:fd LILA1
Apr 4 18:25:22 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:22 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:27 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:27 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:28 firewall daemon.info dnsmasq-dhcp[594]: DHCPREQUEST(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 4 18:25:28 firewall daemon.info dnsmasq-dhcp[594]: DHCPACK(br0) 192.168.0.144 00:21:5c:59:04:fd LILA1
Apr 4 18:25:32 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:32 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:33 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 28:18:78:ed:60:7a
Apr 4 18:25:33 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.148 28:18:78:ed:60:7a
Apr 4 18:25:37 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:37 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:42 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:42 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:47 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:47 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:52 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:52 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:54 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 4 18:25:54 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 4 18:25:57 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:57 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:25:59 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 4 18:25:59 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 4 18:26:02 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:26:02 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:26:02 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 4 18:26:02 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 4 18:26:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:26:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:26:10 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 4 18:26:10 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 4 18:26:12 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:26:12 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:26:17 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:26:17 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:26:22 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:26:22 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:26:24 firewall daemon.err nmbd[796]: process_name_release_request: Attempt to release name RAFALS<1d> from IP 192.168.0.185 on subnet 192.168.0.254 being rejected as it is one of our names.
Apr 4 18:26:26 firewall daemon.err nmbd[796]: process_local_master_announce: Server RRSWAS01VM at IP 192.168.0.60 is announcing itself as a local master browser for workgroup RAFALS and we think we are master. Forcing election.
Apr 4 18:26:26 firewall daemon.err nmbd[796]: Samba name server FIREWALL has stopped being a local master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 4 18:26:43 firewall daemon.err nmbd[796]: Samba name server FIREWALL is now a local master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 4 18:28:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.185 00:90:a9:db:ac:4a
Apr 4 18:28:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.185 00:90:a9:db:ac:4a
Apr 4 18:28:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPREQUEST(br0) 192.168.0.185 00:90:a9:db:ac:4a
Apr 4 18:28:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPACK(br0) 192.168.0.185 00:90:a9:db:ac:4a WDMyCloud
Apr 4 18:28:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:28:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:28:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPREQUEST(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 4 18:28:07 firewall daemon.info dnsmasq-dhcp[594]: DHCPACK(br0) 192.168.0.145 64:52:99:0c:c8:2b AssureLink
Apr 4 18:28:14 firewall daemon.err nmbd[796]: process_local_master_announce: Server RRSWAS02VM at IP 192.168.0.62 is announcing itself as a local master browser for workgroup RAFALS and we think we are master. Forcing election.
Apr 4 18:28:14 firewall daemon.err nmbd[796]: Samba name server FIREWALL has stopped being a local master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 4 18:28:16 firewall daemon.err nmbd[796]: process_lanman_packet: On subnet 192.168.0.254 ignoring browse packet command code 20994 from RRSWVS01<01> IP 192.168.0.20 to RAFALS<00>
Apr 4 18:28:16 firewall daemon.err nmbd[796]: process_lanman_packet: On subnet 192.168.0.254 ignoring browse packet command code 20994 from RRSWVS02<01> IP 192.168.0.22 to RAFALS<00>
Apr 4 18:28:20 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 00:13:b6:0f:9a:4a
Apr 4 18:28:20 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.188 00:13:b6:0f:9a:4a
Apr 4 18:28:21 firewall daemon.info dnsmasq-dhcp[594]: DHCPREQUEST(br0) 192.168.0.188 00:13:b6:0f:9a:4a
Apr 4 18:28:21 firewall daemon.info dnsmasq-dhcp[594]: DHCPACK(br0) 192.168.0.188 00:13:b6:0f:9a:4a Slingbox-350
Apr 4 18:28:27 firewall daemon.err nmbd[796]: process_lanman_packet: On subnet 192.168.0.254 ignoring browse packet command code 20994 from RRSWAS01VM<01> IP 192.168.0.60 to RAFALS<00>
Apr 4 18:28:31 firewall daemon.err nmbd[796]: Samba name server FIREWALL is now a local master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 4 18:30:00 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 6c:40:08:51:5b:d0
Apr 4 18:30:00 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.156 6c:40:08:51:5b:d0
Apr 4 18:30:01 firewall daemon.info dnsmasq-dhcp[594]: DHCPREQUEST(br0) 192.168.0.156 6c:40:08:51:5b:d0
Apr 4 18:30:01 firewall daemon.info dnsmasq-dhcp[594]: DHCPACK(br0) 192.168.0.156 6c:40:08:51:5b:d0 LILAs-iPhone
Dec 31 18:00:16 firewall user.warn kernel: ufsd: sda1 without journal
Dec 31 18:00:16 firewall user.info hotplug[582]: USB ntfs fs at /dev/sda1 mounted on /tmp/mnt/CAV_EXT_USB
Dec 31 18:00:18 firewall daemon.info dnsmasq-dhcp[594]: DHCPDISCOVER(br0) 192.168.0.185 00:90:a9:db:ac:4a
Dec 31 18:00:18 firewall daemon.info dnsmasq-dhcp[594]: DHCPOFFER(br0) 192.168.0.185 00:90:a9:db:ac:4a
Dec 31 18:00:18 firewall daemon.info dnsmasq-dhcp[594]: DHCPREQUEST(br0) 192.168.0.185 00:90:a9:db:ac:4a
Dec 31 18:00:18 firewall daemon.info dnsmasq-dhcp[594]: DHCPACK(br0) 192.168.0.185 00:90:a9:db:ac:4a WDMyCloud
Dec 31 18:00:18 firewall daemon.info udhcpc[567]: Sending discover...
Zdecydowałem się przetestować scenariusz gdzie serwer DHCP został ograniczony do jednego statycznego adresu dla urządzenia, które nie ma możliwości ustawienia stałego adresu, a musi mieć konkretny adres. W tym celu zmniejszyłem zakres adresów do jednego i włączyłem serwer DHCP w Linksysie. Niestety ten test nie wypalił, bo wszyskie statyczne adresy były dalej przydzielane przez ASUSa. Niemniej jednak log jest z komentarzem.
Apr 6 17:46:14 firewall daemon.err apcupsd[4589]: apcupsd FATAL ERROR in linux-usb.c at line 609 Cannot find UPS device -- For a link to detailed USB trouble shooting information, please see .
Apr 6 17:46:14 firewall daemon.err apcupsd[4589]: apcupsd error shutdown completed
Apr 6 17:46:14 firewall daemon.err nmbd[4747]: Samba server FIREWALL is now a domain master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 6 17:46:29 firewall daemon.err nmbd[4747]: Samba name server FIREWALL is now a local master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 6 18:00:01 firewall cron.info crond[4710]: USER root pid 5718 cmd logger -p syslog.info -- -- MARK --
Apr 6 18:00:01 firewall syslog.info root: -- MARK --
Apr 6 18:22:09 firewall user.notice root: Transmission daemon successfully stoped
Apr 6 18:22:09 firewall daemon.warn dnsmasq[4849]: no servers found in /etc/resolv.dnsmasq, will retry
Apr 6 18:22:09 firewall user.debug kernel: vlan2: del 01:00:5e:00:00:01 mcast address from vlan interface
Apr 6 18:22:09 firewall user.debug kernel: vlan2: del 01:00:5e:00:00:01 mcast address from master interface
Apr 6 18:22:09 firewall user.debug kernel: vlan2: del 33:33:00:00:00:01 mcast address from vlan interface
Apr 6 18:22:09 firewall user.debug kernel: vlan2: del 33:33:00:00:00:01 mcast address from master interface
Apr 6 18:22:09 firewall user.warn kernel: vlan2: Setting MAC address to 00 11 22 33 44 55.
Apr 6 18:22:09 firewall user.debug kernel: vlan2: add 01:00:5e:00:00:01 mcast address to master interface
Apr 6 18:22:09 firewall user.debug kernel: vlan2: add 33:33:00:00:00:01 mcast address to master interface
Apr 6 18:22:10 firewall daemon.info udhcpc[5296]: Unicasting a release of 1.2.3.4 to 69.252.202.20
Apr 6 18:22:10 firewall daemon.info udhcpc[5296]: Sending release...
Apr 6 18:22:10 firewall daemon.err udhcpc[5296]: connect: Network is unreachable
Apr 6 18:22:10 firewall daemon.info udhcpc[5296]: Entering released state
Apr 6 18:22:11 firewall daemon.info udhcpc[5296]: Received SIGTERM
Apr 6 18:22:12 firewall daemon.info udhcpc[6352]: udhcpc (v1.23.2) started
Apr 6 18:22:12 firewall daemon.info udhcpc[6352]: Sending discover...
Apr 6 18:22:12 firewall daemon.info udhcpc[6352]: Sending select for 1.2.3.4...
Apr 6 18:22:12 firewall daemon.info udhcpc[6352]: Lease of 1.2.3.4 obtained, lease time 246338
Apr 6 18:22:12 firewall user.debug dhcpc-event[6370]: 182: pptp peerdns disabled
Apr 6 18:22:18 firewall user.debug init[1]: rstats stopped.
Apr 6 18:22:18 firewall user.debug init[1]: cstats stopped.
Apr 6 18:22:18 firewall user.info init[1]: NGinX - killing daemon
Apr 6 18:22:18 firewall daemon.info dnsmasq[4849]: reading /etc/resolv.dnsmasq
Apr 6 18:22:18 firewall daemon.info dnsmasq[4849]: using nameserver 192.168.0.5#53
Apr 6 18:22:18 firewall daemon.info dnsmasq[4849]: using nameserver 75.75.75.75#53
Apr 6 18:22:18 firewall daemon.info dnsmasq[4849]: using nameserver 75.75.76.76#53
Apr 6 18:22:18 firewall daemon.info dnsmasq[4849]: exiting on receipt of SIGTERM
Apr 6 18:22:18 firewall user.notice root: MySQL successfully stoped
Apr 6 18:22:18 firewall user.debug init[1]: 182: pptp peerdns disabled
Apr 6 18:22:18 firewall daemon.info dnsmasq[6455]: started, version 2.73 cachesize 1500
Apr 6 18:22:18 firewall daemon.info dnsmasq[6455]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset Tomato-helper auth DNSSEC loop-detect no-inotify
Apr 6 18:22:18 firewall daemon.info dnsmasq[6455]: asynchronous logging enabled, queue limit is 5 messages
Apr 6 18:22:18 firewall daemon.info dnsmasq-dhcp[6455]: DHCP, IP range 192.168.0.188 -- 192.168.0.188, lease time 1d
Apr 6 18:22:18 firewall daemon.info dnsmasq[6455]: reading /etc/resolv.dnsmasq
Apr 6 18:22:18 firewall daemon.info dnsmasq[6455]: using nameserver 192.168.0.5#53
Apr 6 18:22:18 firewall daemon.info dnsmasq[6455]: using nameserver 75.75.75.75#53
Apr 6 18:22:18 firewall daemon.info dnsmasq[6455]: using nameserver 75.75.76.76#53
Apr 6 18:22:18 firewall daemon.info dnsmasq[6455]: read /etc/hosts - 2 addresses
Apr 6 18:22:18 firewall daemon.info dnsmasq[6455]: read /etc/dnsmasq/hosts/hosts - 25 addresses
Apr 6 18:22:18 firewall daemon.info dnsmasq-dhcp[6455]: read /etc/dnsmasq/dhcp/dhcp-hosts
Apr 6 18:22:19 firewall daemon.info udhcpc[6467]: Unicasting a release of 1.2.3.4 to 69.252.202.20
Apr 6 18:22:19 firewall daemon.info udhcpc[6467]: Sending release...
Apr 6 18:22:19 firewall daemon.info udhcpc[6467]: Entering released state
Apr 6 18:22:19 firewall daemon.info udhcpc[6467]: Received SIGTERM
Apr 6 18:22:19 firewall user.debug kernel: vlan2: del 33:33:00:00:00:01 mcast address from vlan interface
Apr 6 18:22:19 firewall user.debug kernel: vlan2: del 33:33:00:00:00:01 mcast address from master interface
Apr 6 18:22:19 firewall user.debug kernel: vlan2: del 01:00:5e:00:00:01 mcast address from vlan interface
Apr 6 18:22:19 firewall user.debug kernel: vlan2: del 01:00:5e:00:00:01 mcast address from master interface
Apr 6 18:22:19 firewall user.info kernel: br0: port 3(eth2) entering disabled state
Apr 6 18:22:19 firewall user.info kernel: br0: port 2(eth1) entering disabled state
Apr 6 18:22:19 firewall user.info kernel: br0: port 1(vlan1) entering disabled state
Apr 6 18:22:19 firewall user.info kernel: vlan1: dev_set_promiscuity(master, 1)
Apr 6 18:22:19 firewall user.info kernel: vlan1: dev_set_allmulti(master, 1)
Apr 6 18:22:19 firewall user.debug kernel: vlan1: del 01:00:5e:00:00:01 mcast address from vlan interface
Apr 6 18:22:19 firewall user.debug kernel: vlan1: del 01:00:5e:00:00:01 mcast address from master interface
Apr 6 18:22:19 firewall user.debug kernel: vlan1: del 33:33:00:00:00:01 mcast address from vlan interface
Apr 6 18:22:19 firewall user.debug kernel: vlan1: del 33:33:00:00:00:01 mcast address from master interface
Apr 6 18:22:19 firewall user.info kernel: device vlan1 left promiscuous mode
Apr 6 18:22:19 firewall user.info kernel: br0: port 1(vlan1) entering disabled state
Apr 6 18:22:19 firewall user.info kernel: device eth1 left promiscuous mode
Apr 6 18:22:19 firewall user.info kernel: br0: port 2(eth1) entering disabled state
Apr 6 18:22:19 firewall user.info kernel: device eth2 left promiscuous mode
Apr 6 18:22:19 firewall user.info kernel: br0: port 3(eth2) entering disabled state
Apr 6 18:22:19 firewall user.notice kernel: klogd: exiting
Apr 6 18:22:19 firewall syslog.info syslogd exiting
Apr 6 18:22:19 firewall syslog.info syslogd started: BusyBox v1.23.2
Apr 6 18:22:19 firewall user.notice kernel: klogd started: BusyBox v1.23.2 (2015-10-12 14:02:02 CEST)
Apr 6 18:22:19 firewall user.err syslog: module usbcore not found in modules.dep
Apr 6 18:22:19 firewall user.info hotplug[6565]: USB partition at /dev/sda1 already mounted on /tmp/mnt/CAV_EXT_USB
Apr 6 18:22:20 firewall user.debug kernel: vlan1: add 33:33:00:00:00:01 mcast address to master interface
Apr 6 18:22:20 firewall user.debug kernel: vlan1: add 01:00:5e:00:00:01 mcast address to master interface
Apr 6 18:22:20 firewall user.info kernel: device eth1 entered promiscuous mode
Apr 6 18:22:20 firewall user.info kernel: device eth2 entered promiscuous mode
Apr 6 18:22:20 firewall user.info kernel: br0: port 3(eth2) entering forwarding state
Apr 6 18:22:20 firewall user.info kernel: br0: port 2(eth1) entering forwarding state
Apr 6 18:22:20 firewall user.info kernel: br0: port 1(vlan1) entering forwarding state
Apr 6 18:22:20 firewall daemon.warn dnsmasq[6455]: no servers found in /etc/resolv.dnsmasq, will retry
Apr 6 18:22:20 firewall user.warn kernel: vlan2: Setting MAC address to 00 11 22 33 44 55.
Apr 6 18:22:20 firewall user.debug kernel: vlan2: add 33:33:00:00:00:01 mcast address to master interface
Apr 6 18:22:20 firewall user.debug kernel: vlan2: add 01:00:5e:00:00:01 mcast address to master interface
Apr 6 18:22:21 firewall daemon.info udhcpc[6658]: udhcpc (v1.23.2) started
Apr 6 18:22:21 firewall daemon.info udhcpc[6658]: Sending discover...
Apr 6 18:22:21 firewall daemon.info dnsmasq[6455]: exiting on receipt of SIGTERM
Apr 6 18:22:21 firewall daemon.info udhcpc[6658]: Sending select for 1.2.3.4...
Apr 6 18:22:21 firewall daemon.info dnsmasq[6668]: started, version 2.73 cachesize 1500
Apr 6 18:22:21 firewall daemon.info dnsmasq[6668]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset Tomato-helper auth DNSSEC loop-detect no-inotify
Apr 6 18:22:21 firewall daemon.info dnsmasq[6668]: asynchronous logging enabled, queue limit is 5 messages
Apr 6 18:22:21 firewall daemon.info dnsmasq-dhcp[6668]: DHCP, IP range 192.168.0.188 -- 192.168.0.188, lease time 1d
Apr 6 18:22:21 firewall daemon.warn dnsmasq[6668]: no servers found in /etc/resolv.dnsmasq, will retry
Apr 6 18:22:21 firewall daemon.info dnsmasq[6668]: read /etc/hosts - 2 addresses
Apr 6 18:22:21 firewall daemon.info dnsmasq[6668]: read /etc/dnsmasq/hosts/hosts - 25 addresses
Apr 6 18:22:21 firewall daemon.info dnsmasq-dhcp[6668]: read /etc/dnsmasq/dhcp/dhcp-hosts
Apr 6 18:22:21 firewall daemon.info udhcpc[6658]: Lease of 1.2.3.4 obtained, lease time 246329
Apr 6 18:22:21 firewall user.debug dhcpc-event[6676]: 182: pptp peerdns disabled
Apr 6 18:22:21 firewall daemon.info dnsmasq[6668]: reading /etc/resolv.dnsmasq
Apr 6 18:22:21 firewall daemon.info dnsmasq[6668]: using nameserver 192.168.0.5#53
Apr 6 18:22:21 firewall daemon.info dnsmasq[6668]: using nameserver 75.75.75.75#53
Apr 6 18:22:21 firewall daemon.info dnsmasq[6668]: using nameserver 75.75.76.76#53
Apr 6 18:22:21 firewall cron.info crond[6677]: crond (busybox 1.23.2) started, log level 8
Apr 6 18:22:21 firewall user.notice root: MySQL successfully stoped
Apr 6 18:22:21 firewall user.debug init[1]: starting rstats.
Apr 6 18:22:21 firewall user.debug init[1]: starting cstats.
Apr 6 18:22:22 firewall daemon.err nmbd[6713]: Samba server FIREWALL is now a domain master browser for workgroup RAFALS on subnet UNICAST_SUBNET
Apr 6 18:22:22 firewall user.info init[1]: Asus RT-AC66U: Tomato 1.28.0000 MIPSR2-132 K26AC USB AIO-64K
Apr 6 18:22:22 firewall user.debug init[1]: 182: pptp peerdns disabled
Apr 6 18:22:22 firewall daemon.info dnsmasq[6668]: exiting on receipt of SIGTERM
Apr 6 18:22:22 firewall user.notice root: Transmission daemon successfully stoped
Apr 6 18:22:22 firewall user.notice root: Stoping NFS Server ...
Apr 6 18:22:22 firewall user.notice root: NFS Server stoped ...
Apr 6 18:22:22 firewall daemon.info dnsmasq[6786]: started, version 2.73 cachesize 1500
Apr 6 18:22:22 firewall daemon.info dnsmasq[6786]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset Tomato-helper auth DNSSEC loop-detect no-inotify
Apr 6 18:22:22 firewall daemon.info dnsmasq[6786]: asynchronous logging enabled, queue limit is 5 messages
Apr 6 18:22:22 firewall daemon.info dnsmasq-dhcp[6786]: DHCP, IP range 192.168.0.188 -- 192.168.0.188, lease time 1d
Apr 6 18:22:22 firewall daemon.info dnsmasq[6786]: reading /etc/resolv.dnsmasq
Apr 6 18:22:22 firewall daemon.info dnsmasq[6786]: using nameserver 192.168.0.5#53
Apr 6 18:22:22 firewall daemon.info dnsmasq[6786]: using nameserver 75.75.75.75#53
Apr 6 18:22:22 firewall daemon.info dnsmasq[6786]: using nameserver 75.75.76.76#53
Apr 6 18:22:22 firewall daemon.info dnsmasq[6786]: read /etc/hosts - 2 addresses
Apr 6 18:22:22 firewall daemon.info dnsmasq[6786]: read /etc/dnsmasq/hosts/hosts - 25 addresses
Apr 6 18:22:22 firewall daemon.info dnsmasq-dhcp[6786]: read /etc/dnsmasq/dhcp/dhcp-hosts
Apr 6 18:22:23 firewall user.debug init[1]: 182: pptp peerdns disabled
Apr 6 18:22:23 firewall daemon.info dnsmasq[6786]: exiting on receipt of SIGTERM
Apr 6 18:22:23 firewall daemon.info dnsmasq[6825]: started, version 2.73 cachesize 1500
Apr 6 18:22:23 firewall daemon.info dnsmasq[6825]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset Tomato-helper auth DNSSEC loop-detect no-inotify
Apr 6 18:22:23 firewall daemon.info dnsmasq[6825]: asynchronous logging enabled, queue limit is 5 messages
Apr 6 18:22:23 firewall daemon.info dnsmasq-dhcp[6825]: DHCP, IP range 192.168.0.188 -- 192.168.0.188, lease time 1d
Apr 6 18:22:23 firewall daemon.info dnsmasq[6825]: reading /etc/resolv.dnsmasq
Apr 6 18:22:23 firewall daemon.info dnsmasq[6825]: using nameserver 192.168.0.5#53
Apr 6 18:22:23 firewall daemon.info dnsmasq[6825]: using nameserver 75.75.75.75#53
Apr 6 18:22:23 firewall daemon.info dnsmasq[6825]: using nameserver 75.75.76.76#53
Apr 6 18:22:23 firewall daemon.info dnsmasq[6825]: read /etc/hosts - 2 addresses
Apr 6 18:22:23 firewall daemon.info dnsmasq[6825]: read /etc/dnsmasq/hosts/hosts - 25 addresses
Apr 6 18:22:23 firewall daemon.info dnsmasq-dhcp[6825]: read /etc/dnsmasq/dhcp/dhcp-hosts
Apr 6 18:22:25 firewall user.info ntpc[7059]: Time: Wed, 06 Apr 2016 18:22:25 -0500, no change was needed.
Apr 6 18:22:30 firewall daemon.err apcupsd[6555]: apcupsd FATAL ERROR in linux-usb.c at line 609 Cannot find UPS device -- For a link to detailed USB trouble shooting information, please see .
Apr 6 18:22:30 firewall daemon.err apcupsd[6555]: apcupsd error shutdown completed
Apr 6 18:22:30 firewall daemon.err nmbd[6713]: Samba server FIREWALL is now a domain master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 6 18:22:45 firewall daemon.err nmbd[6713]: Samba name server FIREWALL is now a local master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 6 18:55:31 firewall daemon.info dnsmasq-dhcp[6825]: DHCPREQUEST(br0) 192.168.0.144 00:21:5c:59:04:fd
Apr 6 18:55:31 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.144 00:21:5c:59:04:fd LILA1
Apr 6 19:00:00 firewall cron.info crond[6677]: USER root pid 7697 cmd logger -p syslog.info -- -- MARK --
Apr 6 19:00:00 firewall syslog.info root: -- MARK --
Apr 6 19:37:18 firewall daemon.info dnsmasq-dhcp[6825]: DHCPREQUEST(br0) 192.168.0.188 00:13:b6:0f:9a:4a
Apr 6 19:37:18 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.188 00:13:b6:0f:9a:4a Slingbox-350
Apr 6 19:41:33 firewall daemon.info dnsmasq-dhcp[6825]: DHCPREQUEST(br0) 192.168.0.164 a8:88:08:d5:3c:b6
Apr 6 19:41:33 firewall daemon.info dnsmasq-dhcp[6825]: DHCPNAK(br0) 192.168.0.164 a8:88:08:d5:3c:b6 address not available
Apr 6 19:51:00 firewall cron.info crond[6677]: USER root pid 7990 cmd ntpsync --cron
Apr 6 19:51:00 firewall user.info ntpc[7991]: Time: Wed, 06 Apr 2016 19:51:00 -0500, no change was needed.
Apr 6 20:00:00 firewall syslog.info root: -- MARK --
Apr 6 20:00:00 firewall cron.info crond[6677]: USER root pid 8055 cmd logger -p syslog.info -- -- MARK --
Apr 6 20:09:52 firewall daemon.info dnsmasq-dhcp[6825]: DHCPINFORM(br0) 192.168.0.151 6c:f0:49:b6:5c:97
Apr 6 20:09:52 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.151 6c:f0:49:b6:5c:97 minint-bpohiea
Apr 6 20:09:52 firewall daemon.info dnsmasq-dhcp[6825]: DHCPINFORM(br0) 192.168.0.152 00:04:ac:a3:69:16
Apr 6 20:09:52 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.152 00:04:ac:a3:69:16 minint-bpohiea
Apr 6 20:17:12 firewall daemon.err nmbd[6713]: process_lanman_packet: On subnet 192.168.0.254 ignoring browse packet command code 20994 from RRSWVS02<01> IP 192.168.0.22 to RAFALS<00>
Apr 6 20:23:16 firewall daemon.err nmbd[6713]: process_lanman_packet: On subnet 192.168.0.254 ignoring browse packet command code 20994 from RRSWAS04VM<01> IP 192.168.0.66 to RAFALS<00>
Apr 6 20:25:18 firewall daemon.err nmbd[6713]: process_lanman_packet: On subnet 192.168.0.254 ignoring browse packet command code 20994 from RRSWAS05VM<01> IP 192.168.0.68 to RAFALS<00>
Apr 6 20:35:29 firewall daemon.info dnsmasq-dhcp[6825]: DHCPREQUEST(br0) 192.168.0.140 00:1a:a0:b6:73:71
Apr 6 20:35:29 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.140 00:1a:a0:b6:73:71 KYLE2
Apr 6 21:00:00 firewall syslog.info root: -- MARK --
Apr 6 21:00:00 firewall cron.info crond[6677]: USER root pid 8544 cmd logger -p syslog.info -- -- MARK --
Apr 6 21:00:01 firewall daemon.err nmbd[6713]: process_local_master_announce: Server WDMYCLOUD at IP 192.168.0.185 is announcing itself as a local master browser for workgroup RAFALS and we think we are master. Forcing election.
Apr 6 21:00:01 firewall daemon.err nmbd[6713]: Samba name server FIREWALL has stopped being a local master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 6 21:00:20 firewall daemon.err nmbd[6713]: Samba name server FIREWALL is now a local master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 6 21:09:47 firewall daemon.info dnsmasq-dhcp[6825]: DHCPDISCOVER(br0) 6c:40:08:51:5b:d0 no address available
Apr 6 21:09:49 firewall daemon.info dnsmasq-dhcp[6825]: DHCPREQUEST(br0) 192.168.0.153 6c:40:08:51:5b:d0
Apr 6 21:09:49 firewall daemon.info dnsmasq-dhcp[6825]: DHCPNAK(br0) 192.168.0.153 6c:40:08:51:5b:d0 wrong server-ID
Apr 6 21:28:22 firewall daemon.info dnsmasq-dhcp[6825]: DHCPDISCOVER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 6 21:28:22 firewall daemon.info dnsmasq-dhcp[6825]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 6 21:28:23 firewall daemon.info dnsmasq-dhcp[6825]: DHCPREQUEST(br0) 192.168.0.154 64:52:99:0c:c8:2b
Apr 6 21:28:23 firewall daemon.info dnsmasq-dhcp[6825]: DHCPNAK(br0) 192.168.0.154 64:52:99:0c:c8:2b wrong server-ID
Apr 6 21:58:22 firewall daemon.info dnsmasq-dhcp[6825]: DHCPDISCOVER(br0) 192.168.0.154 64:52:99:0c:c8:2b
Apr 6 21:58:22 firewall daemon.info dnsmasq-dhcp[6825]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 6 21:58:23 firewall daemon.info dnsmasq-dhcp[6825]: DHCPREQUEST(br0) 192.168.0.154 64:52:99:0c:c8:2b
Apr 6 21:58:23 firewall daemon.info dnsmasq-dhcp[6825]: DHCPNAK(br0) 192.168.0.154 64:52:99:0c:c8:2b wrong server-ID
Apr 6 22:00:00 firewall syslog.info root: -- MARK --
I znowu zaczynamy od stanu, gdy router "wisi". I znowu przerwanie połaczenia z Linksysem (access point) wystarcza żeby ASUS wrócił do normalnego stanu.
Apr 7 18:00:00 firewall syslog.info root: -- MARK --
Apr 7 18:00:00 firewall cron.info crond[6677]: USER root pid 13688 cmd logger -p syslog.info -- -- MARK --
Apr 7 18:09:21 firewall daemon.info dnsmasq-dhcp[6825]: DHCPDISCOVER(br0) 192.168.0.154 64:52:99:0c:c8:2b
Apr 7 18:09:21 firewall daemon.info dnsmasq-dhcp[6825]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 7 18:09:22 firewall daemon.info dnsmasq-dhcp[6825]: DHCPREQUEST(br0) 192.168.0.154 64:52:99:0c:c8:2b
Apr 7 18:09:22 firewall daemon.info dnsmasq-dhcp[6825]: DHCPNAK(br0) 192.168.0.154 64:52:99:0c:c8:2b wrong server-ID
Apr 7 18:39:21 firewall daemon.info dnsmasq-dhcp[6825]: DHCPDISCOVER(br0) 192.168.0.154 64:52:99:0c:c8:2b
Apr 7 18:39:21 firewall daemon.info dnsmasq-dhcp[6825]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 7 18:39:21 firewall daemon.info dnsmasq-dhcp[6825]: DHCPREQUEST(br0) 192.168.0.154 64:52:99:0c:c8:2b
Apr 7 18:39:21 firewall daemon.info dnsmasq-dhcp[6825]: DHCPNAK(br0) 192.168.0.154 64:52:99:0c:c8:2b wrong server-ID
Apr 7 19:00:00 firewall syslog.info root: -- MARK --
Apr 7 19:00:00 firewall cron.info crond[6677]: USER root pid 13865 cmd logger -p syslog.info -- -- MARK --
Apr 7 19:09:22 firewall daemon.info dnsmasq-dhcp[6825]: DHCPDISCOVER(br0) 192.168.0.154 64:52:99:0c:c8:2b
Apr 7 19:09:22 firewall daemon.info dnsmasq-dhcp[6825]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 7 19:09:23 firewall daemon.info dnsmasq-dhcp[6825]: DHCPREQUEST(br0) 192.168.0.154 64:52:99:0c:c8:2b
Apr 7 19:09:23 firewall daemon.info dnsmasq-dhcp[6825]: DHCPNAK(br0) 192.168.0.154 64:52:99:0c:c8:2b wrong server-ID
Apr 7 19:23:11 firewall daemon.info dnsmasq-dhcp[6825]: DHCPINFORM(br0) 192.168.0.140 00:1a:a0:b6:73:71
Apr 7 19:23:11 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.140 00:1a:a0:b6:73:71 KYLE2
Apr 7 19:23:14 firewall daemon.info dnsmasq-dhcp[6825]: DHCPINFORM(br0) 192.168.0.140 00:1a:a0:b6:73:71
Apr 7 19:23:14 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.140 00:1a:a0:b6:73:71 KYLE2
Apr 7 19:24:29 firewall daemon.info dnsmasq-dhcp[6825]: DHCPINFORM(br0) 192.168.0.140 00:1a:a0:b6:73:71
Apr 7 19:24:29 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.140 00:1a:a0:b6:73:71 KYLE2
Apr 7 19:24:32 firewall daemon.info dnsmasq-dhcp[6825]: DHCPINFORM(br0) 192.168.0.140 00:1a:a0:b6:73:71
Apr 7 19:24:32 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.140 00:1a:a0:b6:73:71 KYLE2
Apr 7 19:26:18 firewall daemon.info dnsmasq-dhcp[6825]: DHCPINFORM(br0) 192.168.0.140 00:1a:a0:b6:73:71
Apr 7 19:26:18 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.140 00:1a:a0:b6:73:71 KYLE2
Apr 7 19:26:21 firewall daemon.info dnsmasq-dhcp[6825]: DHCPINFORM(br0) 192.168.0.140 00:1a:a0:b6:73:71
Apr 7 19:26:21 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.140 00:1a:a0:b6:73:71 KYLE2
Apr 7 19:36:09 firewall daemon.info dnsmasq-dhcp[6825]: DHCPINFORM(br0) 192.168.0.140 00:1a:a0:b6:73:71
Apr 7 19:36:09 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.140 00:1a:a0:b6:73:71 KYLE2
Apr 7 19:36:12 firewall daemon.info dnsmasq-dhcp[6825]: DHCPINFORM(br0) 192.168.0.140 00:1a:a0:b6:73:71
Apr 7 19:36:12 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.140 00:1a:a0:b6:73:71 KYLE2
Apr 7 19:37:57 firewall daemon.info dnsmasq-dhcp[6825]: DHCPINFORM(br0) 192.168.0.140 00:1a:a0:b6:73:71
Apr 7 19:37:57 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.140 00:1a:a0:b6:73:71 KYLE2
Apr 7 19:38:00 firewall daemon.info dnsmasq-dhcp[6825]: DHCPINFORM(br0) 192.168.0.140 00:1a:a0:b6:73:71
Apr 7 19:38:00 firewall daemon.info dnsmasq-dhcp[6825]: DHCPACK(br0) 192.168.0.140 00:1a:a0:b6:73:71 KYLE2
Apr 7 19:39:22 firewall daemon.info dnsmasq-dhcp[6825]: DHCPDISCOVER(br0) 192.168.0.154 64:52:99:0c:c8:2b
Apr 7 19:39:22 firewall daemon.info dnsmasq-dhcp[6825]: DHCPOFFER(br0) 192.168.0.145 64:52:99:0c:c8:2b
Apr 7 19:39:23 firewall daemon.info dnsmasq-dhcp[6825]: DHCPREQUEST(br0) 192.168.0.154 64:52:99:0c:c8:2b
Apr 7 19:39:23 firewall daemon.info dnsmasq-dhcp[6825]: DHCPNAK(br0) 192.168.0.154 64:52:99:0c:c8:2b wrong server-ID
[color=#0000ff]
Apr 7 19:49:55 firewall daemon.err nmbd[6713]: process_local_master_announce: Server RRSWAS01VM at IP 192.168.0.60 is announcing itself as a local master browser for workgroup RAFALS and we think we are master. Forcing election.
Apr 7 19:49:55 firewall daemon.err nmbd[6713]: Samba name server FIREWALL has stopped being a local master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 7 19:50:00 firewall daemon.err nmbd[6713]: process_lanman_packet: On subnet 192.168.0.254 ignoring browse packet command code 20994 from RRSWVS02<01> IP 192.168.0.22 to RAFALS<00>
Apr 7 19:50:01 firewall daemon.err nmbd[6713]: process_lanman_packet: On subnet 192.168.0.254 ignoring browse packet command code 20994 from RRSWAS01VM<01> IP 192.168.0.60 to RAFALS<00>
Apr 7 19:50:13 firewall daemon.err nmbd[6713]: Samba name server FIREWALL is now a local master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 7 19:51:00 firewall cron.info crond[6677]: USER root pid 14013 cmd ntpsync --cron
Apr 7 19:50:59 firewall user.info ntpc[14014]: Time Updated: Thu, 07 Apr 2016 19:50:59 -0500 [-1s]
Apr 7 19:53:19 firewall daemon.err nmbd[6713]: process_lanman_packet: On subnet 192.168.0.254 ignoring browse packet command code 20994 from RRSWAS01VM<01> IP 192.168.0.60 to RAFALS<00>
Apr 7 19:53:19 firewall daemon.err nmbd[6713]: process_local_master_announce: Server RRSWAS04VM at IP 192.168.0.66 is announcing itself as a local master browser for workgroup RAFALS and we think we are master. Forcing election.
Apr 7 19:53:19 firewall daemon.err nmbd[6713]: Samba name server FIREWALL has stopped being a local master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 7 19:53:20 firewall daemon.err nmbd[6713]: process_lanman_packet: On subnet 192.168.0.254 ignoring browse packet command code 20994 from RRSWVS02<01> IP 192.168.0.22 to RAFALS<00>
Apr 7 19:53:38 firewall daemon.err nmbd[6713]: Samba name server FIREWALL is now a local master browser for workgroup RAFALS on subnet 192.168.0.254
Apr 7 20:00:00 firewall cron.info crond[6677]: USER root pid 14047 cmd logger -p syslog.info -- -- MARK --
Apr 7 20:00:00 firewall syslog.info root: -- MARK --
Apr 7 20:00:53 firewall user.notice root: Transmission daemon successfully stoped
Apr 7 20:00:53 firewall user.debug kernel: vlan2: del 01:00:5e:00:00:01 mcast address from vlan interface
Apr 7 20:00:53 firewall user.debug kernel: vlan2: del 01:00:5e:00:00:01 mcast address from master interface
Apr 7 20:00:53 firewall user.debug kernel: vlan2: del 33:33:00:00:00:01 mcast address from vlan interface
Apr 7 20:00:53 firewall user.debug kernel: vlan2: del 33:33:00:00:00:01 mcast address from master interface
Apr 7 20:00:53 firewall user.warn kernel: vlan2: Setting MAC address to 00 11 22 33 44 55.
Apr 7 20:00:53 firewall user.debug kernel: vlan2: add 01:00:5e:00:00:01 mcast address to master interface
Apr 7 20:00:53 firewall daemon.warn dnsmasq[6825]: no servers found in /etc/resolv.dnsmasq, will retry
Apr 7 20:00:53 firewall user.debug kernel: vlan2: add 33:33:00:00:00:01 mcast address to master interface
Apr 7 20:00:54 firewall daemon.info udhcpc[7299]: Unicasting a release of 1.2.3.4 to 69.252.202.20
Apr 7 20:00:54 firewall daemon.info udhcpc[7299]: Sending release...
Apr 7 20:00:54 firewall daemon.err udhcpc[7299]: connect: Network is unreachable
Apr 7 20:00:54 firewall daemon.info udhcpc[7299]: Entering released state
Apr 7 20:00:55 firewall daemon.info udhcpc[7299]: Received SIGTERM
Apr 7 20:00:55 firewall daemon.info udhcpc[14209]: udhcpc (v1.23.2) started
Apr 7 20:00:55 firewall daemon.info udhcpc[14209]: Sending discover...
Apr 7 20:00:55 firewall daemon.info udhcpc[14209]: Sending select for 1.2.3.4...
Apr 7 20:00:55 firewall daemon.info udhcpc[14209]: Lease of 1.2.3.4 obtained, lease time 337412
Apr 7 20:00:55 firewall user.debug dhcpc-event[14229]: 182: pptp peerdns disabled
Apr 7 20:01:00 firewall daemon.info dnsmasq[6825]: reading /etc/resolv.dnsmasq
Apr 7 20:01:00 firewall daemon.info dnsmasq[6825]: using nameserver 192.168.0.5#53
Apr 7 20:01:00 firewall daemon.info dnsmasq[6825]: using nameserver 75.75.75.75#53
Apr 7 20:01:00 firewall daemon.info dnsmasq[6825]: using nameserver 75.75.76.76#53
Apr 7 20:01:02 firewall user.debug init[1]: rstats stopped.
Apr 7 20:01:03 firewall user.debug init[1]: cstats stopped.
Apr 7 20:01:03 firewall user.info init[1]: NGinX - killing daemon
Apr 7 20:01:03 firewall daemon.info dnsmasq[6825]: exiting on receipt of SIGTERM
Apr 7 20:01:03 firewall user.notice root: MySQL successfully stoped
Apr 7 20:01:03 firewall user.debug init[1]: 182: pptp peerdns disabled
Apr 7 20:01:03 firewall daemon.info dnsmasq[14308]: started, version 2.73 cachesize 1500
Apr 7 20:01:03 firewall daemon.info dnsmasq[14308]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset Tomato-helper auth DNSSEC loop-detect no-inotify
Apr 7 20:01:03 firewall daemon.info dnsmasq[14308]: asynchronous logging enabled, queue limit is 5 messages
Apr 7 20:01:03 firewall daemon.info dnsmasq-dhcp[14308]: DHCP, IP range 192.168.0.150 -- 192.168.0.174, lease time 1d
Apr 7 20:01:03 firewall daemon.info dnsmasq[14308]: reading /etc/resolv.dnsmasq
Apr 7 20:01:03 firewall daemon.info dnsmasq[14308]: using nameserver 192.168.0.5#53
Apr 7 20:01:03 firewall daemon.info dnsmasq[14308]: using nameserver 75.75.75.75#53
Apr 7 20:01:03 firewall daemon.info dnsmasq[14308]: using nameserver 75.75.76.76#53
Apr 7 20:01:03 firewall daemon.info dnsmasq[14308]: read /etc/hosts - 2 addresses
Apr 7 20:01:03 firewall daemon.info dnsmasq[14308]: read /etc/dnsmasq/hosts/hosts - 25 addresses
Apr 7 20:01:03 firewall daemon.info dnsmasq-dhcp[14308]: read /etc/dnsmasq/dhcp/dhcp-hosts
Apr 7 20:01:04 firewall daemon.info udhcpc[14320]: Unicasting a release of 1.2.3.4 to 69.252.202.20
Apr 7 20:01:04 firewall daemon.info udhcpc[14320]: Sending release...
Apr 7 20:01:04 firewall daemon.info udhcpc[14320]: Entering released state
Apr 7 20:01:04 firewall daemon.info udhcpc[14320]: Received SIGTERM
Apr 7 20:01:04 firewall user.debug kernel: vlan2: del 33:33:00:00:00:01 mcast address from vlan interface
Apr 7 20:01:04 firewall user.debug kernel: vlan2: del 33:33:00:00:00:01 mcast address from master interface
Apr 7 20:01:04 firewall user.debug kernel: vlan2: del 01:00:5e:00:00:01 mcast address from vlan interface
Apr 7 20:01:04 firewall user.debug kernel: vlan2: del 01:00:5e:00:00:01 mcast address from master interface
Apr 7 20:01:04 firewall user.info kernel: br0: port 3(eth2) entering disabled state
Apr 7 20:01:04 firewall user.info kernel: br0: port 2(eth1) entering disabled state
Apr 7 20:01:04 firewall user.info kernel: br0: port 1(vlan1) entering disabled state
Apr 7 20:01:04 firewall user.info kernel: vlan1: dev_set_promiscuity(master, 1)
Apr 7 20:01:04 firewall user.info kernel: vlan1: dev_set_allmulti(master, 1)
Apr 7 20:01:04 firewall user.debug kernel: vlan1: del 01:00:5e:00:00:01 mcast address from vlan interface
Apr 7 20:01:04 firewall user.debug kernel: vlan1: del 01:00:5e:00:00:01 mcast address from master interface
Apr 7 20:01:04 firewall user.debug kernel: vlan1: del 33:33:00:00:00:01 mcast address from vlan interface
Apr 7 20:01:04 firewall user.debug kernel: vlan1: del 33:33:00:00:00:01 mcast address from master interface
Apr 7 20:01:04 firewall user.info kernel: device vlan1 left promiscuous mode
Apr 7 20:01:04 firewall user.info kernel: br0: port 1(vlan1) entering disabled state
Apr 7 20:01:04 firewall user.info kernel: device eth1 left promiscuous mode
Apr 7 20:01:04 firewall user.info kernel: br0: port 2(eth1) entering disabled state
Apr 7 20:01:04 firewall user.info kernel: device eth2 left promiscuous mode
Apr 7 20:01:04 firewall user.info kernel: br0: port 3(eth2) entering disabled state
Apr 7 20:01:04 firewall user.notice kernel: klogd: exiting
Apr 7 20:01:04 firewall syslog.info syslogd exiting
Apr 7 20:01:04 firewall syslog.info syslogd started: BusyBox v1.23.2
Apr 7 20:01:04 firewall user.notice kernel: klogd started: BusyBox v1.23.2 (2015-10-12 14:02:02 CEST)
Apr 7 20:01:04 firewall user.err syslog: module usbcore not found in modules.dep
Apr 7 20:01:05 firewall user.info hotplug[14413]: USB partition at /dev/sda1 already mounted on /tmp/mnt/CAV_EXT_USB
Apr 7 20:01:05 firewall user.debug kernel: vlan1: add 33:33:00:00:00:01 mcast address to master interface
Apr 7 20:01:05 firewall user.debug kernel: vlan1: add 01:00:5e:00:00:01 mcast address to master interface
Apr 7 20:01:05 firewall user.info kernel: device eth1 entered promiscuous mode
Apr 7 20:01:05 firewall user.info kernel: device eth2 entered promiscuous mode
Apr 7 20:01:05 firewall user.info kernel: br0: port 3(eth2) entering forwarding state
Apr 7 20:01:05 firewall user.info kernel: br0: port 2(eth1) entering forwarding state
Apr 7 20:01:05 firewall user.info kernel: br0: port 1(vlan1) entering forwarding state
Apr 7 20:01:05 firewall daemon.warn dnsmasq[14308]: no servers found in /etc/resolv.dnsmasq, will retry
Apr 7 20:01:05 firewall user.warn kernel: vlan2: Setting MAC address to 00 11 22 33 44 55.
Apr 7 20:01:05 firewall user.debug kernel: vlan2: add 33:33:00:00:00:01 mcast address to master interface
Apr 7 20:01:05 firewall user.debug kernel: vlan2: add 01:00:5e:00:00:01 mcast address to master interface
Apr 7 20:01:06 firewall daemon.info udhcpc[14512]: udhcpc (v1.23.2) started
Apr 7 20:01:06 firewall daemon.info udhcpc[14512]: Sending discover...
Apr 7 20:01:06 firewall daemon.info dnsmasq[14308]: exiting on receipt of SIGTERM
Apr 7 20:01:06 firewall daemon.info udhcpc[14512]: Sending select for 1.2.3.4...
Apr 7 20:01:06 firewall daemon.info dnsmasq[14522]: started, version 2.73 cachesize 1500
Apr 7 20:01:06 firewall daemon.info dnsmasq[14522]: compile time options: IPv6 GNU-getopt no-RTC no-DBus no-i18n no-IDN DHCP DHCPv6 no-Lua TFTP no-conntrack ipset Tomato-helper auth DNSSEC loop-detect no-inotify
Apr 7 20:01:06 firewall daemon.info dnsmasq[14522]: asynchronous logging enabled, queue limit is 5 messages
Apr 7 20:01:06 firewall daemon.info dnsmasq-dhcp[14522]: DHCP, IP range 192.168.0.150 -- 192.168.0.174, lease time 1d
Apr 7 20:01:06 firewall daemon.warn dnsmasq[14522]: no servers found in /etc/resolv.dnsmasq, will retry
Apr 7 20:01:06 firewall daemon.info dnsmasq[14522]: read /etc/hosts - 2 addresses
Apr 7 20:01:06 firewall daemon.info dnsmasq[14522]: read /etc/dnsmasq/hosts/hosts - 25 addresses
Apr 7 20:01:06 firewall daemon.info dnsmasq-dhcp[14522]: read /etc/dnsmasq/dhcp/dhcp-hosts
Apr 7 20:01:06 firewall daemon.info udhcpc[14512]: Lease of 1.2.3.4 obtained, lease time 337401
Apr 7 20:01:06 firewall user.debug dhcpc-event[14530]: 182: pptp peerdns disabled
Apr 7 20:01:06 firewall daemon.info dnsmasq[14522]: reading /etc/resolv.dnsmasq
Apr 7 20:01:06 firewall daemon.info dnsmasq[14522]: using nameserver 192.168.0.5#53
Apr 7 20:01:06 firewall daemon.info dnsmasq[14522]: using nameserver 75.75.75.75#53
Apr 7 20:01:06 firewall daemon.info dnsmasq[14522]: using nameserver 75.75.76.76#53
Apr 7 20:01:06 firewall cron.info crond[14531]: crond (busybox 1.23.2) started, log level 8
Apr 7 20:01:06 firewall user.notice root: MySQL successfully stoped
Apr 7 20:01:06 firewall user.debug init[1]: starting rstats.
Apr 7 20:01:06 firewall user.debug init[1]: starting cstats.
Apr 7 20:01:07 firewall daemon.err nmbd[14577]: Samba server FIREWALL is now a domain master browser for workgroup RAFALS on subnet UNICAST_SUBNET
Apr 7 20:01:07 firewall user.info init[1]: Asus RT-AC66U: Tomato 1.28.0000 MIPSR2-132 K26AC USB AIO-64K
Apr 7 20:01:07 firewall user.debug init[1]: 182: pptp peerdns disabled
Apr 7 20:01:07 firewall daemon.info dnsmasq[14522]: exiting on receipt of SIGTERM
Apr 7 20:01:07 firewall user.notice root: Transmission daemon successfully stoped
Apr 7 20:01:07 firewall user.notice root: Stoping NFS Server ...
Apr 7 20:0