[I] Jan 1 00:00:04 kernel: PPP generic driver version 2.4.2 [I] Jan 1 00:00:04 kernel: PPP MPPE Compression module registered [I] Jan 1 00:00:04 kernel: NET: Registered protocol family 24 [I] Jan 1 00:00:04 kernel: PPTP driver version 0.8.5 [I] Jan 1 00:00:04 kernel: mips_wdt: watchdog timer activated with 30 second delay [I] Jan 1 00:00:04 kernel: Netfilter messages via NETLINK v0.30. [I] Jan 1 00:00:04 kernel: nf_conntrack version 0.5.0 (64512 buckets, 129024 max) [I] Jan 1 00:00:04 kernel: ctnetlink v0.93: registering with nfnetlink. [I] Jan 1 00:00:04 kernel: Fast NAT loaded [I] Jan 1 00:00:04 kernel: ip_set: protocol 6 [I] Jan 1 00:00:04 kernel: ipip: IPv4 and MPLS over IPv4 tunneling driver [I] Jan 1 00:00:04 kernel: gre: GRE over IPv4 demultiplexor driver [I] Jan 1 00:00:04 kernel: ip_tables: (C) 2000-2006 Netfilter Core Team [I] Jan 1 00:00:04 kernel: NET: Registered protocol family 10 [I] Jan 1 00:00:04 kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team [I] Jan 1 00:00:04 kernel: NET: Registered protocol family 17 [I] Jan 1 00:00:04 kernel: ubridge: Tiny bridge driver, 1.2 [I] Jan 1 00:00:04 kernel: 8021q: 802.1Q VLAN Support v1.8 [I] Jan 1 00:00:04 kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:12. [I] Jan 1 00:00:04 kernel: Freeing unused kernel memory: 244K [I] Jan 1 00:00:04 kernel: This architecture does not have kernel memory protection. [I] Jan 1 00:00:04 kernel: RNG reseed started [I] Jan 1 00:00:04 kernel: random: crng init done [I] Jan 1 00:00:04 kernel: RNG reseeded [I] Jan 1 00:00:04 ndm: Core::Main: *** [I] Jan 1 00:00:04 ndm: Core::Main: *** Network Device Manager 3.08.C.3.0-0. [I] Jan 1 00:00:04 ndm: Core::Main: *** Built Jul 8 2022 19:32:30. [I] Jan 1 00:00:04 ndm: Core::Main: *** [I] Jan 1 00:00:05 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nf_nat_proto_gre.ko. [I] Jan 1 00:00:05 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/usb-common.ko. [I] Jan 1 00:00:05 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/tsmb.ko. [W] Jan 1 00:00:06 kernel: tsmb: loading out-of-tree module taints kernel. [W] Jan 1 00:00:06 kernel: tsmb: module license 'Proprietary' taints kernel. [W] Jan 1 00:00:06 kernel: Disabling lock debugging due to kernel taint [I] Jan 1 00:00:06 kernel: Loading TSMB module version 3020.9.24.13. [I] Jan 1 00:00:06 kernel: Built against headers 4.9-ndm-5 SMP mips [I] Jan 1 00:00:06 kernel: Running on kernel 4.9-ndm-5 #0 SMP Fri Jul 8 19:32:30 2022 mips [I] Jan 1 00:00:06 kernel: TSMB module version 3020.9.24.13 loaded. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/crypto_null.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/udp_tunnel.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/scsi_mod.ko. [I] Jan 1 00:00:06 kernel: SCSI subsystem initialized [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/bluetooth.ko. [I] Jan 1 00:00:06 kernel: Bluetooth: Core ver 2.22 [I] Jan 1 00:00:06 kernel: NET: Registered protocol family 31 [I] Jan 1 00:00:06 kernel: Bluetooth: HCI device and connection manager initialized [I] Jan 1 00:00:06 kernel: Bluetooth: HCI socket layer initialized [I] Jan 1 00:00:06 kernel: Bluetooth: L2CAP socket layer initialized [I] Jan 1 00:00:06 kernel: Bluetooth: SCO socket layer initialized [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/zlib_inflate.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/ip_gre.ko. [I] Jan 1 00:00:06 kernel: ip_gre: GRE over IPv4 tunneling driver [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/ndm_storage.ko. [I] Jan 1 00:00:06 kernel: Searching for suitable storage partitions... [I] Jan 1 00:00:06 kernel: Found 1st storage partition of size 16515072 bytes [I] Jan 1 00:00:06 kernel: Found 2nd storage partition of size 18874368 bytes [I] Jan 1 00:00:06 kernel: Registering UBI data partitions parser [W] Jan 1 00:00:06 kernel: Concatenating MTD devices: [W] Jan 1 00:00:06 kernel: (0): "Storage_A" [W] Jan 1 00:00:06 kernel: (1): "Storage_B" [W] Jan 1 00:00:06 kernel: into device "NDM combined UBI partition" [I] Jan 1 00:00:06 kernel: 1 ndmubipart partitions found on MTD device NDM combined UBI partition [I] Jan 1 00:00:06 kernel: mtd: creating 1 MTD partitions on "NDM combined UBI partition": [I] Jan 1 00:00:06 kernel: 0x000000000000-0x0000021c0000 : "Storage" [I] Jan 1 00:00:06 kernel: Merging storage partitions OK [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nf_conntrack_rtsp.ko. [I] Jan 1 00:00:06 kernel: nf_conntrack_rtsp v0.7 loading [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/mbcache.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/phr.ko. [I] Jan 1 00:00:06 kernel: phr: NDM I/O Peripheral Driver, v2.4.11 [I] Jan 1 00:00:06 kernel: phr: "KN-1011" profile driver loaded [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nf_conntrack_proto_gre.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/sch_cake.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/xxhash.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/ip6_udp_tunnel.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nls_base.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/jbd2.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/zlib_deflate.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nf_conntrack_h323.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/mtdoops_proc.ko. [I] Jan 1 00:00:06 kernel: mtdoops_proc: Attached to MTD device 6 [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/resetnds.ko. [I] Jan 1 00:00:06 kernel: resetnds: Module loaded. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/cdrom.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/crc32c_generic.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nf_conntrack_pptp.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/usbcore.ko. [I] Jan 1 00:00:06 kernel: usbcore: registered new interface driver usbfs [I] Jan 1 00:00:06 kernel: usbcore: registered new interface driver hub [I] Jan 1 00:00:06 kernel: usbcore: registered new device driver usb [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nf_nat_h323.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nf_nat_pptp.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/usbserial.ko. [I] Jan 1 00:00:06 kernel: usbcore: registered new interface driver usbserial [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/aead.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/zstd_compress.ko. [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/l2tp_core.ko. [I] Jan 1 00:00:06 kernel: l2tp_core: L2TP core driver, V2.0 [I] Jan 1 00:00:06 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/cdc-wdm.ko. [I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver cdc_wdm [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/jffs2.ko. [I] Jan 1 00:00:07 kernel: jffs2: version 2.2. (NAND) (c) 2001-2006 Red Hat, Inc. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/tntfs.ko. [I] Jan 1 00:00:07 kernel: Tuxera NTFS driver 3021.4.23.11 [Flags: R/W MODULE]. [I] Jan 1 00:00:07 kernel: Built against headers 4.9-ndm-5 SMP mips [I] Jan 1 00:00:07 kernel: Running on kernel 4.9-ndm-5 #0 SMP Fri Jul 8 19:32:30 2022 mips [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nls_cp866.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/deflate.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/zstd_decompress.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/tfat.ko. [I] Jan 1 00:00:07 kernel: Tuxera FAT 12/16/32 driver version 3021.3.22.24 [Flags: R/W MODULE]. [I] Jan 1 00:00:07 kernel: Built against headers 4.9-ndm-5 SMP mips [I] Jan 1 00:00:07 kernel: Running on kernel 4.9-ndm-5 #0 SMP Fri Jul 8 19:32:30 2022 mips [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/ext4.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/usbnet.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/sg.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/sierra.ko. [I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver sierra [I] Jan 1 00:00:07 kernel: usbserial: USB Serial support registered for Sierra USB modem [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nls_cp437.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/sr_mod.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/sd_mod.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/btmtk_uart.ko. [I] Jan 1 00:00:07 kernel: btmtk_uart: MediaTek Bluetooth UART driver, v7.0.20120401 [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/usblp.ko. [I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver usblp [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/l2tp_ppp.ko. [I] Jan 1 00:00:07 kernel: l2tp_ppp: PPPoL2TP kernel driver, V2.0 [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/cdc-acm.ko. [I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver cdc_acm [I] Jan 1 00:00:07 kernel: cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/usb-storage.ko. [I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver usb-storage [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nls_cp1251.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nf_nat_rtsp.ko. [I] Jan 1 00:00:07 kernel: nf_nat_rtsp v0.7 loading [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/thfsplus.ko. [I] Jan 1 00:00:07 kernel: Tuxera HFS+ driver 3021.12.17 [I] Jan 1 00:00:07 kernel: Built against headers 4.9-ndm-5 SMP mips [I] Jan 1 00:00:07 kernel: Running on kernel 4.9-ndm-5 #0 SMP Fri Jul 8 19:32:30 2022 mips [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/kalmia.ko. [I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver kalmia [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/zstd.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nls_utf8.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/exfat.ko. [I] Jan 1 00:00:07 kernel: exFAT: file-system version 5.9-6ndm [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/usbextras.ko. [I] Jan 1 00:00:07 kernel: usbextras: loaded [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/usb_wwan.ko. [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/cdc_ncm.ko. [I] Jan 1 00:00:07 kernel: usbcore: registered new interface driver cdc_ncm [I] Jan 1 00:00:07 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/option.ko. [I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver option [I] Jan 1 00:00:08 kernel: usbserial: USB Serial support registered for GSM modem (1-port) [I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/qmi_wwan.ko. [I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver qmi_wwan [I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/huawei_cdc_ncm.ko. [I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver huawei_cdc_ncm [I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/cdc_ether.ko. [I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver cdc_ether [I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/qcserial.ko. [I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver qcserial [I] Jan 1 00:00:08 kernel: usbserial: USB Serial support registered for Qualcomm USB modem [I] Jan 1 00:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/rndis_host.ko. [I] Jan 1 00:00:08 kernel: usbcore: registered new interface driver rndis_host [I] Jan 1 00:00:08 ndm: Core::System::Mtd::Table: current firmware image index is 2. [I] Jan 1 00:00:08 ndm: Core::FileSystem::Temp: mounting /var/... [I] Jan 1 00:00:08 ndm: Core::Authenticator: MD5 generator created. [I] Jan 1 00:00:08 ndm: Core::Authenticator: NT generator created. [I] Jan 1 00:00:08 ndm: Core::Authenticator: "readonly" tag registered. [I] Jan 1 00:00:08 ndm: Core::FileSystem::Dynamic: "ndm:": registered "log" node. [I] Jan 1 00:00:08 ndm: Core::FileSystem::Dynamic: "ndm:": registered "running-config" node. [I] Jan 1 00:00:08 ndm: Core::FileSystem::Dynamic: "ndm:": registered "sharing-config" node. [I] Jan 1 00:00:08 ndm: Core::FileSystem::Dynamic: "ndm:": registered "self-test" node. [I] Jan 1 00:00:08 ndm: Core::System::Hostname: the host name set. [I] Jan 1 00:00:08 ndm: Core::System::Timezone: building a timezone list... [I] Jan 1 00:00:08 ndm: Core::System::Timezone: scanning done, 311 localities available. [I] Jan 1 03:00:08 ndm: Core::System::Timezone: "Europe/Moscow" locality set as default. [I] Jan 1 03:00:08 ndm: Telnet::Server: bruteforce detection is enabled. [I] Jan 1 03:00:08 ndm: Ntp::Client: configuration reset. [I] Jan 1 03:00:08 ndm: Http::Manager: bruteforce detection is enabled. [I] Jan 1 03:00:08 ndm: Core::Authenticator: "http" tag registered. [I] Jan 1 03:00:08 ndm: Core::Authenticator: "http-proxy" tag registered. [I] Jan 1 03:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nacct.ko. [I] Jan 1 03:00:08 kernel: nacct: init, v 2.4 [I] Jan 1 03:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/mt7621_eth.ko. [I] Jan 1 03:00:08 kernel: mt7621_eth: NDM Ethernet Switch Driver for MediaTek MT7621, v1.3.12 [I] Jan 1 03:00:08 kernel: mt7621_eth: MT7621 SoC, TX/RX descriptors: 1024/1024, NAPI weight 64 [I] Jan 1 03:00:08 kernel: mt7621_eth: eth2 created for GMAC1 (50:ff:20:78:b0:1b address, 4 EPHY ports) [I] Jan 1 03:00:08 kernel: mt7621_eth: eth3 created for GMAC2 (50:ff:20:78:b0:1c address, 1 EPHY port) [I] Jan 1 03:00:08 kernel: mt7621_eth: MT7530 switch initialized [I] Jan 1 03:00:08 ndm: Network::Interface::Base: "GigabitEthernet0": interface is down. [I] Jan 1 03:00:08 ndm: Network::Interface::Mac: "GigabitEthernet0": backed up the default address 50:ff:20:78:b0:1b of "GigabitEthernet0" before changing. [I] Jan 1 03:00:08 ndm: Network::Interface::Repository: "GigabitEthernet0" interface created. [I] Jan 1 03:00:08 ndm: Network::Interface::Base: "GigabitEthernet0/0": interface is down. [I] Jan 1 03:00:08 ndm: Network::Interface::Repository: "GigabitEthernet0/0" interface created. [I] Jan 1 03:00:08 ndm: Network::Interface::Base: "GigabitEthernet0/1": interface is down. [I] Jan 1 03:00:08 ndm: Network::Interface::Repository: "GigabitEthernet0/1" interface created. [I] Jan 1 03:00:08 ndm: Network::Interface::Base: "GigabitEthernet0/2": interface is down. [I] Jan 1 03:00:08 ndm: Network::Interface::Repository: "GigabitEthernet0/2" interface created. [I] Jan 1 03:00:08 ndm: Network::Interface::Base: "GigabitEthernet0/3": interface is down. [I] Jan 1 03:00:08 ndm: Network::Interface::Repository: "GigabitEthernet0/3" interface created. [I] Jan 1 03:00:08 ndm: Network::Interface::Base: "GigabitEthernet1": interface is down. [I] Jan 1 03:00:08 ndm: Network::Interface::Base: "GigabitEthernet1": network MTU reset to default. [I] Jan 1 03:00:08 ndm: Network::Interface::Repository: "GigabitEthernet1" interface created. [I] Jan 1 03:00:08 ndm: Network::Interface::Base: "GigabitEthernet1/0": interface is down. [I] Jan 1 03:00:08 ndm: Network::Interface::Repository: "GigabitEthernet1/0" interface created. [I] Jan 1 03:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/ubi.ko. [I] Jan 1 03:00:08 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/ubifs.ko. [W] Jan 1 03:00:09 kernel: ubi0: attaching mtd17 [W] Jan 1 03:00:09 kernel: ubi0: scanning is finished [W] Jan 1 03:00:09 kernel: ubi0: attached mtd17 (name "Storage", size 33 MiB) [W] Jan 1 03:00:09 kernel: ubi0: PEB size: 131072 bytes (128 KiB), LEB size: 126976 bytes [W] Jan 1 03:00:09 kernel: ubi0: min./max. I/O unit sizes: 2048/2048, sub-page size 2048 [W] Jan 1 03:00:09 kernel: ubi0: VID header offset: 2048 (aligned 2048), data offset: 4096 [W] Jan 1 03:00:09 kernel: ubi0: good PEBs: 268, bad PEBs: 2, corrupted PEBs: 0 [W] Jan 1 03:00:09 kernel: ubi0: user volume: 1, internal volumes: 1, max. volumes count: 128 [W] Jan 1 03:00:09 kernel: ubi0: max/mean erase counter: 2/1, WL threshold: 2048, image sequence number: 3096282607 [W] Jan 1 03:00:09 kernel: ubi0: available PEBs: 0, total reserved PEBs: 268, PEBs reserved for bad PEB handling: 5 [W] Jan 1 03:00:09 kernel: ubi0: background thread "ubi_bgt0d" started, PID 428 [W] Jan 1 03:00:09 kernel: UBIFS (ubi0:0): background thread "ubifs_bgt0_0" started, PID 429 [W] Jan 1 03:00:09 kernel: UBIFS (ubi0:0): UBIFS: mounted UBI device 0, volume 0, name "storage" [W] Jan 1 03:00:09 kernel: UBIFS (ubi0:0): LEB size: 126976 bytes (124 KiB), min./max. I/O unit sizes: 2048 bytes/2048 bytes [W] Jan 1 03:00:09 kernel: UBIFS (ubi0:0): FS size: 31617024 bytes (30 MiB, 249 LEBs), journal size 1523712 bytes (1 MiB, 12 LEBs) [W] Jan 1 03:00:09 kernel: UBIFS (ubi0:0): reserved for root: 1493350 bytes (1458 KiB) [W] Jan 1 03:00:09 kernel: UBIFS (ubi0:0): media format: w4/r0 (latest is w4/r0), UUID 6AE5FC5A-3D9C-47CC-95E0-DAAF4D2B9EDA, small LPT model [I] Jan 1 03:00:09 ndm: Core::Authenticator: "printers" tag registered. [I] Jan 1 03:00:09 ndm: Core::Authenticator: "cifs" tag registered. [I] Jan 1 03:00:09 ndm: Cloud::Agent: "cloud" component registered. [I] Jan 1 03:00:09 ndm: Cloud::Agent: "ndns" TTP component registered. [I] Jan 1 03:00:09 ndm: Cloud::Agent: "ndns" component registered. [I] Jan 1 03:00:09 ndm: Cloud::Agent: "ndmp" component registered. [I] Jan 1 03:00:09 ndm: Core::Authenticator: "vpn-dlna" tag registered. [I] Jan 1 03:00:09 ndm: Dns::Filter::Public: loaded 17 presets (version 8). [I] Jan 1 03:00:09 ndm: Dns::Manager: DNS-over-HTTPS support initialized. [I] Jan 1 03:00:09 ndm: Dns::Manager: DNS-over-TLS support initialized. [I] Jan 1 03:00:09 ndm: Network::InternetChecker: gateway checking enabled. [I] Jan 1 03:00:09 ndm: Network::Interface::Rtx::Sku: main default profile applied. [I] Jan 1 03:00:09 ndm: Network::Interface::Rtx::Sku: beamforming default profile applied. [I] Jan 1 03:00:09 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/mt7915_ap.ko. [I] Jan 1 03:00:10 kernel: PCI: Enabling device 0000:01:00.0 (0000 -> 0002) [I] Jan 1 03:00:10 kernel: PCI: Enabling device 0000:02:00.0 (0000 -> 0002) [I] Jan 1 03:00:10 kernel: MT7915 AP Driver version: 7.5.0.0 [I] Jan 1 03:00:10 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": PHY mode set. [I] Jan 1 03:00:10 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": channel bandwidth settings reset to default. [I] Jan 1 03:00:10 ndm: Network::Interface::Base: "WifiMaster1": interface is down. [I] Jan 1 03:00:10 kernel: MT7915 CPU 0 patch info: [I] Jan 1 03:00:10 kernel: Built date: 20210513182337a [I] Jan 1 03:00:10 kernel: MT7915 CPU 0 firmware info: [I] Jan 1 03:00:10 kernel: Chip ID: 0x0b [I] Jan 1 03:00:10 kernel: Eco version: 0x01 [I] Jan 1 03:00:10 kernel: Built date: 20210513182413 [I] Jan 1 03:00:10 kernel: Common crc: 0xd7938074 [I] Jan 1 03:00:11 kernel: MT7915 CPU 1 firmware info: [I] Jan 1 03:00:11 kernel: Chip ID: 0x00 [I] Jan 1 03:00:11 kernel: Eco version: 0x01 [I] Jan 1 03:00:11 kernel: Built date: 20210513182437 [I] Jan 1 03:00:11 kernel: Common crc: 0xd9ebcb48 [I] Jan 1 03:00:11 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": created spectrum RRD. [I] Jan 1 03:00:11 ndm: Network::Interface::Repository: "WifiMaster1" interface created. [I] Jan 1 03:00:11 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": PHY mode set. [I] Jan 1 03:00:11 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": channel bandwidth settings reset to default. [I] Jan 1 03:00:11 ndm: Network::Interface::Base: "WifiMaster0": interface is down. [I] Jan 1 03:00:11 ndm: Network::Interface::Repository: "WifiMaster0" interface created. [I] Jan 1 03:00:11 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint1": SSID saved. [I] Jan 1 03:00:11 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": SSID reset. [I] Jan 1 03:00:11 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1": interface is down. [I] Jan 1 03:00:11 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1": network MTU reset to default. [I] Jan 1 03:00:11 ndm: Network::Interface::Repository: "WifiMaster1/AccessPoint1" interface created. [I] Jan 1 03:00:11 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint3": SSID saved. [I] Jan 1 03:00:11 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint3": SSID reset. [I] Jan 1 03:00:11 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint3": interface is down. [I] Jan 1 03:00:11 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint3": network MTU reset to default. [I] Jan 1 03:00:11 ndm: Network::Interface::Repository: "WifiMaster0/AccessPoint3" interface created. [I] Jan 1 03:00:11 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint0": SSID saved. [I] Jan 1 03:00:11 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint0": SSID reset. [I] Jan 1 03:00:11 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0": interface is down. [I] Jan 1 03:00:11 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0": network MTU reset to default. [I] Jan 1 03:00:11 ndm: Network::Interface::Repository: "WifiMaster0/AccessPoint0" interface created. [I] Jan 1 03:00:11 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint2": SSID saved. [I] Jan 1 03:00:11 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint2": SSID reset. [I] Jan 1 03:00:11 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint2": interface is down. [I] Jan 1 03:00:11 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint2": network MTU reset to default. [I] Jan 1 03:00:12 ndm: Network::Interface::Repository: "WifiMaster1/AccessPoint2" interface created. [I] Jan 1 03:00:12 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint1": SSID saved. [I] Jan 1 03:00:12 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint1": SSID reset. [I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1": interface is down. [I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1": network MTU reset to default. [I] Jan 1 03:00:12 ndm: Network::Interface::Repository: "WifiMaster0/AccessPoint1" interface created. [I] Jan 1 03:00:12 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint3": SSID saved. [I] Jan 1 03:00:12 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint3": SSID reset. [I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint3": interface is down. [I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint3": network MTU reset to default. [I] Jan 1 03:00:12 ndm: Network::Interface::Repository: "WifiMaster1/AccessPoint3" interface created. [I] Jan 1 03:00:12 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint0": SSID saved. [I] Jan 1 03:00:12 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": SSID reset. [I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0": interface is down. [I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0": network MTU reset to default. [I] Jan 1 03:00:12 ndm: Network::Interface::Repository: "WifiMaster1/AccessPoint0" interface created. [I] Jan 1 03:00:12 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint2": SSID saved. [I] Jan 1 03:00:12 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint2": SSID reset. [I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint2": interface is down. [I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint2": network MTU reset to default. [I] Jan 1 03:00:12 ndm: Network::Interface::Repository: "WifiMaster0/AccessPoint2" interface created. [I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster1/WifiStation0": interface is down. [I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster1/WifiStation0": network MTU reset to default. [I] Jan 1 03:00:12 ndm: Network::Interface::Repository: "WifiMaster1/WifiStation0" interface created. [I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster0/WifiStation0": interface is down. [I] Jan 1 03:00:12 ndm: Network::Interface::Base: "WifiMaster0/WifiStation0": network MTU reset to default. [I] Jan 1 03:00:12 ndm: Network::Interface::Repository: "WifiMaster0/WifiStation0" interface created. [I] Jan 1 03:00:12 ndm: Network::Interface::Rtx::WifiMonitor: added system name for "WifiMaster0/Backhaul0". [I] Jan 1 03:00:12 ndm: Network::Interface::Rtx::WifiMonitor: added system name for "WifiMaster1/Backhaul0". [I] Jan 1 03:00:12 ndm: Core::FileSystem::Dynamic: "ndm:": registered "wifi-configuration.dat" node. [I] Jan 1 03:00:12 ndm: Network::Interface::Rtx::WifiController: backhaul STP disabled. [I] Jan 1 03:00:12 ndm: Network::Interface::Rtx::WifiController: "WifiMaster0/Backhaul0": set metric 1. [I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiController: "WifiMaster0/Backhaul0": activated. [I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiController: "WifiMaster1/Backhaul0": set metric 1. [I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiController: "WifiMaster1/Backhaul0": activated. [I] Jan 1 03:00:13 ndm: Network::Interface::Rtx::WifiController: backhaul activated. [I] Jan 1 03:00:13 ndm: PingCheck::Profile: "default": update interval is changed to 10 seconds. [I] Jan 1 03:00:13 ndm: PingCheck::Profile: "default": uses connect mode. [I] Jan 1 03:00:13 ndm: PingCheck::Profile: "default": uses port 443 for testing. [I] Jan 1 03:00:13 ndm: PingCheck::Profile: "default": add host "ya.ru" for testing. [I] Jan 1 03:00:13 ndm: PingCheck::Profile: "default": add host "nic.ru" for testing. [I] Jan 1 03:00:13 ndm: PingCheck::Profile: "default": add host "google.com" for testing. [I] Jan 1 03:00:13 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/ntc.ko. [I] Jan 1 03:00:13 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint1": security level set to "private". [I] Jan 1 03:00:13 ndnproxy: NDM DNS Proxy, v1.3.0b46. [I] Jan 1 03:00:13 ndnproxy: PID file: /var/ndnproxymain.pid. [I] Jan 1 03:00:13 ndnproxy: stats. file: /var/ndnproxymain.stat. [I] Jan 1 03:00:13 kernel: ntc: NDM Traffic Control Module, v6.0.9 [I] Jan 1 03:00:13 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint3": security level set to "private". [I] Jan 1 03:00:13 ndm: Core::Authenticator: "webdav" tag registered. [I] Jan 1 03:00:13 ndm: WebDav::Server: has no temporary directory, unable to start. [I] Jan 1 03:00:13 ndm: Module::Manager: loaded 44 modules. [I] Jan 1 03:00:13 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint2": security level set to "private". [I] Jan 1 03:00:13 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint1": security level set to "private". [I] Jan 1 03:00:13 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint3": security level set to "private". [I] Jan 1 03:00:13 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint2": security level set to "private". [I] Aug 8 23:02:29 ndm: Core::System::Clock: system time has been changed. [I] Aug 8 23:02:29 ndm: Core::FileSystem::Proc: system setting saved. [I] Aug 8 23:02:29 ndm: Core::Syslog: last message repeated 14 times. [I] Aug 8 23:02:29 ndm: Core::System::Domainname: the system domain name set. [I] Aug 8 23:02:29 ndm: Core::System::Hostname: the host name set. [I] Aug 8 23:02:29 ndm: Core::System::Caption: template set to default. [I] Aug 8 23:02:29 ndm: Core::Ndss: dump-reporting disabled. [I] Aug 8 23:02:29 ndm: Ntp::Client: server "0.pool.ntp.org" has been added. [I] Aug 8 23:02:29 ndm: Ntp::Client: server "1.pool.ntp.org" has been added. [I] Aug 8 23:02:29 ndm: Ntp::Client: server "2.pool.ntp.org" has been added. [I] Aug 8 23:02:29 ndm: Ntp::Client: server "3.pool.ntp.org" has been added. [I] Aug 8 23:02:29 ndm: Core::KnownHosts: new host "iphone 8+" has been created. [I] Aug 8 23:02:29 ndm: Core::KnownHosts: new host "ps4 lan" has been created. [I] Aug 8 23:02:29 ndm: Core::KnownHosts: new host "nyanguzarov-not" has been created. [I] Aug 8 23:02:29 ndm: Core::KnownHosts: new host "Дима Honor_10" has been created. [I] Aug 8 23:02:29 ndm: Core::KnownHosts: new host "Карина iphone" has been created. [I] Aug 8 23:02:29 ndm: Core::KnownHosts: new host "DESKTOP-NIJ49Q4" has been created. [I] Aug 8 23:02:29 ndm: Netfilter::Manager: private networks isolated. [I] Aug 8 23:02:29 ndm: Core::Authenticator: password has been set for user "admin". [I] Aug 8 23:02:29 ndm: Core::Authenticator: password has been set for user "admin". [I] Aug 8 23:02:29 ndm: Core::Authenticator: user "admin" tagged with "cli". [I] Aug 8 23:02:29 ndm: Core::Authenticator: user "admin" tagged with "http". [I] Aug 8 23:02:29 ndm: Core::Authenticator: user "admin" tagged with "cifs". [I] Aug 8 23:02:29 ndm: Core::Authenticator: user "admin" tagged with "printers". [I] Aug 8 23:02:29 ndm: Core::Authenticator: user "admin" tagged with "webdav". [I] Aug 8 23:02:29 ndm: Network::Interface::Base: "GigabitEthernet0": interface is up. [I] Aug 8 23:02:29 ndm: Network::Interface::Base: "GigabitEthernet0/0": renamed to "1". [I] Aug 8 23:02:29 ndm: Network::Interface::Switch: "GigabitEthernet0/0": access mode enabled. [I] Aug 8 23:02:29 ndm: Network::Interface::Switch: "GigabitEthernet0/0": set access VLAN ID: 1. [I] Aug 8 23:02:29 ndm: Network::Interface::Base: "GigabitEthernet0/0": interface is up. [I] Aug 8 23:02:29 ndm: Network::Interface::Base: "GigabitEthernet0/1": renamed to "2". [I] Aug 8 23:02:29 ndm: Network::Interface::Switch: "GigabitEthernet0/1": access mode enabled. [I] Aug 8 23:02:29 ndm: Network::Interface::Switch: "GigabitEthernet0/1": set access VLAN ID: 1. [I] Aug 8 23:02:29 ndm: Network::Interface::Base: "GigabitEthernet0/1": interface is up. [I] Aug 8 23:02:29 ndm: Network::Interface::Base: "GigabitEthernet0/2": renamed to "3". [I] Aug 8 23:02:29 ndm: Network::Interface::Switch: "GigabitEthernet0/2": access mode enabled. [I] Aug 8 23:02:29 ndm: Network::Interface::Switch: "GigabitEthernet0/2": set access VLAN ID: 1. [I] Aug 8 23:02:29 ndm: Network::Interface::Base: "GigabitEthernet0/2": interface is up. [I] Aug 8 23:02:29 ndm: Network::Interface::Base: "GigabitEthernet0/3": renamed to "4". [I] Aug 8 23:02:29 ndm: Network::Interface::Switch: "GigabitEthernet0/3": access mode enabled. [I] Aug 8 23:02:29 ndm: Network::Interface::Switch: "GigabitEthernet0/3": set access VLAN ID: 1. [I] Aug 8 23:02:29 ndm: Network::Interface::Base: "GigabitEthernet0/3": interface is up. [I] Aug 8 23:02:29 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan1": interface is down. [I] Aug 8 23:02:29 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan1": network MTU reset to default. [I] Aug 8 23:02:29 ndm: Network::Interface::Repository: "GigabitEthernet0/Vlan1" interface created. [I] Aug 8 23:02:30 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan1": description saved. [I] Aug 8 23:02:30 ndm: Network::Interface::Ip: "GigabitEthernet0/Vlan1": security level set to "private". [I] Aug 8 23:02:30 ndm: Dhcp::Client: GigabitEthernet0/Vlan1 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:30 ndm: Dhcp::Client: GigabitEthernet0/Vlan1 DHCP name servers are enabled. [I] Aug 8 23:02:30 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan1": interface is up. [I] Aug 8 23:02:30 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan3": interface is down. [I] Aug 8 23:02:30 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan3": network MTU reset to default. [I] Aug 8 23:02:30 ndm: Network::Interface::Repository: "GigabitEthernet0/Vlan3" interface created. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan3": description saved. [I] Aug 8 23:02:31 ndm: Network::Interface::Ip: "GigabitEthernet0/Vlan3": security level set to "protected". [I] Aug 8 23:02:31 ndm: Dhcp::Client: GigabitEthernet0/Vlan3 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:31 ndm: Dhcp::Client: GigabitEthernet0/Vlan3 DHCP name servers are enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "GigabitEthernet0/Vlan3": interface is up. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "GigabitEthernet1": renamed to "ISP". [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "GigabitEthernet1": description saved. [I] Aug 8 23:02:31 ndm: Network::Interface::Mac: "GigabitEthernet1": MAC address reset to 50:ff:20:78:b0:1c. [I] Aug 8 23:02:31 ndm: Network::Interface::Ip: "GigabitEthernet1": security level set to "public". [I] Aug 8 23:02:31 ndm: Dhcp::Client: started DHCP client on GigabitEthernet1. [I] Aug 8 23:02:31 ndm: Dhcp::Client: GigabitEthernet1 DHCP client hostname is set to Keenetic-1015. [I] Aug 8 23:02:31 ndm: Dhcp::Client: GigabitEthernet1 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:31 ndm: Dhcp::Client: GigabitEthernet1 DHCP name servers are enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "GigabitEthernet1": static MTU is 1500. [I] Aug 8 23:02:31 ndm: Igmp::Proxy: upstream role assigned to GigabitEthernet1. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "GigabitEthernet1": interface is up. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "GigabitEthernet1/0": renamed to "0". [I] Aug 8 23:02:31 ndm: Network::Interface::Ethernet: "GigabitEthernet1/0": speed set to 1000. [I] Aug 8 23:02:31 ndm: Network::Interface::Ethernet: "GigabitEthernet1/0": duplex set to "full". [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "GigabitEthernet1/0": interface is up. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": country code set to RU (Russian Federation). [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": PHY mode set. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": TX burst enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": explicit beamforming enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": VHT enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": 11ac/ax downlink-mumimo enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": 11ax uplink-mumimo enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster0": interface is up. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0": renamed to "AccessPoint". [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0": description saved. [I] Aug 8 23:02:31 ndm: Network::Interface::Ethernet: "WifiMaster0/AccessPoint0": ACL type unchanged. [I] Aug 8 23:02:31 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint0": security level set to "private". [I] Aug 8 23:02:31 ndm: Network::Interface::Wifi: "WifiMaster0/AccessPoint0": WPA PSK set. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint0": wireless encryption enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint0": WPA2 enabled. [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster0/AccessPoint0 DHCP client hostname is set to Keenetic-1015. [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster0/AccessPoint0 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster0/AccessPoint0 DHCP name servers are enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0": static MTU is 1500. [I] Aug 8 23:02:31 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint0": SSID saved. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint0": WMM extensions enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint0": RRM enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint0": BTM enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint0": fast transition MDID set to "o8". [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint0": fast transition enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint0": interface is up. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1": renamed to "GuestWiFi". [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1": description saved. [I] Aug 8 23:02:31 ndm: Network::Interface::Ethernet: "WifiMaster0/AccessPoint1": ACL type unchanged. [I] Aug 8 23:02:31 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint1": security level set to "private". [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster0/AccessPoint1 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster0/AccessPoint1 DHCP name servers are enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Wireless: "WifiMaster0/AccessPoint1": SSID saved. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint1": WMM extensions enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint1": RRM enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint1": BTM enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint1": fast transition MDID set to "I8". [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint1": fast transition enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint1": interface is down. [I] Aug 8 23:02:31 ndm: Network::Interface::Ethernet: "WifiMaster0/AccessPoint2": ACL type unchanged. [I] Aug 8 23:02:31 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint2": security level set to "private". [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster0/AccessPoint2 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster0/AccessPoint2 DHCP name servers are enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint2": interface is down. [I] Aug 8 23:02:31 ndm: Network::Interface::Ethernet: "WifiMaster0/AccessPoint3": ACL type unchanged. [I] Aug 8 23:02:31 ndm: Network::Interface::Ip: "WifiMaster0/AccessPoint3": security level set to "private". [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster0/AccessPoint3 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster0/AccessPoint3 DHCP name servers are enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster0/AccessPoint3": interface is down. [I] Aug 8 23:02:31 ndm: Network::Interface::Ip: "WifiMaster0/WifiStation0": security level set to "public". [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiStation: "WifiMaster0/WifiStation0": wireless encryption disabled. [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster0/WifiStation0 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster0/WifiStation0 DHCP name servers are enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster0/WifiStation0": interface is down. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": country code set to RU (Russian Federation). [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": PHY mode set. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": channel bandwidth setting applied. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": TX burst enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": band steering enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": explicit beamforming enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": 11ac/ax downlink-mumimo enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": 11ax uplink-mumimo enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster1": interface is up. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0": renamed to "AccessPoint_5G". [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0": description saved. [I] Aug 8 23:02:31 ndm: Network::Interface::Ethernet: "WifiMaster1/AccessPoint0": ACL type unchanged. [I] Aug 8 23:02:31 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint0": security level set to "private". [I] Aug 8 23:02:31 ndm: Network::Interface::Wifi: "WifiMaster1/AccessPoint0": WPA PSK set. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": wireless encryption enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": WPA2 enabled. [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster1/AccessPoint0 DHCP client hostname is set to Keenetic-1015. [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster1/AccessPoint0 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:31 ndm: Dhcp::Client: WifiMaster1/AccessPoint0 DHCP name servers are enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0": static MTU is 1500. [I] Aug 8 23:02:31 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint0": SSID saved. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": WMM extensions enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": RRM enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": BTM enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": fast transition MDID set to "o8". [I] Aug 8 23:02:31 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": fast transition enabled. [I] Aug 8 23:02:31 ndm: Network::Interface::AccessPoint: "WifiMaster1/AccessPoint0": set to follow WifiMaster0/AccessPoint0. [I] Aug 8 23:02:32 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0": interface is up. [I] Aug 8 23:02:32 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1": renamed to "GuestWiFi_5G". [I] Aug 8 23:02:32 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1": description saved. [I] Aug 8 23:02:32 ndm: Network::Interface::Ethernet: "WifiMaster1/AccessPoint1": ACL type unchanged. [I] Aug 8 23:02:32 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint1": security level set to "private". [I] Aug 8 23:02:32 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": wireless encryption disabled. [I] Aug 8 23:02:32 ndm: Dhcp::Client: WifiMaster1/AccessPoint1 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:32 ndm: Dhcp::Client: WifiMaster1/AccessPoint1 DHCP name servers are enabled. [I] Aug 8 23:02:32 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint1": SSID saved. [I] Aug 8 23:02:32 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": RRM enabled. [I] Aug 8 23:02:32 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": BTM enabled. [I] Aug 8 23:02:32 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": fast transition MDID set to "I8". [I] Aug 8 23:02:32 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": fast transition enabled. [I] Aug 8 23:02:32 ndm: Network::Interface::AccessPoint: "WifiMaster1/AccessPoint1": set to follow WifiMaster0/AccessPoint1. [I] Aug 8 23:02:32 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1": interface is down. [I] Aug 8 23:02:32 ndm: Network::Interface::Ethernet: "WifiMaster1/AccessPoint2": ACL type unchanged. [I] Aug 8 23:02:32 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint2": security level set to "private". [I] Aug 8 23:02:32 ndm: Dhcp::Client: WifiMaster1/AccessPoint2 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:32 ndm: Dhcp::Client: WifiMaster1/AccessPoint2 DHCP name servers are enabled. [I] Aug 8 23:02:32 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint2": interface is down. [I] Aug 8 23:02:32 ndm: Network::Interface::Ethernet: "WifiMaster1/AccessPoint3": ACL type unchanged. [I] Aug 8 23:02:32 ndm: Network::Interface::Ip: "WifiMaster1/AccessPoint3": security level set to "private". [I] Aug 8 23:02:32 ndm: Dhcp::Client: WifiMaster1/AccessPoint3 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:32 ndm: Dhcp::Client: WifiMaster1/AccessPoint3 DHCP name servers are enabled. [I] Aug 8 23:02:32 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint3": interface is down. [I] Aug 8 23:02:32 ndm: Network::Interface::Ip: "WifiMaster1/WifiStation0": security level set to "public". [I] Aug 8 23:02:32 ndm: Network::Interface::Rtx::WifiStation: "WifiMaster1/WifiStation0": wireless encryption disabled. [I] Aug 8 23:02:32 ndm: Dhcp::Client: WifiMaster1/WifiStation0 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:32 ndm: Dhcp::Client: WifiMaster1/WifiStation0 DHCP name servers are enabled. [I] Aug 8 23:02:32 ndm: Network::Interface::Base: "WifiMaster1/WifiStation0": interface is down. [I] Aug 8 23:02:32 ndm: Network::Interface::Base: "Bridge0": interface is down. [I] Aug 8 23:02:32 ndm: Network::Interface::Base: "Bridge0": network MTU reset to default. [I] Aug 8 23:02:32 ndm: Network::Interface::Base: "Bridge0": interface is up. [I] Aug 8 23:02:32 ndm: Network::Interface::Repository: "Bridge0" interface created. [I] Aug 8 23:02:33 ndm: Network::Interface::Base: "Bridge0": renamed to "Home". [I] Aug 8 23:02:33 ndm: Network::Interface::Base: "Bridge0": description saved. [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered blocking state [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered disabled state [I] Aug 8 23:02:33 kernel: device eth2.1 entered promiscuous mode [I] Aug 8 23:02:33 kernel: device eth2 entered promiscuous mode [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered blocking state [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered forwarding state [I] Aug 8 23:02:33 kernel: br0: disabled STP choke for port 1(eth2.1) [I] Aug 8 23:02:33 ndm: Network::Interface::Base: "Bridge0": interface is up. [I] Aug 8 23:02:33 ndm: Network::Interface::Ip: "Bridge0": IP address cleared. [I] Aug 8 23:02:33 ndm: Network::Interface::Ip: "Bridge0": IP address cleared. [I] Aug 8 23:02:33 ndm: Network::Interface::Ip: "Bridge0": global priority unchanged. [I] Aug 8 23:02:33 ndm: Network::Interface::Mac: "Bridge0": backed up the default address 50:ff:20:78:b0:1b of "Home" before changing. [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered disabled state [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered blocking state [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered forwarding state [I] Aug 8 23:02:33 ndm: Network::Interface::Mac: "Bridge0": MAC address is 50:ff:20:78:b0:1b. [I] Aug 8 23:02:33 ndm: Network::Interface::Bridge: "Bridge0": GigabitEthernet0/Vlan1 inherited in Bridge0. [I] Aug 8 23:02:33 kernel: br0: port 2(ra5) entered blocking state [I] Aug 8 23:02:33 kernel: br0: port 2(ra5) entered disabled state [I] Aug 8 23:02:33 kernel: device ra5 entered promiscuous mode [I] Aug 8 23:02:33 kernel: br0: port 2(ra5) entered blocking state [I] Aug 8 23:02:33 kernel: br0: port 2(ra5) entered forwarding state [I] Aug 8 23:02:33 kernel: br0: disabled STP choke for port 2(ra5) [I] Aug 8 23:02:33 kernel: br0: port 2(ra5) entered disabled state [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered disabled state [I] Aug 8 23:02:33 kernel: br0: port 2(ra5) entered blocking state [I] Aug 8 23:02:33 kernel: br0: port 2(ra5) entered forwarding state [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered blocking state [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered forwarding state [I] Aug 8 23:02:33 ndm: Network::Interface::Bridge: "Bridge0": AccessPoint included. [I] Aug 8 23:02:33 kernel: br0: port 3(ra0) entered blocking state [I] Aug 8 23:02:33 kernel: br0: port 3(ra0) entered disabled state [I] Aug 8 23:02:33 kernel: device ra0 entered promiscuous mode [I] Aug 8 23:02:33 kernel: br0: port 3(ra0) entered blocking state [I] Aug 8 23:02:33 kernel: br0: port 3(ra0) entered forwarding state [I] Aug 8 23:02:33 kernel: br0: disabled STP choke for port 3(ra0) [I] Aug 8 23:02:33 kernel: br0: port 3(ra0) entered disabled state [I] Aug 8 23:02:33 kernel: br0: port 2(ra5) entered disabled state [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered disabled state [I] Aug 8 23:02:33 kernel: br0: port 3(ra0) entered blocking state [I] Aug 8 23:02:33 kernel: br0: port 3(ra0) entered forwarding state [I] Aug 8 23:02:33 kernel: br0: port 2(ra5) entered blocking state [I] Aug 8 23:02:33 kernel: br0: port 2(ra5) entered forwarding state [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered blocking state [I] Aug 8 23:02:33 kernel: br0: port 1(eth2.1) entered forwarding state [I] Aug 8 23:02:33 ndm: Network::Interface::Bridge: "Bridge0": AccessPoint_5G included. [I] Aug 8 23:02:33 ndm: Network::Interface::Ethernet: "Bridge0": ACL type unchanged. [I] Aug 8 23:02:33 ndm: Network::Interface::Rtx::MacBand: "Bridge0": bound 48:51:b7:c4:ba:30 to 5 GHz. [I] Aug 8 23:02:33 ndm: Network::Interface::Ip: "Bridge0": security level set to "private". [I] Aug 8 23:02:33 ndm: Network::Interface::Ip: "Bridge0": IP address is 192.168.1.1/24. [I] Aug 8 23:02:33 ndm: Dhcp::Client: Bridge0 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:33 ndm: Dhcp::Client: Bridge0 DHCP name servers are enabled. [I] Aug 8 23:02:33 ndm: Igmp::Proxy: added downstream interface Bridge0. [I] Aug 8 23:02:33 ndm: Network::Interface::Rtx::Iapp: Bridge0 key applied. [I] Aug 8 23:02:33 ndm: Network::Interface::Base: "Bridge0": interface is up. [I] Aug 8 23:02:33 ndm: Network::Interface::Base: "Bridge1": interface is down. [I] Aug 8 23:02:33 ndm: Network::Interface::Base: "Bridge1": network MTU reset to default. [I] Aug 8 23:02:33 ndm: Network::Interface::Base: "Bridge1": interface is up. [I] Aug 8 23:02:33 ndm: Network::Interface::Repository: "Bridge1" interface created. [I] Aug 8 23:02:34 ndm: Network::Interface::Base: "Bridge1": renamed to "Guest". [I] Aug 8 23:02:34 ndm: Network::Interface::Base: "Bridge1": description saved. [I] Aug 8 23:02:34 ndm: TrafficControl::Manager: "Bridge1" interface rate limited to 5120 kbit/s. [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered blocking state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered disabled state [I] Aug 8 23:02:34 kernel: device eth2.3 entered promiscuous mode [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered blocking state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered forwarding state [I] Aug 8 23:02:34 kernel: br1: disabled STP choke for port 1(eth2.3) [I] Aug 8 23:02:34 ndm: Network::Interface::Base: "Bridge1": interface is up. [I] Aug 8 23:02:34 ndm: Network::Interface::Ip: "Bridge1": IP address cleared. [I] Aug 8 23:02:34 ndm: Network::Interface::Ip: "Bridge1": IP address cleared. [I] Aug 8 23:02:34 ndm: Network::Interface::Ip: "Bridge1": global priority unchanged. [I] Aug 8 23:02:34 ndm: Network::Interface::Mac: "Bridge1": backed up the default address 50:ff:20:78:b0:1b of "Guest" before changing. [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered disabled state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered blocking state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered forwarding state [I] Aug 8 23:02:34 ndm: Network::Interface::Mac: "Bridge1": MAC address is 50:ff:20:78:b0:1b. [I] Aug 8 23:02:34 ndm: Network::Interface::Bridge: "Bridge1": GigabitEthernet0/Vlan3 inherited in Bridge1. [I] Aug 8 23:02:34 kernel: br1: port 2(ra6) entered blocking state [I] Aug 8 23:02:34 kernel: br1: port 2(ra6) entered disabled state [I] Aug 8 23:02:34 kernel: device ra6 entered promiscuous mode [I] Aug 8 23:02:34 kernel: br1: disabled STP choke for port 2(ra6) [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered disabled state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered blocking state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered forwarding state [I] Aug 8 23:02:34 ndm: Network::Interface::Bridge: "Bridge1": GuestWiFi included. [I] Aug 8 23:02:34 kernel: br1: port 3(ra1) entered blocking state [I] Aug 8 23:02:34 kernel: br1: port 3(ra1) entered disabled state [I] Aug 8 23:02:34 kernel: device ra1 entered promiscuous mode [I] Aug 8 23:02:34 kernel: br1: disabled STP choke for port 3(ra1) [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered disabled state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered blocking state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered forwarding state [I] Aug 8 23:02:34 ndm: Network::Interface::Bridge: "Bridge1": GuestWiFi_5G included. [I] Aug 8 23:02:34 ndm: Network::Interface::Ethernet: "Bridge1": ACL type unchanged. [I] Aug 8 23:02:34 ndm: Network::Interface::Rtx::MacBand: "Bridge1": bound 48:51:b7:c4:ba:30 to 5 GHz. [I] Aug 8 23:02:34 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint1": peer isolation enabled. [I] Aug 8 23:02:34 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": peer isolation enabled. [I] Aug 8 23:02:34 ndm: Network::Interface::Ethernet: "Bridge1": peer isolation enabled. [I] Aug 8 23:02:34 ndm: Network::Interface::Ip: "Bridge1": security level set to "protected". [I] Aug 8 23:02:34 ndm: Network::Interface::Bridge: "Bridge1": set enhanced address "52:ff:20:78:b0:1a". [I] Aug 8 23:02:34 ndm: Network::Interface::Mac: "GigabitEthernet0/Vlan3": backed up the default address 50:ff:20:78:b0:1b of "GigabitEthernet0/Vlan3" before changing. [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered disabled state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered blocking state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered forwarding state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered disabled state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered blocking state [I] Aug 8 23:02:34 kernel: br1: port 1(eth2.3) entered forwarding state [I] Aug 8 23:02:34 ndm: Network::Interface::Mac: "Bridge1": MAC address is 52:ff:20:78:b0:1a. [I] Aug 8 23:02:34 ndm: Network::Interface::Ip: "Bridge1": IP address is 10.1.30.1/24. [I] Aug 8 23:02:34 ndm: Dhcp::Client: Bridge1 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:34 ndm: Dhcp::Client: Bridge1 DHCP name servers are enabled. [I] Aug 8 23:02:34 ndm: Network::Interface::Rtx::Iapp: Bridge1 key applied. [I] Aug 8 23:02:34 ndm: Network::Interface::Base: "Bridge1": interface is up. [I] Aug 8 23:02:34 ndm: Network::Interface::Base: "PPPoE0": interface is down. [I] Aug 8 23:02:34 ndm: Network::Interface::Base: "PPPoE0": network MTU reset to default. [I] Aug 8 23:02:34 ndm: Network::Interface::Base: "PPPoE0": interface is up. [I] Aug 8 23:02:34 ndm: Network::Interface::Base: "PPPoE0": default MTU is 1400. [I] Aug 8 23:02:34 ndm: Network::Interface::Base: "PPPoE0": default MTU is 1492. [I] Aug 8 23:02:34 ndm: Network::Interface::Repository: "PPPoE0" interface created. [I] Aug 8 23:02:35 ndm: Network::Interface::Base: "PPPoE0": description saved. [I] Aug 8 23:02:35 ndm: Network::Interface::Base: "PPPoE0": assigned role "inet" for PPPoE0. [I] Aug 8 23:02:35 ndm: Command::LogResponse: IPv6CP disabled. [I] Aug 8 23:02:35 ndm: Network::Interface::Ppp: "PPPoE0": LCP echo parameters updated. [I] Aug 8 23:02:35 ndm: Command::LogResponse: using peer as a default gateway. [I] Aug 8 23:02:35 ndm: Command::LogResponse: not using remote name servers. [I] Aug 8 23:02:35 ndm: Command::LogResponse: DNS routes enabled. [I] Aug 8 23:02:35 ndm: Command::LogResponse: CCP disabled. [I] Aug 8 23:02:35 ndm: Network::Interface::Ip: "PPPoE0": security level set to "public". [I] Aug 8 23:02:35 ndm: Network::Interface::Supplicant: "PPPoE0": identity saved. [I] Aug 8 23:02:35 ndm: Network::Interface::Supplicant: "PPPoE0": password saved. [I] Aug 8 23:02:35 ndm: Network::Interface::Base: "PPPoE0": static MTU is 1492. [I] Aug 8 23:02:35 ndm: Network::Interface::Ip: "PPPoE0": global priority is 57342. [I] Aug 8 23:02:35 ndm: Network::Interface::Ip: "PPPoE0": TCP-MSS adjustment enabled. [I] Aug 8 23:02:35 ndm: Network::Interface::Ip: "PPPoE0": global priority unchanged. [I] Aug 8 23:02:35 ndm: Network::Interface::Ppp: "PPPoE0": enabled connection via ISP interface. [I] Aug 8 23:02:35 ndm: Network::Interface::Base: "PPPoE0": interface is up. [I] Aug 8 23:02:35 ndm: Network::Interface::Base: "OpenVPN0": interface is down. [I] Aug 8 23:02:35 ndm: Network::Interface::Base: "OpenVPN0": network MTU reset to default. [I] Aug 8 23:02:36 ndm: Network::Interface::Repository: "OpenVPN0" interface created. [I] Aug 8 23:02:37 ndm: Network::Interface::Base: "OpenVPN0": description saved. [I] Aug 8 23:02:37 ndm: Network::Interface::Base: "OpenVPN0": assigned role "misc" for OpenVPN0. [I] Aug 8 23:02:37 ndm: Network::Interface::Ip: "OpenVPN0": security level set to "public". [I] Aug 8 23:02:37 ndm: Dhcp::Client: OpenVPN0 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:37 ndm: Dhcp::Client: OpenVPN0 DHCP name servers are enabled. [I] Aug 8 23:02:37 ndm: Network::Interface::Base: "OpenVPN0": static MTU is 1500. [I] Aug 8 23:02:37 ndm: Network::Interface::Ip: "OpenVPN0": TCP-MSS adjustment enabled. [I] Aug 8 23:02:37 ndm: Network::Interface::OpenVpn: "OpenVPN0": enable automatic routes accept via tunnel. [I] Aug 8 23:02:37 ndm: Network::Interface::OpenVpn: "OpenVPN0": automatic name servers via tunnel are enabled. [I] Aug 8 23:02:37 ndm: Network::Interface::OpenVpn: "OpenVPN0": set connection via any interface. [I] Aug 8 23:02:37 ndm: Network::Interface::Base: "OpenVPN0": interface is up. [I] Aug 8 23:02:37 ndm: Network::Interface::Base: "OpenVPN1": interface is down. [I] Aug 8 23:02:37 ndm: Network::Interface::Base: "OpenVPN1": network MTU reset to default. [I] Aug 8 23:02:37 ndm: Network::Interface::Repository: "OpenVPN1" interface created. [I] Aug 8 23:02:38 ndm: Network::Interface::Base: "OpenVPN1": description saved. [I] Aug 8 23:02:38 ndm: Network::Interface::Base: "OpenVPN1": assigned role "misc" for OpenVPN1. [I] Aug 8 23:02:38 ndm: Network::Interface::Ip: "OpenVPN1": security level set to "public". [I] Aug 8 23:02:38 ndm: Dhcp::Client: OpenVPN1 DHCP client DNS host routes are enabled. [I] Aug 8 23:02:38 ndm: Dhcp::Client: OpenVPN1 DHCP name servers are enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Base: "OpenVPN1": static MTU is 1500. [I] Aug 8 23:02:38 ndm: Network::Interface::Ip: "OpenVPN1": global priority is 28671. [I] Aug 8 23:02:38 ndm: Network::Interface::Ip: "OpenVPN1": TCP-MSS adjustment enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::OpenVpn: "OpenVPN1": enable automatic routes accept via tunnel. [I] Aug 8 23:02:38 ndm: Network::Interface::OpenVpn: "OpenVPN1": automatic name servers via tunnel are enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::OpenVpn: "OpenVPN1": set connection via any interface. [I] Aug 8 23:02:38 ndm: Network::Interface::Base: "OpenVPN1": interface is down. [I] Aug 8 23:02:38 ndm: Dhcp::Pool: "_WEBADMIN": assigned IP address range 192.168.1.33 to 192.168.1.152. [I] Aug 8 23:02:38 ndm: Dhcp::Server: pool "_WEBADMIN" bound to interface Home. [I] Aug 8 23:02:38 ndm: Dhcp::Server: pool "_WEBADMIN" is enabled. [I] Aug 8 23:02:38 ndm: Dhcp::Pool: "_WEBADMIN_GUEST_AP": assigned IP address range 10.1.30.33 to 10.1.30.152. [I] Aug 8 23:02:38 ndm: Dhcp::Server: pool "_WEBADMIN_GUEST_AP" bound to interface Guest. [I] Aug 8 23:02:38 ndm: Dhcp::Server: pool "_WEBADMIN_GUEST_AP" is enabled. [I] Aug 8 23:02:38 ndm: Dns::Manager: name server 8.8.8.8 added, domain (default). [I] Aug 8 23:02:38 ndm: Dns::Manager: name server 8.8.8.8, domain (default) deleted. [I] Aug 8 23:02:38 ndm: Dns::InterfaceSpecific: "PPPoE0": name server 8.8.8.8 added, domain (default). [I] Aug 8 23:02:38 ndm: Dns::Manager: name server 77.88.8.8 added, domain (default). [I] Aug 8 23:02:38 ndm: Dns::Manager: name server 77.88.8.8, domain (default) deleted. [I] Aug 8 23:02:38 ndm: Dns::InterfaceSpecific: "PPPoE0": name server 77.88.8.8 added, domain (default). [I] Aug 8 23:02:38 ndm: Network::PolicyTable: created policy "Policy0". [I] Aug 8 23:02:38 ndm: Network::PolicyTable: "Policy0": updated description. [I] Aug 8 23:02:38 ndm: Network::PolicyTable: "Policy0": set permission to use OpenVPN1. [I] Aug 8 23:02:38 ndm: Network::PolicyTable: "Policy0": set permission to use PPPoE0. [I] Aug 8 23:02:38 ndm: Http::Manager: port unchanged. [I] Aug 8 23:02:38 ndm: Http::Manager: security level set to private. [I] Aug 8 23:02:38 ndm: Http::Manager: bruteforce detection is enabled. [I] Aug 8 23:02:38 ndm: Http::Manager: bruteforce detection is reconfigured. [I] Aug 8 23:02:38 ndm: Http::Manager: enabled SSL service. [I] Aug 8 23:02:38 ndm: Http::Manager: enabled SSL redirect. [I] Aug 8 23:02:38 ndm: Http::Manager: WebDAV security level set to public. [I] Aug 8 23:02:38 ndm: Network::Nat: a NAT rule added. [I] Aug 8 23:02:38 ndm: Network::Nat: a NAT rule added. [I] Aug 8 23:02:38 ndm: Telnet::Server: port unchanged. [I] Aug 8 23:02:38 ndm: Telnet::Server: security level unchanged. [I] Aug 8 23:02:38 ndm: Telnet::Server: bruteforce detection is reconfigured. [I] Aug 8 23:02:38 ndm: Hotspot::Manager: policy "permit" applied to interface "Home". [I] Aug 8 23:02:38 ndm: Hotspot::Manager: policy "permit" applied to interface "Guest". [I] Aug 8 23:02:38 ndm: Network::Interface::Ethernet: "GigabitEthernet1": link up (1000FD/AN). [I] Aug 8 23:02:38 ndm: Hotspot::Manager: rule "permit" applied to host "48:51:b7:c4:ba:30". [I] Aug 8 23:02:38 ndm: Hotspot::Manager: rule "permit" applied to host "a6:21:f5:95:ba:d3". [I] Aug 8 23:02:38 mtkiappd: MediaTek IAPP daemon v2.0.7 started on br0. [I] Aug 8 23:02:38 ndm: Hotspot::Manager: rule "permit" applied to host "74:c1:4f:d0:ed:2a". [I] Aug 8 23:02:38 ndm: Hotspot::Manager: rule "permit" applied to host "2c:cc:44:7b:64:98". [I] Aug 8 23:02:38 ndm: Hotspot::Manager: rule "permit" applied to host "22:9c:a6:ed:1e:f6". [I] Aug 8 23:02:38 ndm: Hotspot::Manager: rule "permit" applied to host "b4:2e:99:d5:8c:3b". [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::Ppe: software PPE enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::Ppe: hardware PPE enabled. [I] Aug 8 23:02:38 ndm: UPnP::Manager: using LAN interface: Bridge0. [I] Aug 8 23:02:38 ndm: Dhcp::Server: service enabled. [I] Aug 8 23:02:38 ndm: Dns::Manager: DNS proxy enabled. [I] Aug 8 23:02:38 ndm: Igmp::Proxy: IGMP proxy enabled. [I] Aug 8 23:02:38 ndm: Http::Manager: HTTP service was enabled. [I] Aug 8 23:02:38 ndm: Cifs::ServerTsmb: enabled. [I] Aug 8 23:02:38 ndm: Telnet::Server: telnet server enabled. [I] Aug 8 23:02:38 ndm: Ntp::Client: NTP client enabled. [I] Aug 8 23:02:38 ndm: Cifs::ServerTsmb: added share "obmen". [I] Aug 8 23:02:38 ndm: Cifs::ServerTsmb: automount enabled. [I] Aug 8 23:02:38 ndm: Dns::Manager: enabled rebind protection. [I] Aug 8 23:02:38 ndm: EasyConfig::Manager: disabled. [I] Aug 8 23:02:38 ndm: Components::Manager: components auto-update disabled. [I] Aug 8 23:02:38 ndm: Components::Manager: auto-update channel is "stable". [I] Aug 8 23:02:38 ndm: CloudControl2::Agent: security level unchanged. [I] Aug 8 23:02:38 ndm: Core::Server: system ready, core startup time is 23 seconds. [I] Aug 8 23:02:38 pppd[450]: Plugin rp-pppoe.so loaded. [I] Aug 8 23:02:38 pppd[450]: pppd 2.4.4-4 started by root, uid 0 [I] Aug 8 23:02:38 pppd[450]: Found unterminated session: 20260:90:17:ac:ad:ed:08 [I] Aug 8 23:02:38 ndm: Network::Interface::Ppp: "PPPoE0": connection service standby. [I] Aug 8 23:02:38 pppd[450]: Sent PADT [I] Aug 8 23:02:38 kernel: br0: port 4(ra9.1) entered blocking state [I] Aug 8 23:02:38 kernel: br0: port 4(ra9.1) entered disabled state [I] Aug 8 23:02:38 kernel: device ra9.1 entered promiscuous mode [I] Aug 8 23:02:38 kernel: device ra9 entered promiscuous mode [I] Aug 8 23:02:38 kernel: br0: port 4(ra9.1) entered blocking state [I] Aug 8 23:02:38 kernel: br0: port 4(ra9.1) entered forwarding state [I] Aug 8 23:02:38 kernel: br0: port 5(ra4.1) entered blocking state [I] Aug 8 23:02:38 kernel: br0: port 5(ra4.1) entered disabled state [I] Aug 8 23:02:38 kernel: device ra4.1 entered promiscuous mode [I] Aug 8 23:02:38 kernel: device ra4 entered promiscuous mode [I] Aug 8 23:02:38 kernel: br0: port 5(ra4.1) entered blocking state [I] Aug 8 23:02:38 kernel: br0: port 5(ra4.1) entered forwarding state [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint0": peer isolation disabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0": schedule cleared. [I] Aug 8 23:02:38 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint0": SSID saved. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": SSID broadcasting enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Wifi: "WifiMaster1/AccessPoint0": WPA PSK set. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": wireless encryption enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": WPA disabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": WPA2 enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": WPA3 disabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": OWE disabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": RRM enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": BTM enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": fast transition enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": fast transition MDID set to "o8". [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": peer isolation disabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1": schedule cleared. [I] Aug 8 23:02:38 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint1": SSID saved. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": SSID broadcasting enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Wifi: "WifiMaster1/AccessPoint1": WPA PSK set. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": wireless encryption disabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": WPA disabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": WPA2 disabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": WPA3 disabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": OWE disabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": RRM enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": BTM enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": fast transition enabled. [I] Aug 8 23:02:38 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": fast transition MDID set to "I8". [I] Aug 8 23:02:39 kernel: br1: port 4(ra9.2) entered blocking state [I] Aug 8 23:02:39 kernel: br1: port 4(ra9.2) entered disabled state [I] Aug 8 23:02:39 kernel: device ra9.2 entered promiscuous mode [I] Aug 8 23:02:39 kernel: br1: port 4(ra9.2) entered blocking state [I] Aug 8 23:02:39 kernel: br1: port 4(ra9.2) entered forwarding state [I] Aug 8 23:02:39 kernel: br1: port 5(ra4.2) entered blocking state [I] Aug 8 23:02:39 kernel: br1: port 5(ra4.2) entered disabled state [I] Aug 8 23:02:39 mtkiappd: stopped. [I] Aug 8 23:02:39 kernel: device ra4.2 entered promiscuous mode [I] Aug 8 23:02:39 kernel: br1: port 5(ra4.2) entered blocking state [I] Aug 8 23:02:39 kernel: br1: port 5(ra4.2) entered forwarding state [I] Aug 8 23:02:39 pppd[450]: PPP session is 7490 [I] Aug 8 23:02:39 pppd[450]: Using interface ppp0 [I] Aug 8 23:02:39 pppd[450]: Connect: ppp0 <--> eth3 [I] Aug 8 23:02:39 pppd[450]: Terminating on signal 15 [I] Aug 8 23:02:39 pppd[450]: Connection terminated. [E] Aug 8 23:02:39 pppd[450]: write: Bad file descriptor (9) [I] Aug 8 23:02:39 pppd[450]: Sent PADT [I] Aug 8 23:02:39 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster0/AccessPoint1": peer isolation enabled. [I] Aug 8 23:02:39 pppd[450]: Exit. [I] Aug 8 23:02:39 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": peer isolation enabled. [I] Aug 8 23:02:39 ndm: Dns::Manager: name server 8.8.8.8 added, domain (default). [I] Aug 8 23:02:39 ndm: Dns::Manager: name server 77.88.8.8 added, domain (default). [I] Aug 8 23:02:39 ndm: Network::Interface::Switch: "GigabitEthernet0/1": switch link up at port 2 (100FD/AN). [I] Aug 8 23:02:39 ndm: Hotspot::Discovery::Explorer: "Bridge0": Interface Bridge0 IPv4 neighbour explorer started. [I] Aug 8 23:02:39 ndm: Hotspot::Discovery::Explorer: "Bridge1": Interface Bridge1 IPv4 neighbour explorer started. [I] Aug 8 23:02:39 ndm: Usb::Hotplug::Manager: scanning hardware... [I] Aug 8 23:02:39 ndm: Usb::Hotplug::Manager: scanning hardware: done. [I] Aug 8 23:02:39 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/xhci-hcd.ko. [I] Aug 8 23:02:39 ndm: Network::Interface::Switch: "GigabitEthernet0/2": switch link up at port 3 (10FD/AN). [I] Aug 8 23:02:39 ndm: Network::Interface::Switch: "GigabitEthernet0/3": switch link up at port 4 (100FD/AN). [I] Aug 8 23:02:39 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/xhci-mtk.ko. [I] Aug 8 23:02:39 kernel: xhci-mtk xhci-mtk: xHCI Host Controller [I] Aug 8 23:02:39 kernel: xhci-mtk xhci-mtk: new USB bus registered, assigned bus number 1 [I] Aug 8 23:02:39 kernel: U2PHY P0 set SRCTRL calibration value: 3 [I] Aug 8 23:02:39 kernel: U2PHY P1 set SRCTRL calibration value: 3 [I] Aug 8 23:02:39 kernel: xhci-mtk xhci-mtk: hcc params 0x01401198 hci version 0x96 quirks 0x00294810 [I] Aug 8 23:02:39 kernel: xhci-mtk xhci-mtk: irq 37, io mem 0x1e1c0000 [I] Aug 8 23:02:39 kernel: usb usb1: New USB device found, idVendor=1d6b, idProduct=0002 [I] Aug 8 23:02:39 kernel: usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [I] Aug 8 23:02:39 kernel: usb usb1: Product: xHCI Host Controller [I] Aug 8 23:02:39 kernel: usb usb1: Manufacturer: Linux 4.9-ndm-5 xhci-hcd [I] Aug 8 23:02:39 kernel: usb usb1: SerialNumber: xhci-mtk [I] Aug 8 23:02:39 kernel: hub 1-0:1.0: USB hub found [I] Aug 8 23:02:39 kernel: hub 1-0:1.0: 2 ports detected [I] Aug 8 23:02:39 kernel: xhci-mtk xhci-mtk: xHCI Host Controller [I] Aug 8 23:02:39 kernel: xhci-mtk xhci-mtk: new USB bus registered, assigned bus number 2 [I] Aug 8 23:02:40 kernel: usb usb2: New USB device found, idVendor=1d6b, idProduct=0003 [I] Aug 8 23:02:40 kernel: usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [I] Aug 8 23:02:40 kernel: usb usb2: Product: xHCI Host Controller [I] Aug 8 23:02:40 kernel: usb usb2: Manufacturer: Linux 4.9-ndm-5 xhci-hcd [I] Aug 8 23:02:40 kernel: usb usb2: SerialNumber: xhci-mtk [I] Aug 8 23:02:40 kernel: hub 2-0:1.0: USB hub found [I] Aug 8 23:02:40 kernel: hub 2-0:1.0: 1 port detected [I] Aug 8 23:02:40 kernel: Disable SMB fastpath [I] Aug 8 23:02:40 kernel: Enable SMB fastpath for 192.168.1.1/255.255.255.0 [I] Aug 8 23:02:40 ndm: Http::Manager: disabled NDMP passthrough. [I] Aug 8 23:02:40 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/igmpsn.ko. [I] Aug 8 23:02:40 kernel: igmpsn: NDM IGMP Switch Snooping Module, v4.3.3 [I] Aug 8 23:02:40 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster1": auto channel mode set. [I] Aug 8 23:02:40 ndm: Network::Interface::Rtx::WifiMaster: "WifiMaster0": auto channel mode set. [I] Aug 8 23:02:40 ndm: Network::Interface::Base: "PPPoE0": interface is up. [I] Aug 8 23:02:40 ndm: Http::Nginx: loaded SSL certificate for "a98bb54f197bc499192862ee.keenetic.io". [I] Aug 8 23:02:40 ndm: Http::Nginx: loaded SSL certificate for "nailrouter.keenetic.link". [I] Aug 8 23:02:40 ndm: Ntp::Client: unable to communicate with "1.pool.ntp.org". [I] Aug 8 23:02:40 telnetd: waiting for connections... [I] Aug 8 23:02:40 kernel: usb 1-2: new high-speed USB device number 2 using xhci-mtk [I] Aug 8 23:02:40 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:02:40 ndm: Core::Session: client disconnected. [I] Aug 8 23:02:40 ndm: Http::Manager: updated configuration. [I] Aug 8 23:02:40 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/hw_nat.ko. [I] Aug 8 23:02:40 kernel: Ralink/MTK HW NAT 5.0.5.0-27 Module Enabled, FoE Size: 16384 [I] Aug 8 23:02:40 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/fastvpn.ko. [I] Aug 8 23:02:40 kernel: fastvpn: sizeof(bind) = 220 [I] Aug 8 23:02:40 kernel: fastvpn: sizeof(hashent) = 60 [I] Aug 8 23:02:40 kernel: fastvpn: registered [I] Aug 8 23:02:40 kernel: fastvpn: enabled [I] Aug 8 23:02:40 kernel: fastvpn: Fast VPN init, v5.0-25 [I] Aug 8 23:02:40 kernel: fastvpn: PPPoE/IPoE LAN software acceleration is disabled [I] Aug 8 23:02:40 ndm: Dns::Manager: name server 8.8.8.8, domain (default) deleted. [I] Aug 8 23:02:40 ndm: Dns::Manager: name server 77.88.8.8, domain (default) deleted. [I] Aug 8 23:02:41 coalagent: version 0.4.45 starting on 192.168.1.1. [I] Aug 8 23:02:41 mtkiappd: MediaTek IAPP daemon v2.0.7 started on br0. [I] Aug 8 23:02:41 wind: version 1.0.2 started on br0. [I] Aug 8 23:02:41 bndstrg: band steering control daemon v1.0-29 started [I] Aug 8 23:02:41 wind: version 1.0.2 started on br1. [I] Aug 8 23:02:41 ndnproxy: NDM DNS Proxy, v1.3.0b46. [I] Aug 8 23:02:41 ndnproxy: PID file: /var/ndnproxy_Policy0.pid. [I] Aug 8 23:02:41 ndnproxy: stats. file: /var/ndnproxy_Policy0.stat. [I] Aug 8 23:02:41 ndhcpc: GigabitEthernet1: NDM DHCP Client, v3.2.49. [I] Aug 8 23:02:41 ndhcpc: GigabitEthernet1: created PID file "/var/run/ndhcpc-eth3.pid". [I] Aug 8 23:02:41 ndhcps: NDM DHCP Server, v3.2.49. [I] Aug 8 23:02:41 ndhcps: NDM DHCP Server, v3.2.49. [I] Aug 8 23:02:41 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:02:41 ndm: Core::Session: client disconnected. [I] Aug 8 23:02:41 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:02:41 ndm: Core::Session: client disconnected. [I] Aug 8 23:02:41 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nf_conntrack_sip.ko. [I] Aug 8 23:02:41 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nf_nat_sip.ko. [I] Aug 8 23:02:41 coalagent: updating configuration... [I] Aug 8 23:02:41 ndhcps: DHCPDISCOVER received for 192.168.1.89 from 2c:cc:44:7b:64:98. [I] Aug 8 23:02:42 ndhcps: making OFFER of 192.168.1.89 to 2c:cc:44:7b:64:98. [I] Aug 8 23:02:42 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.89 from 2c:cc:44:7b:64:98. [I] Aug 8 23:02:42 avahi-daemon[474]: avahi-daemon 0.8 starting up. [I] Aug 8 23:02:42 nimproxy: NDM IGMP/Multicast Proxy, v0.0.35. [I] Aug 8 23:02:42 kernel: TSMB module version 3020.9.24.13 started from process 481! [I] Aug 8 23:02:42 pppd[503]: Plugin rp-pppoe.so loaded. [I] Aug 8 23:02:42 ndhcps: sending ACK of 192.168.1.89 to 2c:cc:44:7b:64:98. [I] Aug 8 23:02:42 pppd[503]: pppd 2.4.4-4 started by root, uid 0 [I] Aug 8 23:02:42 pppd[503]: Found unterminated session: 20260:90:17:ac:ad:ed:08 [I] Aug 8 23:02:42 OpenVPN0: OpenVPN 2.4.6 [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [AEAD] [I] Aug 8 23:02:42 OpenVPN0: library versions: OpenSSL 1.1.1o 3 May 2022, LZO 2.10 [I] Aug 8 23:02:42 kernel: br0: port 3(ra0) entered disabled state [I] Aug 8 23:02:42 kernel: br0: port 2(ra5) entered disabled state [I] Aug 8 23:02:42 pppd[503]: Sent PADT [I] Aug 8 23:02:42 kernel: usb 1-2: New USB device found, idVendor=090c, idProduct=1000 [I] Aug 8 23:02:42 kernel: usb 1-2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [I] Aug 8 23:02:42 kernel: usb 1-2: Product: USB DISK [I] Aug 8 23:02:42 kernel: usb 1-2: Manufacturer: SMI Corporation [I] Aug 8 23:02:42 kernel: usb 1-2: SerialNumber: AA08013000008428 [I] Aug 8 23:02:42 kernel: usb-storage 1-2:1.0: USB Mass Storage device detected [I] Aug 8 23:02:42 kernel: usb-storage 1-2:1.0: Quirks match for vid 090c pid 1000: 400 [I] Aug 8 23:02:42 kernel: scsi host0: usb-storage 1-2:1.0 [I] Aug 8 23:02:43 pppd[503]: PPP session is 24888 [E] Aug 8 23:02:43 OpenVPN0: RESOLVE: Cannot resolve host address: vpn.antizapret.prostovpn.org:1194 (Try again) [I] Aug 8 23:02:43 kernel: scsi 0:0:0:0: Direct-Access Easy Disk 1100 PQ: 0 ANSI: 0 CCS [I] Aug 8 23:02:43 kernel: sd 0:0:0:0: Attached scsi generic sg0 type 0 [I] Aug 8 23:02:43 kernel: sd 0:0:0:0: [sda] 3915776 512-byte logical blocks: (2.00 GB/1.87 GiB) [I] Aug 8 23:02:43 kernel: sd 0:0:0:0: [sda] Write Protect is off [I] Aug 8 23:02:43 kernel: sd 0:0:0:0: [sda] Mode Sense: 43 00 00 00 [I] Aug 8 23:02:43 kernel: sd 0:0:0:0: [sda] No Caching mode page found [I] Aug 8 23:02:43 kernel: br0: port 2(ra5) entered blocking state [I] Aug 8 23:02:43 kernel: br0: port 2(ra5) entered forwarding state [I] Aug 8 23:02:43 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through [I] Aug 8 23:02:43 kernel: sda: sda1 [I] Aug 8 23:02:43 kernel: sd 0:0:0:0: [sda] Attached SCSI removable disk [I] Aug 8 23:02:44 pppd[503]: Using interface ppp0 [I] Aug 8 23:02:44 pppd[503]: Connect: ppp0 <--> eth3 [I] Aug 8 23:02:44 kernel: br0: port 3(ra0) entered blocking state [I] Aug 8 23:02:44 kernel: br0: port 3(ra0) entered forwarding state [I] Aug 8 23:02:44 bndstrg: band steering: finished [I] Aug 8 23:02:44 ndm: Storage::Manager: "Media0": enabled a disk spin down. [I] Aug 8 23:02:44 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint1": schedule cleared. [I] Aug 8 23:02:44 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint1": SSID saved. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": SSID broadcasting enabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Wifi: "WifiMaster1/AccessPoint1": WPA PSK set. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": wireless encryption disabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": WPA disabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": WPA2 disabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": WPA3 disabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": OWE disabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": RRM enabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": BTM enabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": fast transition enabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint1": fast transition MDID set to "I8". [I] Aug 8 23:02:44 ndm: Network::Interface::Base: "WifiMaster1/AccessPoint0": schedule cleared. [I] Aug 8 23:02:44 ndm: Network::Interface::Wireless: "WifiMaster1/AccessPoint0": SSID saved. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": SSID broadcasting enabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Wifi: "WifiMaster1/AccessPoint0": WPA PSK set. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": wireless encryption enabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": WPA disabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": WPA2 enabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": WPA3 disabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": OWE disabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": RRM enabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": BTM enabled. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": fast transition enabled. [I] Aug 8 23:02:44 ndm: Storage::Manager: created "Media0", port 2. [I] Aug 8 23:02:44 ndm: Network::Interface::Rtx::AccessPoint: "WifiMaster1/AccessPoint0": fast transition MDID set to "o8". [I] Aug 8 23:02:44 pppd[503]: CHAP authentication succeeded: Authentication success,Welcome! [I] Aug 8 23:02:44 pppd[503]: CHAP authentication succeeded [I] Aug 8 23:02:44 pppd[503]: peer from calling number 90:17:AC:BE:9A:DC authorized [I] Aug 8 23:02:44 ndm: Storage::Partition: vfat "1ED2-3E52:": filesystem initialized. [I] Aug 8 23:02:44 kernel: tfat: fail_safe is enabled [I] Aug 8 23:02:44 kernel: tfat: cluster_heap_lbo 0x400000 [I] Aug 8 23:02:44 kernel: tfat: 12 blkbits for normal inodes [I] Aug 8 23:02:44 kernel: tfat: fat start lbo 0x46000 [I] Aug 8 23:02:44 kernel: tfat: 12 blkbits for main FAT32 inode [I] Aug 8 23:02:44 kernel: tfat: cluster size 4096 [I] Aug 8 23:02:44 pppd[503]: local IP address 95.139.193.129 [I] Aug 8 23:02:44 pppd[503]: remote IP address 95.139.192.1 [I] Aug 8 23:02:44 pppd[503]: primary DNS address 212.12.0.2 [I] Aug 8 23:02:44 pppd[503]: secondary DNS address 212.12.0.3 [I] Aug 8 23:02:44 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:02:44 ndm: Core::Session: client disconnected. [I] Aug 8 23:02:44 ndm: Network::Interface::Base: "PPPoE0": interface is up. [I] Aug 8 23:02:44 ndm: Network::Interface::Base: "PPPoE0": interface is up. [I] Aug 8 23:02:44 ndm: Network::Interface::Ppp: "PPPoE0": interface "PPPoE0" is global, priority 57342. [I] Aug 8 23:02:44 ndm: Network::Interface::Ppp: "PPPoE0": adding default route via PPPoE0. [I] Aug 8 23:02:44 kernel: tfat info: FAT32 volume version 0.0. [I] Aug 8 23:02:44 ndm: Storage::Manager: "Media0": registered partition "1ED2-3E52:". [I] Aug 8 23:02:44 kernel: capability: warning: `nginx' uses 32-bit capabilities (legacy support in use) [I] Aug 8 23:02:44 ndm: Network::Interface::Ip: "PPPoE0": IP address is 95.139.193.129/32. [I] Aug 8 23:02:44 ndm: Dns::Manager: name server 8.8.8.8 added, domain (default). [I] Aug 8 23:02:44 ndm: Dns::InterfaceSpecific: "PPPoE0": adding a host route to name server 8.8.8.8. [I] Aug 8 23:02:44 ndm: Dns::Manager: name server 77.88.8.8 added, domain (default). [I] Aug 8 23:02:44 ndm: Dns::InterfaceSpecific: "PPPoE0": adding a host route to name server 77.88.8.8. [I] Aug 8 23:02:44 ndm: Dns::InterfaceSpecific: "PPPoE0": adding a host route to name server 8.8.8.8. [I] Aug 8 23:02:44 ndm: Dns::InterfaceSpecific: "PPPoE0": adding a host route to name server 77.88.8.8. [E] Aug 8 23:02:44 OpenVPN0: RESOLVE: Cannot resolve host address: vpn.antizapret.prostovpn.org:1194 (Try again) [W] Aug 8 23:02:44 OpenVPN0: Could not determine IPv4/IPv6 protocol [I] Aug 8 23:02:44 OpenVPN0: NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay [I] Aug 8 23:02:44 OpenVPN0: SIGUSR1[soft,init_instance] received, process restarting [I] Aug 8 23:02:44 ndm: Network::InterfaceFlusher: flushed conntrack and route cache. [I] Aug 8 23:02:44 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nf_conntrack_ftp.ko. [I] Aug 8 23:02:44 ndm: Core::System::DriverManager: loading /lib/modules/4.9-ndm-5/nf_nat_ftp.ko. [I] Aug 8 23:02:45 ndm: Http::Nginx: loaded SSL certificate for "a98bb54f197bc499192862ee.keenetic.io". [I] Aug 8 23:02:45 ndm: Http::Nginx: loaded SSL certificate for "nailrouter.keenetic.link". [I] Aug 8 23:02:45 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:02:45 ndm: Core::Session: client disconnected. [I] Aug 8 23:02:45 ndm: Http::Manager: updated configuration. [I] Aug 8 23:02:45 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:02:45 ndm: Core::Session: client disconnected. [I] Aug 8 23:02:46 bndstrg: band steering control daemon v1.0-29 started [I] Aug 8 23:02:46 ndm: Cifs::ServerTsmb: service started. [I] Aug 8 23:02:46 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:02:46 upnp: HTTP listening on port 1900 [I] Aug 8 23:02:46 upnp: Listening for NAT-PMP/PCP traffic on port 5351 [I] Aug 8 23:02:47 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:02:47 upnp: HTTP listening on port 1900 [I] Aug 8 23:02:47 upnp: Listening for NAT-PMP/PCP traffic on port 5351 [I] Aug 8 23:02:48 bndstrg: band steering: enabled [I] Aug 8 23:02:49 kernel: ACS result: Primary Channel 3, Min Channel Busy = 5958, BW = 20 [I] Aug 8 23:02:49 ndm: Network::Interface::Rtx::WifiMonitor: "WifiMaster0/AccessPoint0": BSS(ra5) channel switched to 3. [I] Aug 8 23:02:49 OpenVPN0: Attempting to establish TCP connection with [AF_INET]141.95.17.71:1194 [nonblock] [I] Aug 8 23:02:49 ndm: Network::InternetChecker: Internet access detected. [I] Aug 8 23:02:49 ndm: Acme::Client: obtained default domain: "a98bb54f197bc499192862ee.keenetic.io". [I] Aug 8 23:02:49 ndm: Dns::Manager: added static record for "a98bb54f197bc499192862ee.keenetic.io", address 78.47.125.180. [I] Aug 8 23:05:40 ndm: Core::System::Clock: system time has been changed. [I] Aug 8 23:05:40 ndm: Ntp::Client: time synchronized with "2.pool.ntp.org". [I] Aug 8 23:05:40 OpenVPN0: TCP connection established with [AF_INET]141.95.17.71:1194 [I] Aug 8 23:05:40 OpenVPN0: TCP_CLIENT link local: (not bound) [I] Aug 8 23:05:40 OpenVPN0: TCP_CLIENT link remote: [AF_INET]141.95.17.71:1194 [I] Aug 8 23:05:40 OpenVPN0: Server poll timeout, restarting [I] Aug 8 23:05:40 OpenVPN0: SIGTERM[soft,server_poll] received, process exiting [E] Aug 8 23:05:40 ndm: Service: "OpenVPN0": unexpectedly stopped. [I] Aug 8 23:05:40 ndm: Http::Nginx: loaded SSL certificate for "a98bb54f197bc499192862ee.keenetic.io". [I] Aug 8 23:05:40 ndm: Http::Nginx: loaded SSL certificate for "nailrouter.keenetic.link". [I] Aug 8 23:05:40 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:05:40 ndm: Core::Session: client disconnected. [I] Aug 8 23:05:40 ndm: Http::Manager: updated configuration. [I] Aug 8 23:05:40 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:05:40 ndm: Core::Session: client disconnected. [I] Aug 8 23:05:40 pppd[503]: System time change detected. [I] Aug 8 23:05:43 OpenVPN0: OpenVPN 2.4.6 [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [AEAD] [I] Aug 8 23:05:43 OpenVPN0: library versions: OpenSSL 1.1.1o 3 May 2022, LZO 2.10 [I] Aug 8 23:05:43 OpenVPN0: Attempting to establish TCP connection with [AF_INET]51.158.187.25:1194 [nonblock] [I] Aug 8 23:05:44 OpenVPN0: TCP connection established with [AF_INET]51.158.187.25:1194 [I] Aug 8 23:05:44 OpenVPN0: TCP_CLIENT link local: (not bound) [I] Aug 8 23:05:44 OpenVPN0: TCP_CLIENT link remote: [AF_INET]51.158.187.25:1194 [I] Aug 8 23:05:44 OpenVPN0: NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay [I] Aug 8 23:05:44 coalagent: updating configuration... [I] Aug 8 23:05:44 ndm: Network::Interface::Rtx::WifiMonitor: "WifiMaster0/AccessPoint0": STA(86:32:ec:e9:77:bc) had associated successfully (FT mode). [I] Aug 8 23:05:44 kernel: ACS result: Primary Channel 52, Min Channel Busy = 0, BW = 80 [I] Aug 8 23:05:44 OpenVPN0: [antizapret-server] Peer Connection Initiated with [AF_INET]51.158.187.25:1194 [I] Aug 8 23:05:44 ndm: Network::Interface::Rtx::WifiMonitor: "WifiMaster1/AccessPoint0": BSS(ra0) channel switched to 52. [I] Aug 8 23:05:45 ndm: Network::Interface::OpenVpn: "OpenVPN0": connecting via PPPoE0 (PPPoE0). [I] Aug 8 23:05:45 ndm: Network::Interface::OpenVpn: "OpenVPN0": added host route to remote endpoint 51.158.187.25 via PPPoE0. [I] Aug 8 23:05:45 ndm: Network::Interface::Rtx::WifiMonitor: "WifiMaster0/AccessPoint0": STA(86:32:ec:e9:77:bc) set key done in WPA2/WPA2PSK. [I] Aug 8 23:05:45 ndhcps: DHCPREQUEST received (STATE_INIT) for 192.168.1.93 from 86:32:ec:e9:77:bc. [I] Aug 8 23:05:45 ndhcps: sending ACK of 192.168.1.93 to 86:32:ec:e9:77:bc. [I] Aug 8 23:05:45 upnp: shutting down MiniUPnPd [I] Aug 8 23:05:45 ndm: Core::Session: client disconnected. [I] Aug 8 23:05:46 OpenVPN0: TUN/TAP device tun0 opened [I] Aug 8 23:05:46 OpenVPN0: do_ifconfig, tt->did_ifconfig_ipv6_setup=0 [I] Aug 8 23:05:46 ndm: Network::Interface::Ip: "OpenVPN0": IP address is 192.168.115.124/21. [I] Aug 8 23:05:46 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 8.8.8.8/255.255.255.255 via 192.168.112.1. [I] Aug 8 23:05:46 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 77.88.8.8/255.255.255.255 via 192.168.112.1. [I] Aug 8 23:05:46 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 192.168.104.1/255.255.255.255 via 192.168.112.1. [I] Aug 8 23:05:46 ndhcps: DHCPDISCOVER received from e4:27:71:19:a3:2b. [I] Aug 8 23:05:46 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 10.224.0.0/255.254.0.0 via 192.168.112.1. [I] Aug 8 23:05:46 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 103.246.200.0/255.255.252.0 via 192.168.112.1. [I] Aug 8 23:05:46 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 178.239.88.0/255.255.248.0 via 192.168.112.1. [I] Aug 8 23:05:47 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 185.104.45.0/255.255.255.0 via 192.168.112.1. [I] Aug 8 23:05:47 ndhcps: making OFFER of 192.168.1.140 to e4:27:71:19:a3:2b. [I] Aug 8 23:05:47 ndm: Http::Nginx: loaded SSL certificate for "a98bb54f197bc499192862ee.keenetic.io". [I] Aug 8 23:05:47 ndm: Http::Nginx: loaded SSL certificate for "nailrouter.keenetic.link". [I] Aug 8 23:05:47 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 193.105.213.36/255.255.255.252 via 192.168.112.1. [I] Aug 8 23:05:47 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:05:47 ndm: Core::Session: client disconnected. [I] Aug 8 23:05:47 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 203.104.128.0/255.255.240.0 via 192.168.112.1. [I] Aug 8 23:05:47 ndm: Http::Manager: updated configuration. [I] Aug 8 23:05:47 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 203.104.144.0/255.255.248.0 via 192.168.112.1. [I] Aug 8 23:05:47 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:05:47 ndm: Core::Session: client disconnected. [I] Aug 8 23:05:47 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:05:47 upnp: HTTP listening on port 1900 [I] Aug 8 23:05:47 upnp: Listening for NAT-PMP/PCP traffic on port 5351 [I] Aug 8 23:05:47 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 203.104.152.0/255.255.252.0 via 192.168.112.1. [I] Aug 8 23:05:47 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 68.171.224.0/255.255.224.0 via 192.168.112.1. [I] Aug 8 23:05:47 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 74.82.64.0/255.255.224.0 via 192.168.112.1. [I] Aug 8 23:05:47 ndm: Network::Interface::Rtx::WifiMonitor: "WifiMaster1/AccessPoint0": STA(86:32:ec:e9:77:bc) FT authenticated successfully. [I] Aug 8 23:05:47 ndm: Network::Interface::Rtx::WifiMonitor: "WifiMaster1/AccessPoint0": STA(86:32:ec:e9:77:bc) had re-associated successfully (FT mode). [I] Aug 8 23:05:47 ndm: Network::Interface::OpenVpn: "OpenVPN0": adding nameserver 192.168.104.1. [I] Aug 8 23:05:47 ndm: Dns::Manager: name server 192.168.104.1 added, domain (default). [I] Aug 8 23:05:47 ndm: Network::Interface::OpenVpn: "OpenVPN0": add route to nameserver 192.168.104.1 via 0.0.0.0 (OpenVPN0). [I] Aug 8 23:05:47 OpenVPN0: GID set to nobody [I] Aug 8 23:05:47 OpenVPN0: UID set to nobody [I] Aug 8 23:05:47 OpenVPN0: Initialization Sequence Completed [I] Aug 8 23:05:48 upnp: shutting down MiniUPnPd [I] Aug 8 23:05:48 ndm: Core::Session: client disconnected. [I] Aug 8 23:05:50 ndhcps: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.140 from e4:27:71:19:a3:2b. [I] Aug 8 23:05:50 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:05:50 upnp: HTTP listening on port 1900 [I] Aug 8 23:05:50 upnp: Listening for NAT-PMP/PCP traffic on port 5351 [I] Aug 8 23:05:50 ndhcps: sending ACK of 192.168.1.140 to e4:27:71:19:a3:2b. [I] Aug 8 23:06:09 ndm: Http::Nginx: loaded SSL certificate for "a98bb54f197bc499192862ee.keenetic.io". [I] Aug 8 23:06:09 ndm: Http::Nginx: loaded SSL certificate for "nailrouter.keenetic.link". [I] Aug 8 23:06:09 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:06:09 ndm: Core::Session: client disconnected. [I] Aug 8 23:06:09 ndm: Http::Manager: updated configuration. [I] Aug 8 23:06:09 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:06:09 ndm: Core::Session: client disconnected. [I] Aug 8 23:09:00 ndm: Network::Interface::Base: "OpenVPN0": interface is down. [I] Aug 8 23:09:00 ndm: Core::System::StartupConfig: saving (http/rci). [I] Aug 8 23:09:01 upnp: shutting down MiniUPnPd [I] Aug 8 23:09:01 ndm: Core::Session: client disconnected. [I] Aug 8 23:09:01 ndm: Network::Interface::Ip: "OpenVPN0": IP address cleared. [I] Aug 8 23:09:01 ndm: Network::Interface::OpenVpn: "OpenVPN0": remove installed accepted routes. [E] Aug 8 23:09:01 OpenVPN0: event_wait : Interrupted system call (code=4) [I] Aug 8 23:09:01 OpenVPN0: SIGINT[hard,] received, process exiting [I] Aug 8 23:09:02 ndm: Http::Nginx: loaded SSL certificate for "a98bb54f197bc499192862ee.keenetic.io". [I] Aug 8 23:09:02 ndm: Http::Nginx: loaded SSL certificate for "nailrouter.keenetic.link". [I] Aug 8 23:09:02 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:09:02 ndm: Core::Session: client disconnected. [I] Aug 8 23:09:02 ndm: Http::Manager: updated configuration. [I] Aug 8 23:09:02 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:09:02 ndm: Core::Session: client disconnected. [I] Aug 8 23:09:03 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:09:03 upnp: HTTP listening on port 1900 [I] Aug 8 23:09:03 upnp: Listening for NAT-PMP/PCP traffic on port 5351 [I] Aug 8 23:09:04 ndm: Core::System::StartupConfig: configuration saved. [I] Aug 8 23:09:05 ndm: Network::Interface::Base: "OpenVPN0": interface is up. [I] Aug 8 23:09:05 ndm: Core::System::StartupConfig: saving (http/rci). [I] Aug 8 23:09:08 OpenVPN0: OpenVPN 2.4.6 [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [AEAD] [I] Aug 8 23:09:08 OpenVPN0: library versions: OpenSSL 1.1.1o 3 May 2022, LZO 2.10 [I] Aug 8 23:09:08 OpenVPN0: Attempting to establish TCP connection with [AF_INET]51.75.75.245:1194 [nonblock] [I] Aug 8 23:09:09 ndm: Core::System::StartupConfig: configuration saved. [I] Aug 8 23:09:09 OpenVPN0: TCP connection established with [AF_INET]51.75.75.245:1194 [I] Aug 8 23:09:09 OpenVPN0: TCP_CLIENT link local: (not bound) [I] Aug 8 23:09:09 OpenVPN0: TCP_CLIENT link remote: [AF_INET]51.75.75.245:1194 [I] Aug 8 23:09:09 OpenVPN0: NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay [I] Aug 8 23:09:10 OpenVPN0: [antizapret-server] Peer Connection Initiated with [AF_INET]51.75.75.245:1194 [I] Aug 8 23:09:10 ndm: Network::Interface::OpenVpn: "OpenVPN0": connecting via PPPoE0 (PPPoE0). [I] Aug 8 23:09:10 ndm: Network::Interface::OpenVpn: "OpenVPN0": added host route to remote endpoint 51.75.75.245 via PPPoE0. [I] Aug 8 23:09:11 upnp: shutting down MiniUPnPd [I] Aug 8 23:09:11 ndm: Core::Session: client disconnected. [I] Aug 8 23:09:12 OpenVPN0: TUN/TAP device tun0 opened [I] Aug 8 23:09:12 OpenVPN0: do_ifconfig, tt->did_ifconfig_ipv6_setup=0 [I] Aug 8 23:09:12 ndm: Network::Interface::Ip: "OpenVPN0": IP address is 192.168.107.77/21. [I] Aug 8 23:09:12 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 8.8.8.8/255.255.255.255 via 192.168.104.1. [I] Aug 8 23:09:12 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 77.88.8.8/255.255.255.255 via 192.168.104.1. [I] Aug 8 23:09:12 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 10.224.0.0/255.254.0.0 via 192.168.104.1. [I] Aug 8 23:09:13 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 103.246.200.0/255.255.252.0 via 192.168.104.1. [I] Aug 8 23:09:13 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 178.239.88.0/255.255.248.0 via 192.168.104.1. [I] Aug 8 23:09:13 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 185.104.45.0/255.255.255.0 via 192.168.104.1. [I] Aug 8 23:09:13 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 193.105.213.36/255.255.255.252 via 192.168.104.1. [I] Aug 8 23:09:13 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:09:13 upnp: HTTP listening on port 1900 [I] Aug 8 23:09:13 upnp: Listening for NAT-PMP/PCP traffic on port 5351 [I] Aug 8 23:09:13 ndm: Http::Nginx: loaded SSL certificate for "a98bb54f197bc499192862ee.keenetic.io". [I] Aug 8 23:09:13 ndm: Http::Nginx: loaded SSL certificate for "nailrouter.keenetic.link". [I] Aug 8 23:09:13 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 203.104.128.0/255.255.240.0 via 192.168.104.1. [I] Aug 8 23:09:13 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:09:13 ndm: Core::Session: client disconnected. [I] Aug 8 23:09:13 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 203.104.144.0/255.255.248.0 via 192.168.104.1. [I] Aug 8 23:09:13 ndm: Http::Manager: updated configuration. [I] Aug 8 23:09:13 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 203.104.152.0/255.255.252.0 via 192.168.104.1. [I] Aug 8 23:09:13 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:09:13 ndm: Core::Session: client disconnected. [I] Aug 8 23:09:13 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 68.171.224.0/255.255.224.0 via 192.168.104.1. [I] Aug 8 23:09:13 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 74.82.64.0/255.255.224.0 via 192.168.104.1. [I] Aug 8 23:09:13 ndm: Network::Interface::OpenVpn: "OpenVPN0": adding nameserver 192.168.104.1. [I] Aug 8 23:09:13 ndm: Dns::Manager: name server 192.168.104.1 added, domain (default). [I] Aug 8 23:09:13 ndm: Network::Interface::OpenVpn: "OpenVPN0": add route to nameserver 192.168.104.1 via 0.0.0.0 (OpenVPN0). [I] Aug 8 23:09:13 OpenVPN0: GID set to nobody [I] Aug 8 23:09:13 OpenVPN0: UID set to nobody [I] Aug 8 23:09:13 OpenVPN0: Initialization Sequence Completed [I] Aug 8 23:09:14 upnp: shutting down MiniUPnPd [I] Aug 8 23:09:14 ndm: Core::Session: client disconnected. [I] Aug 8 23:09:16 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:09:16 upnp: HTTP listening on port 1900 [I] Aug 8 23:09:16 upnp: Listening for NAT-PMP/PCP traffic on port 5351 [I] Aug 8 23:17:37 ndm: Network::Interface::Base: "OpenVPN0": interface is down. [I] Aug 8 23:17:37 ndm: Core::System::StartupConfig: saving (http/rci). [I] Aug 8 23:17:38 upnp: shutting down MiniUPnPd [I] Aug 8 23:17:38 ndm: Core::Session: client disconnected. [I] Aug 8 23:17:38 ndm: Network::Interface::Ip: "OpenVPN0": IP address cleared. [I] Aug 8 23:17:38 ndm: Network::Interface::OpenVpn: "OpenVPN0": remove installed accepted routes. [E] Aug 8 23:17:38 OpenVPN0: event_wait : Interrupted system call (code=4) [I] Aug 8 23:17:38 OpenVPN0: SIGINT[hard,] received, process exiting [I] Aug 8 23:17:39 ndm: Http::Nginx: loaded SSL certificate for "a98bb54f197bc499192862ee.keenetic.io". [I] Aug 8 23:17:39 ndm: Http::Nginx: loaded SSL certificate for "nailrouter.keenetic.link". [I] Aug 8 23:17:39 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:17:39 ndm: Core::Session: client disconnected. [I] Aug 8 23:17:39 ndm: Http::Manager: updated configuration. [I] Aug 8 23:17:39 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:17:39 ndm: Core::Session: client disconnected. [I] Aug 8 23:17:41 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:17:41 upnp: HTTP listening on port 1900 [I] Aug 8 23:17:41 upnp: Listening for NAT-PMP/PCP traffic on port 5351 [I] Aug 8 23:17:41 ndm: Core::System::StartupConfig: configuration saved. [I] Aug 8 23:19:22 ndm: Dns::Manager: name server 77.88.8.8, domain (default) deleted. [I] Aug 8 23:19:22 ndm: Dns::InterfaceSpecific: "PPPoE0": name server 77.88.8.8 deleted, domain (default). [I] Aug 8 23:19:22 ndm: Dns::Manager: name server 77.88.8.8 added, domain (default). [I] Aug 8 23:19:22 ndm: Dns::Manager: name server 77.88.8.8, domain (default) deleted. [I] Aug 8 23:19:22 ndm: Dns::InterfaceSpecific: "OpenVPN0": name server 77.88.8.8 added, domain (default). [I] Aug 8 23:19:22 ndm: Dns::Secure::ManagerDot: DNS-over-TLS name servers cleared. [I] Aug 8 23:19:22 ndm: Dns::Secure::ManagerDoh: DNS-over-HTTPS name servers cleared. [I] Aug 8 23:19:22 ndm: Core::System::StartupConfig: saving (http/rci). [I] Aug 8 23:19:22 upnp: shutting down MiniUPnPd [I] Aug 8 23:19:22 ndm: Core::Session: client disconnected. [I] Aug 8 23:19:24 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:19:24 upnp: HTTP listening on port 1900 [I] Aug 8 23:19:24 upnp: Listening for NAT-PMP/PCP traffic on port 5351 [I] Aug 8 23:19:26 ndm: Core::System::StartupConfig: configuration saved. [I] Aug 8 23:19:43 ndm: Dns::InterfaceSpecific: "OpenVPN0": name server 77.88.8.8 deleted, domain (default). [I] Aug 8 23:19:43 ndm: Dns::Manager: name server 77.88.8.8 added, domain (default). [I] Aug 8 23:19:43 ndm: Dns::InterfaceSpecific: "PPPoE0": adding a host route to name server 77.88.8.8. [I] Aug 8 23:19:43 ndm: Dns::InterfaceSpecific: "PPPoE0": name server 77.88.8.8 added, domain (default). [I] Aug 8 23:19:43 ndm: Dns::Secure::ManagerDot: DNS-over-TLS name servers cleared. [I] Aug 8 23:19:43 ndm: Dns::Secure::ManagerDoh: DNS-over-HTTPS name servers cleared. [I] Aug 8 23:19:43 ndm: Core::System::StartupConfig: saving (http/rci). [I] Aug 8 23:19:44 upnp: shutting down MiniUPnPd [I] Aug 8 23:19:44 ndm: Core::Session: client disconnected. [I] Aug 8 23:19:46 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:19:46 upnp: HTTP listening on port 1900 [I] Aug 8 23:19:46 upnp: Listening for NAT-PMP/PCP traffic on port 5351 [I] Aug 8 23:19:47 ndm: Core::System::StartupConfig: configuration saved. [I] Aug 8 23:20:21 ndm: Dns::Manager: name server 8.8.8.8 added, domain (default). [I] Aug 8 23:20:21 ndm: Dns::Secure::ManagerDot: DNS-over-TLS name servers cleared. [I] Aug 8 23:20:21 ndm: Dns::Secure::ManagerDoh: DNS-over-HTTPS name servers cleared. [I] Aug 8 23:20:21 ndm: Core::System::StartupConfig: saving (http/rci). [I] Aug 8 23:20:25 ndm: Core::System::StartupConfig: configuration saved. [I] Aug 8 23:21:47 ndm: Dns::Manager: name server 8.8.8.8, domain (default) deleted. [I] Aug 8 23:21:47 ndm: Dns::Secure::ManagerDot: DNS-over-TLS name servers cleared. [I] Aug 8 23:21:47 ndm: Dns::Secure::ManagerDoh: DNS-over-HTTPS name servers cleared. [I] Aug 8 23:21:47 ndm: Core::System::StartupConfig: saving (http/rci). [I] Aug 8 23:21:51 ndm: Core::System::StartupConfig: configuration saved. [I] Aug 8 23:23:11 ndm: Network::Interface::Supplicant: "OpenVPN0": authentication is unchanged. [I] Aug 8 23:23:11 ndm: Network::Interface::Base: "OpenVPN0": description saved. [I] Aug 8 23:23:11 ndm: Network::Interface::Base: "OpenVPN0": deleted all roles. [I] Aug 8 23:23:11 ndm: Network::Interface::Base: "OpenVPN0": assigned role "misc" for OpenVPN0. [I] Aug 8 23:23:11 ndm: Network::Interface::Ip: "OpenVPN0": IP address cleared. [I] Aug 8 23:23:11 ndm: Network::Interface::Base: "OpenVPN0": static MTU is 1500. [I] Aug 8 23:23:11 ndm: Dns::InterfaceSpecific: "OpenVPN0": cleared static name server list. [I] Aug 8 23:23:11 ndm: Network::Interface::Ip: "OpenVPN0": TCP-MSS adjustment enabled. [I] Aug 8 23:23:11 ndm: Network::Interface::OpenVpn: "OpenVPN0": configuration successfully saved. [I] Aug 8 23:23:11 ndm: Network::Interface::OpenVpn: "OpenVPN0": enable automatic routes accept via tunnel. [I] Aug 8 23:23:11 ndm: Network::Interface::OpenVpn: "OpenVPN0": set connection via any interface. [I] Aug 8 23:23:11 ndm: Network::Interface::Base: "OpenVPN0": schedule cleared. [I] Aug 8 23:23:11 ndm: Core::System::StartupConfig: saving (http/rci). [I] Aug 8 23:23:14 ndm: Network::Interface::Base: "OpenVPN0": interface is up. [I] Aug 8 23:23:14 ndm: Core::System::StartupConfig: saving (http/rci). [I] Aug 8 23:23:15 ndm: Core::System::StartupConfig: configuration saved. [I] Aug 8 23:23:17 OpenVPN0: OpenVPN 2.4.6 [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [AEAD] [I] Aug 8 23:23:17 OpenVPN0: library versions: OpenSSL 1.1.1o 3 May 2022, LZO 2.10 [I] Aug 8 23:23:17 OpenVPN0: Attempting to establish TCP connection with [AF_INET]51.75.75.245:1194 [nonblock] [I] Aug 8 23:23:18 OpenVPN0: TCP connection established with [AF_INET]51.75.75.245:1194 [I] Aug 8 23:23:18 OpenVPN0: TCP_CLIENT link local: (not bound) [I] Aug 8 23:23:18 OpenVPN0: TCP_CLIENT link remote: [AF_INET]51.75.75.245:1194 [I] Aug 8 23:23:18 OpenVPN0: NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay [I] Aug 8 23:23:19 OpenVPN0: [antizapret-server] Peer Connection Initiated with [AF_INET]51.75.75.245:1194 [I] Aug 8 23:23:19 ndm: Network::Interface::OpenVpn: "OpenVPN0": connecting via PPPoE0 (PPPoE0). [I] Aug 8 23:23:19 ndm: Network::Interface::OpenVpn: "OpenVPN0": added host route to remote endpoint 51.75.75.245 via PPPoE0. [I] Aug 8 23:23:20 upnp: shutting down MiniUPnPd [I] Aug 8 23:23:20 ndm: Core::Session: client disconnected. [I] Aug 8 23:23:21 OpenVPN0: TUN/TAP device tun0 opened [I] Aug 8 23:23:21 OpenVPN0: do_ifconfig, tt->did_ifconfig_ipv6_setup=0 [I] Aug 8 23:23:21 ndm: Network::Interface::Ip: "OpenVPN0": IP address is 192.168.105.208/21. [I] Aug 8 23:23:21 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 10.224.0.0/255.254.0.0 via 192.168.104.1. [I] Aug 8 23:23:21 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 103.246.200.0/255.255.252.0 via 192.168.104.1. [I] Aug 8 23:23:21 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 178.239.88.0/255.255.248.0 via 192.168.104.1. [I] Aug 8 23:23:21 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 185.104.45.0/255.255.255.0 via 192.168.104.1. [I] Aug 8 23:23:21 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 193.105.213.36/255.255.255.252 via 192.168.104.1. [I] Aug 8 23:23:22 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 203.104.128.0/255.255.240.0 via 192.168.104.1. [I] Aug 8 23:23:22 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 203.104.144.0/255.255.248.0 via 192.168.104.1. [I] Aug 8 23:23:22 ndm: Http::Nginx: loaded SSL certificate for "a98bb54f197bc499192862ee.keenetic.io". [I] Aug 8 23:23:22 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:23:22 upnp: HTTP listening on port 1900 [I] Aug 8 23:23:22 upnp: Listening for NAT-PMP/PCP traffic on port 5351 [I] Aug 8 23:23:22 ndm: Http::Nginx: loaded SSL certificate for "nailrouter.keenetic.link". [I] Aug 8 23:23:22 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 203.104.152.0/255.255.252.0 via 192.168.104.1. [I] Aug 8 23:23:22 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:23:22 ndm: Core::Session: client disconnected. [I] Aug 8 23:23:22 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 68.171.224.0/255.255.224.0 via 192.168.104.1. [I] Aug 8 23:23:22 ndm: Http::Manager: updated configuration. [I] Aug 8 23:23:22 ndm: Network::Interface::OpenVpn: "OpenVPN0": install accepted route to 74.82.64.0/255.255.224.0 via 192.168.104.1. [I] Aug 8 23:23:22 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:23:22 ndm: Core::Session: client disconnected. [I] Aug 8 23:23:22 ndm: Network::Interface::OpenVpn: "OpenVPN0": adding nameserver 192.168.104.1. [I] Aug 8 23:23:22 ndm: Dns::Manager: name server 192.168.104.1 added, domain (default). [I] Aug 8 23:23:22 ndm: Network::Interface::OpenVpn: "OpenVPN0": add route to nameserver 192.168.104.1 via 0.0.0.0 (OpenVPN0). [I] Aug 8 23:23:22 OpenVPN0: GID set to nobody [I] Aug 8 23:23:22 OpenVPN0: UID set to nobody [I] Aug 8 23:23:22 OpenVPN0: Initialization Sequence Completed [I] Aug 8 23:23:22 upnp: shutting down MiniUPnPd [I] Aug 8 23:23:22 ndm: Core::Session: client disconnected. [I] Aug 8 23:23:25 ndm: Core::Server: started Session /var/run/ndm.core.socket. [I] Aug 8 23:23:25 upnp: HTTP listening on port 1900 [I] Aug 8 23:23:25 upnp: Listening for NAT-PMP/PCP traffic on port 5351 ]]> ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs= 1 P: Vendor=090c ProdID=1000 Rev=11.00 S: Manufacturer=SMI Corporation S: Product=USB DISK S: SerialNumber=AA08013000008428 C:* #Ifs= 1 Cfg#= 1 Atr=80 MxPwr=500mA I:* If#= 0 Alt= 0 #EPs= 2 Cls=08(stor.) Sub=06 Prot=50 Driver=usb-storage E: Ad=81(I) Atr=02(Bulk) MxPS= 512 Ivl=0ms E: Ad=02(O) Atr=02(Bulk) MxPS= 512 Ivl=31875us T: Bus=02 Lev=00 Prnt=00 Port=00 Cnt=00 Dev#= 1 Spd=5000 MxCh= 1 B: Alloc= 0/800 us ( 0%), #Int= 0, #Iso= 0 D: Ver= 3.00 Cls=09(hub ) Sub=00 Prot=03 MxPS= 9 #Cfgs= 1 P: Vendor=1d6b ProdID=0003 Rev= 4.09 S: Manufacturer=Linux 4.9-ndm-5 xhci-hcd S: Product=xHCI Host Controller S: SerialNumber=xhci-mtk C:* #Ifs= 1 Cfg#= 1 Atr=e0 MxPwr= 0mA I:* If#= 0 Alt= 0 #EPs= 1 Cls=09(hub ) Sub=00 Prot=00 Driver=hub E: Ad=81(I) Atr=03(Int.) MxPS= 4 Ivl=256ms ]]> file not found: temp:ndnproxysafe.conf file not found: temp:ipsec/ipsec.conf file not found: temp:run/sstp-server/accel.conf file not found: sys:class/usbmisc/lp0/device/ieee1284_id file not found: sys:class/usbmisc/lp1/device/ieee1284_id : tunables : slabdata tsmb_pkt_buf 0 0 8800 1 4 : tunables 8 4 0 : slabdata 0 0 0 tfat_dce_cache 40 42 192 21 1 : tunables 120 60 8 : slabdata 2 2 0 ubifs_inode_slab 1 9 424 9 1 : tunables 54 27 8 : slabdata 1 1 0 nacct_ntce_hosts 4 83 48 83 1 : tunables 120 60 8 : slabdata 1 1 0 exfat_inode_cache 0 0 488 8 1 : tunables 54 27 8 : slabdata 0 0 0 exfat_cache 0 0 24 163 1 : tunables 120 60 8 : slabdata 0 0 0 hfsplus_attr_cache 0 0 3840 1 1 : tunables 24 12 8 : slabdata 0 0 0 thfsplus_icache 0 0 576 7 1 : tunables 54 27 8 : slabdata 0 0 0 ext4_inode_cache 0 0 624 6 1 : tunables 54 27 8 : slabdata 0 0 0 ext4_allocation_context 0 0 104 39 1 : tunables 120 60 8 : slabdata 0 0 0 ext4_prealloc_space 0 0 72 56 1 : tunables 120 60 8 : slabdata 0 0 0 ext4_io_end 0 0 48 83 1 : tunables 120 60 8 : slabdata 0 0 0 tfat_inode_cache 5 10 688 5 1 : tunables 54 27 8 : slabdata 2 2 0 tfat_name_cache 1 7 520 7 1 : tunables 54 27 8 : slabdata 1 1 0 tntfs_big_inode_cache 0 0 584 7 1 : tunables 54 27 8 : slabdata 0 0 0 tntfs_inode_cache 0 0 256 16 1 : tunables 120 60 8 : slabdata 0 0 0 tntfs_dirhint_cache 0 0 592 13 2 : tunables 54 27 8 : slabdata 0 0 0 tntfs_filename_attr_name_cache 0 0 584 7 1 : tunables 54 27 8 : slabdata 0 0 0 tntfs_index_ctx_cache 0 0 104 39 1 : tunables 120 60 8 : slabdata 0 0 0 jffs2_refblock 0 0 248 16 1 : tunables 120 60 8 : slabdata 0 0 0 jffs2_full_dnode 0 0 16 240 1 : tunables 120 60 8 : slabdata 0 0 0 jffs2_i 0 0 376 10 1 : tunables 54 27 8 : slabdata 0 0 0 jbd2_transaction_s 0 0 160 25 1 : tunables 120 60 8 : slabdata 0 0 0 jbd2_journal_head 0 0 64 63 1 : tunables 120 60 8 : slabdata 0 0 0 jbd2_revoke_table_s 0 0 16 240 1 : tunables 120 60 8 : slabdata 0 0 0 jbd2_revoke_record_s 0 0 32 124 1 : tunables 120 60 8 : slabdata 0 0 0 mbcache 0 0 40 99 1 : tunables 120 60 8 : slabdata 0 0 0 scsi_data_buffer 268 326 24 163 1 : tunables 120 60 8 : slabdata 2 2 0 ip6-frags 0 0 136 30 1 : tunables 120 60 8 : slabdata 0 0 0 UDPv6 76 99 832 9 2 : tunables 54 27 8 : slabdata 11 11 0 tw_sock_TCPv6 0 0 176 23 1 : tunables 120 60 8 : slabdata 0 0 0 request_sock_TCPv6 0 0 224 18 1 : tunables 120 60 8 : slabdata 0 0 0 TCPv6 5 15 1600 5 2 : tunables 24 12 8 : slabdata 3 3 0 nf_conntrack 238 540 224 18 1 : tunables 120 60 8 : slabdata 30 30 0 squashfs_inode_cache 281 290 384 10 1 : tunables 54 27 8 : slabdata 29 29 0 dio 0 0 352 11 1 : tunables 54 27 8 : slabdata 0 0 0 posix_timers_cache 2 24 168 24 1 : tunables 120 60 8 : slabdata 1 1 0 UNIX 78 78 640 6 1 : tunables 54 27 8 : slabdata 13 13 0 secpath_cache 36 124 32 124 1 : tunables 120 60 8 : slabdata 1 1 0 flow_cache 0 0 112 36 1 : tunables 120 60 8 : slabdata 0 0 0 xfrm_dst_cache 0 0 288 14 1 : tunables 54 27 8 : slabdata 0 0 0 RAW 9 18 672 6 1 : tunables 54 27 8 : slabdata 3 3 0 UDP 112 132 704 11 2 : tunables 54 27 8 : slabdata 12 12 0 tw_sock_TCP 0 0 176 23 1 : tunables 120 60 8 : slabdata 0 0 0 request_sock_TCP 0 0 224 18 1 : tunables 120 60 8 : slabdata 0 0 0 TCP 53 65 1504 5 2 : tunables 24 12 8 : slabdata 13 13 0 eventpoll_pwq 174 396 40 99 1 : tunables 120 60 8 : slabdata 4 4 0 eventpoll_epi 173 336 96 42 1 : tunables 120 60 8 : slabdata 8 8 0 inotify_inode_mark 2 71 56 71 1 : tunables 120 60 8 : slabdata 1 1 0 biovec-max 40 40 3072 2 2 : tunables 24 12 8 : slabdata 20 20 0 biovec-128 0 0 1536 5 2 : tunables 24 12 8 : slabdata 0 0 0 biovec-64 0 0 768 5 1 : tunables 54 27 8 : slabdata 0 0 0 sock_inode_cache 454 470 384 10 1 : tunables 54 27 8 : slabdata 47 47 0 skbuff_fclone_cache 40 40 384 10 1 : tunables 54 27 8 : slabdata 4 4 0 skbuff_head_cache 291 357 192 21 1 : tunables 120 60 8 : slabdata 17 17 0 proc_inode_cache 284 319 368 11 1 : tunables 54 27 8 : slabdata 29 29 0 sigqueue 4 28 144 28 1 : tunables 120 60 8 : slabdata 1 1 0 bdev_cache 6 27 448 9 1 : tunables 54 27 8 : slabdata 3 3 0 shmem_inode_cache 307 320 376 10 1 : tunables 54 27 8 : slabdata 32 32 0 kernfs_node_cache 7967 8007 80 51 1 : tunables 120 60 8 : slabdata 157 157 0 filp 815 900 160 25 1 : tunables 120 60 8 : slabdata 36 36 0 inode_cache 4839 4848 328 12 1 : tunables 54 27 8 : slabdata 404 404 0 dentry 6222 6270 136 30 1 : tunables 120 60 8 : slabdata 209 209 0 buffer_head 2573 2624 64 64 1 : tunables 120 60 8 : slabdata 41 41 0 vm_area_struct 1262 1656 88 46 1 : tunables 120 60 8 : slabdata 36 36 0 mm_struct 42 63 448 9 1 : tunables 54 27 8 : slabdata 7 7 0 files_cache 4236 4284 224 18 1 : tunables 120 60 8 : slabdata 238 238 0 signal_cache 135 161 544 7 1 : tunables 54 27 8 : slabdata 23 23 0 sighand_cache 131 132 3104 2 2 : tunables 24 12 8 : slabdata 66 66 0 task_struct 238 240 1536 5 2 : tunables 24 12 8 : slabdata 48 48 0 anon_vma_chain 1128 1612 32 124 1 : tunables 120 60 8 : slabdata 13 13 0 anon_vma 607 990 40 99 1 : tunables 120 60 8 : slabdata 10 10 0 pid 8562 8568 64 63 1 : tunables 120 60 8 : slabdata 136 136 0 radix_tree_node 411 442 304 13 1 : tunables 54 27 8 : slabdata 34 34 0 pool_workqueue 4 16 256 16 1 : tunables 120 60 8 : slabdata 1 1 0 idr_layer_cache 168 175 1072 7 2 : tunables 24 12 8 : slabdata 25 25 0 dma-kmalloc-4194304 0 0 4194304 1 1024 : tunables 1 1 0 : slabdata 0 0 0 dma-kmalloc-2097152 0 0 2097152 1 512 : tunables 1 1 0 : slabdata 0 0 0 dma-kmalloc-1048576 0 0 1048576 1 256 : tunables 1 1 0 : slabdata 0 0 0 dma-kmalloc-524288 0 0 524288 1 128 : tunables 1 1 0 : slabdata 0 0 0 dma-kmalloc-262144 0 0 262144 1 64 : tunables 1 1 0 : slabdata 0 0 0 dma-kmalloc-131072 0 0 131072 1 32 : tunables 8 4 0 : slabdata 0 0 0 dma-kmalloc-65536 0 0 65536 1 16 : tunables 8 4 0 : slabdata 0 0 0 dma-kmalloc-32768 0 0 32768 1 8 : tunables 8 4 0 : slabdata 0 0 0 dma-kmalloc-16384 0 0 16384 1 4 : tunables 8 4 0 : slabdata 0 0 0 dma-kmalloc-8192 0 0 8192 1 2 : tunables 8 4 0 : slabdata 0 0 0 dma-kmalloc-4096 0 0 4096 1 1 : tunables 24 12 8 : slabdata 0 0 0 dma-kmalloc-2048 0 0 2048 2 1 : tunables 24 12 8 : slabdata 0 0 0 dma-kmalloc-1024 0 0 1024 4 1 : tunables 54 27 8 : slabdata 0 0 0 dma-kmalloc-512 0 0 512 8 1 : tunables 54 27 8 : slabdata 0 0 0 dma-kmalloc-256 0 0 256 16 1 : tunables 120 60 8 : slabdata 0 0 0 dma-kmalloc-128 0 0 128 32 1 : tunables 120 60 8 : slabdata 0 0 0 kmalloc-4194304 0 0 4194304 1 1024 : tunables 1 1 0 : slabdata 0 0 0 kmalloc-2097152 3 3 2097152 1 512 : tunables 1 1 0 : slabdata 3 3 0 kmalloc-1048576 0 0 1048576 1 256 : tunables 1 1 0 : slabdata 0 0 0 kmalloc-524288 1 1 524288 1 128 : tunables 1 1 0 : slabdata 1 1 0 kmalloc-262144 3 3 262144 1 64 : tunables 1 1 0 : slabdata 3 3 0 kmalloc-131072 7 7 131072 1 32 : tunables 8 4 0 : slabdata 7 7 0 kmalloc-65536 24 24 65536 1 16 : tunables 8 4 0 : slabdata 24 24 0 kmalloc-32768 9 9 32768 1 8 : tunables 8 4 0 : slabdata 9 9 0 kmalloc-16384 16 16 16384 1 4 : tunables 8 4 0 : slabdata 16 16 0 kmalloc-8192 19 19 8192 1 2 : tunables 8 4 0 : slabdata 19 19 0 kmalloc-4096 523 523 4096 1 1 : tunables 24 12 8 : slabdata 523 523 6 kmalloc-2048 3369 3378 2048 2 1 : tunables 24 12 8 : slabdata 1689 1689 12 kmalloc-1024 551 596 1024 4 1 : tunables 54 27 8 : slabdata 149 149 1 kmalloc-512 515 576 512 8 1 : tunables 54 27 8 : slabdata 72 72 27 kmalloc-256 1013 1376 256 16 1 : tunables 120 60 8 : slabdata 86 86 0 kmalloc-node 11392 11392 128 32 1 : tunables 120 60 8 : slabdata 356 356 60 kmem_cache 108 128 128 32 1 : tunables 120 60 8 : slabdata 4 4 0 ]]> LAN: 4 Skipped keep-alive WAN -> LAN due to OOM: 0 Dropped WAN -> LAN: 0 Skipped in LAN -> WAN prebind: 6 Failures in LAN -> WAN prebind: 0 Skipped keep-alive LAN -> WAN: 4 Skipped keep-alive LAN -> WAN due to OOM: 0 Dropped LAN -> WAN: 0 Skipped non ETH_IP: 534 SWNAT IPoE: No headroom available: 0 Headroom realloc failed: 0 Skipped LAN -> WAN (non sane): 0 Dropped LAN -> WAN TTL reached: 0 Skipped LAN -> WAN MTU exceeded: 0 Skipped WAN -> LAN (non sane): 0 Dropped WAN -> LAN TTL reached: 0 Skipped WAN -> LAN MTU exceeded: 0 SWNAT L2TP: Skipped L2TP driver (non sane): 0 Skipped L2TP with wrong length: 1024 Skipped malformed L2TP hdr: 379 Wrong L2TP version in header: 378 Wrong L2TP packet type: 73 Skipped due to use Nr/Ns feature: 186 Packets with L flag: 0 Packets with O flag: 0 Skipped non-IP L2TP: 0 No headroom available: 0 Headroom realloc failed: 0 Skipped LAN -> WAN (non sane): 0 Dropped LAN -> WAN TTL reached: 0 Skipped LAN -> WAN MTU exceeded: 0 Skipped WAN -> LAN (non sane): 0 Dropped WAN -> LAN TTL reached: 0 Skipped WAN -> LAN MTU exceeded: 0 SWNAT PPTP: Skipped PPTP driver (non sane): 0 Skipped PPTP PPP header (non sane): 0 Skipped GRE with wrong length: 2 Skipped GRE with malformed header: 0 Wrong GRE version in header: 0 Wrong GRE PPTP version in header: 0 GRE packets with C flag: 0 GRE packets with R flag: 0 GRE packets without K flag: 0 GRE packets with recursion flags: 0 Skipped non-IP GRE: 0 No headroom available: 0 Headroom realloc failed: 0 Skipped LAN -> WAN (non sane): 0 Dropped LAN -> WAN TTL reached: 0 Skipped LAN -> WAN MTU exceeded: 0 Skipped WAN -> LAN (non sane): 0 Dropped WAN -> LAN TTL reached: 0 Skipped WAN -> LAN MTU exceeded: 0 Dropped due to wrong seqid: 0 SWNAT PPPoE: Skipped PPPoE driver (non sane): 0 Skipped PPPoE PPP header (non sane): 0 Skipped PPPoE frame with wrong length: 96 Skipped PPPoE frame with malformed header: 0 No headroom available: 0 Headroom realloc failed: 0 Skipped LAN -> WAN (non sane): 0 Dropped LAN -> WAN TTL reached: 0 Skipped LAN -> WAN MTU exceeded: 0 Skipped WAN -> LAN (non sane): 0 Dropped WAN -> LAN TTL reached: 0 Skipped WAN -> LAN MTU exceeded: 0 SWNAT Multicast: Skipped as retry limit reached: 0 Skipped as output count is zero: 0 Skipped martian: 0 Skipped as invalid IP header: 0 Not sent in ingress port: 0 Skipped due to OOM in copy: 0 Skipped due to OOM in realloc: 0 Headroom reallocs: 0 Skipped due to MTU exceeed: 0 Skipped due to errors in recv: 0 SWNAT general: Binds limit reached: 0 Binds realloc OOM: 0 Binds alloc OOM: 0 Hash alloc OOM: 0 FNAT prebind CT expired: 0 FNAT prebind proto failed: 0 NDTX prebind PPP invalid: 0 NDTX prebind IPoE invalid: 0 NDTX prebind IPoE raw fixup: 0 NDTX prebind L2TP PPP header invalid: 4121 NDTX prebind PPTP PPP header invalid: 4123 NDTX prebind PPPoE PPP header invalid: 0 NDTX prebind invalid packet: 0 NDTX prebind invalid packet format: 0 NDTX prebind failed: 0 NDTX prebind not matched: 1925 ]]> file not found: proc:driver/eip93-cryptoapi/stats file not found: proc:net/stat/ipt_netflow file not found: proc:net/stat/ipt_netflow_flows FF) CC Ext: FAIL (E1 <-> FF) 0: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 16: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 32: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 48: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 64: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 80: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 96: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 112: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 128: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 144: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 160: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 176: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 192: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 208: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 224: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 240: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ]]> FF) 0: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 16: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 32: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 48: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 64: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 80: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 96: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF 112: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF ]]> stable 3.08.C.3.0-0 3.8.3 Aug 8 23:05:43 yes no stable 3.08.C.3.0-0 3.8.3 base KeeneticOS platform
Provides the core functionality such as packet switching, routing and filtering. Also contains the command line interpreter and webadmin.
Платформа KeeneticOS
Основная часть операционной системы, необходимая для работы всех ее компонентов. Включает в себя базовые возможности коммутации, маршрутизации и фильтрации трафика, а также интерпретатор командной строки и веб-интерфейс.
optional 6685024 0 3.08.C.3.0-0 b231dce72db11f88d142ec77105a5b29 3.08.C.3.0-0 no
cloudcontrol Keenetic mobile application
Provides remote management of your Keenetic via the mobile app for <a href="https://keenetic.com/getapp?android.next&locale=en&from=web">Android</a> and <a href="https://keenetic.com/getapp?ios.next&locale=en&from=web">iOS</a>.
Мобильное приложение «Keenetic»
Обеспечивает удаленное управление интернет-центром через мобильное приложение для <a href="https://keenetic.com/getapp?android.next&locale=ru&from=web">Android</a> и <a href="https://keenetic.com/getapp?ios.next&locale=ru&from=web">iOS</a>.
Applications CloudControl normal cloud 94837 11 0.4.45 0c6cb3d4db9d1debf472d05d7415e8bd 0.4.45 no
corewireless Wi-Fi interface
Provides the core wireless functionality. This component will be installed automatically if needed.
Интерфейс Wi-Fi
Необходим для работы беспроводной сети Wi-Fi.
Base system Mws,WifiRtx normal dhcpd,config-extender 2179383 1 4.9+7.5.0.0-45-1 524051172de4abb3cebd18d127bddd70 4.9+7.5.0.0-45-1 no
ddns Dynamic DNS (DDNS) client
Keeps track of dynamic public IP address on this appliance, and maps it to a static domain name when changed.
Клиент динамической службы DNS (DDNS)
Отслеживает изменения IP-адреса интернет-подключения и автоматически сопоставляет его с зарегистрированным вами доменным именем.
Applications DynDnsClient normal 41840 16 3.08.C.3.0-0 379cae3e7fab0bf1f676e22d30391a18 3.08.C.3.0-0 no
dhcpd DHCP server
Allows a computer to be configured automatically when connected to this device. Install this component if unsure.
Сервер DHCP
Автоматически настраивает параметры IP в локальной сети.
Base system DhcpClient,DhcpRelay critical 123671 4 3.2.49 7a0247178fcf718ca3d8acb40cd54e40 3.2.49 no
dlna Media Server
Allows this device to stream content stored on a USB drive to networked digital media players.
DLNA-сервер
Предоставляет DLNA/UPnP-совместимым плеерам в домашней сети доступ к USB-накопителям.
USB storage Dlna normal storage 992722 17 1.3.0-5 bc791dd09845b1d9692766237dc017d0 1.3.0-5 no
dns-filter Cloud-based content filtering and ad blocking
Cloud-based content filtering and ad blocking.
Фильтрация контента и блокировка рекламы при помощи облачных сервисов
Фильтрация контента и блокировка рекламы при помощи облачных сервисов.
Internet filters DnsFilter optional 105129 30 3.08.C.3.0-0 5c27794105338e0c88c6cce85b76cf36 3.08.C.3.0-0 no
dns-https DNS-over-HTTPS proxy
Provides domain names resolution via secure DNS-over-HTTPS protocol.
Прокси-сервер DNS-over-HTTPS
Обеспечивает разрешение доменных имен по защищенному протоколу DNS-over-HTTPS.
Applications DnsHttps normal 620773 41 2.0-5-1 c8a801a90a30ad4202663159c18f542e 2.0-5-1 no
dns-tls DNS-over-TLS proxy
Provides domain names resolution via secure DNS-over-TLS protocol.
Прокси-сервер DNS-over-TLS
Обеспечивает разрешение доменных имен по защищенному протоколу DNS-over-TLS.
Applications DnsTls normal 248347 40 0.4.0-1 d37df8b8900354929d9ad49288a1fb27 0.4.0-1 no
dot1x 802.1X client
Provides a login/password based authentication support over Ethernet networks.
Клиент 802.1X
Требуется для подключения интернет-центра к сети Ethernet, доступ к которой контролируется стандартом 802.1X.
Networking Dot1x normal 111774 5 0.5.9-7 b35c793b9039420486785557ac9739c6 0.5.9-7 no
easyconfig Initial Setup Wizard
Step-by-step Internet connection setup.
Мастер первоначальной настройки
Мастер начальной настройки интернет-подключения.
Base system EasyConfig normal ndw3 27501 0 3.08.C.3.0-0 b86b15e9ed7bbdc8ea79bde7658932a9 3.08.C.3.0-0 no
exfat exFAT filesystem
Allows an exFAT-formatted USB drive to be connected to this device.
Файловая система exFAT
Необходим для работы с файловой системой exFAT на USB-накопителях.
USB storage normal storage 65138 5 4.9+5.11.16-1-1 7609db1594e7afe37ac588e30e3e5e68 4.9+5.11.16-1-1 no
ext Ext filesystem
Allows an Ext-formatted USB drive to be connected to this device.
Файловая система Ext
Необходим для работы с файловой системой Ext на USB-накопителях.
USB storage normal storage 326288 6 4.9-1 c8940b2d4e6a9e6b1331ae733032f44b 4.9-1 no
fat FAT32 filesystem
Allows a FAT32-formatted USB drive to be connected to this device.
Файловая система FAT32
Необходим для работы с файловой системой FAT32 на USB-накопителях.
USB storage normal storage 239008 2 4.9+20220427-1 81b214a8cc7b6e2ecd305f466063d622 4.9+20220427-1 no
hfsplus HFS+ filesystem
Allows an HFS+-formatted USB drive to be connected to this device.
Файловая система HFS+
Необходим для работы с файловой системой HFS+ на USB-накопителях.
USB storage normal storage 76276 3 4.9+20220427-1 1289216b0ba6a23dcc85a65513ae4617 4.9+20220427-1 no
igmp IGMP/PPPoE proxy service
The IGMP/PPPoE proxy relays IGMP/PPPoE traffic between network segments.
Прокси-службы для IGMP и PPPoE
Ретранслируют пакеты протоколов IGMP или PPPoE между выбранными интерфейсами.
Base system Igmp normal 62887 5 0.0.35 7e2abf7abefa859f39c054f8d0c48c79 0.0.35 no
l2tp L2TP client
Allows to establish L2TP connections from this device.
Клиент L2TP
Позволяет интернет-центру подключаться к VPN-серверу L2TP. Протокол L2TP может использоваться интернет-провайдером для авторизации пользователей.
Networking L2tp normal ppp 236227 4 2.4.4-50-1 118b74db4907d394e5964ad81e7e1684 2.4.4-50-1 no
lang-en English English Languages important 118003 1 3.08.C.3.0-0 df7d730cfa7a9e5fa3c3779576bfe8d2 3.08.C.3.0-0 no lang-ru Русский Русский Languages normal 154115 7 3.08.C.3.0-0 5bb526f5ea38ebf8525eeda46ed9d810 3.08.C.3.0-0 no miniupnpd UPnP service
Allows the NAT and firewall rules on this device to be configured automatically.
Служба UPnP
Позволяет автоматически настраивать необходимые правила NAT и межсетевого экрана.
Base system UPnP normal 100031 6 2.0-16 f12c5b85ef3141e2569a44237b5df8b5 2.0-16 no
mws Wi-Fi system controller
Centralized Mesh Wi-Fi System management.
Контроллер Wi-Fi-системы
Централизованное управление Mesh Wi-Fi-системой
Base system MwsController normal corewireless,dhcpd 125905 10 3.08.C.3.0-0 7114ab8ce46e4be5df2cd0aba15f6642 3.08.C.3.0-0 no
nathelper-ftp Application-layer gateway (ALG) for FTP
Provides customized NAT traversal filters to support address and port translation for FTP protocol.
Шлюз прикладного уровня (ALG) для FTP
Предоставляет настроенные фильтры обхода NAT для поддержки преобразования адресов и портов для протокола FTP.
Networking FtpAlg normal 15913 18 4.9-1 a260e3fa15ce6a57ee4069e09bf37e3b 4.9-1 no
nathelper-h323 Application-layer gateway (ALG) for H.323
Provides customized NAT traversal filters to support address and port translation for H.323 protocol.
Шлюз прикладного уровня (ALG) для H.323
Предоставляет настроенные фильтры обхода NAT для поддержки преобразования адресов и портов для протокола H.323.
Networking normal 27101 22 4.9-1 9b3b7ade581fb1674f2553e0f97cfdcb 4.9-1 no
nathelper-pptp Application-layer gateway (ALG) for PPTP/GRE
Provides customized NAT traversal filters to support address and port translation for PPTP/GRE protocols.
Шлюз прикладного уровня (ALG) для PPTP/GRE
Предоставляет настроенные фильтры обхода NAT для поддержки преобразования адресов и портов для протокола PPTP/GRE.
Networking normal 11000 19 4.9-1 7c2a408db7af75f780fb1d0650f611a3 4.9-1 no
nathelper-rtsp Application-layer gateway (ALG) for RTSP
Provides customized NAT traversal filters to support address and port translation for RTSP protocol.
Шлюз прикладного уровня (ALG) для RTSP
Предоставляет настроенные фильтры обхода NAT для поддержки преобразования адресов и портов для протокола RTSP.
Networking normal 18854 20 4.9+5.3-ndm-1-1 0a04fa486934ae82dbf2d4cc139636fe 4.9+5.3-ndm-1-1 no
nathelper-sip Application-layer gateway (ALG) for SIP
Provides customized NAT traversal filters to support address and port translation for SIP protocol.
Шлюз прикладного уровня (ALG) для SIP
Предоставляет настроенные фильтры обхода NAT для поддержки преобразования адресов и портов для протокола SIP.
Networking SipAlg normal 33933 21 4.9-1 cee8aebc326f255a0ccd3bfb92df93af 4.9-1 no
ndmp Applications CloudNdmp normal ndns 72241 32 3.08.C.3.0-0 5ca57b508338d47855a3c49ada03870e 3.08.C.3.0-0 no ndns Cloud-based remote control and KeenDNS
Required for remote management of your Keenetic using the Keenetic RMM and KeenDNS service.
Агент облачной службы Keenetic Cloud и KeenDNS
Необходим для работы Keenetic RMM и сервиса KeenDNS.
Applications Ndns,Acme normal cloud 122099 11 3.08.C.3.0-0 7cbd72dba1875932863f9bb55092666c 3.08.C.3.0-0 no
ntfs NTFS filesystem
Allows a NTFS-formatted USB drive to be connected to this device.
Файловая система NTFS
Необходим для работы с файловой системой NTFS на USB-накопителях.
USB storage normal storage 337 1 4.9+20220427-1 d5444585f81e91ec7ed0e254b70f8f44 4.9+20220427-1 no
openvpn OpenVPN client and server
Allows to create OpenVPN tunnels.
Клиент и сервер OpenVPN
Позволяет создавать туннели OpenVPN.
Networking OpenVpn normal 366335 12 2.4.6-12 52ce28820b21a6ab534e176544bfafae 2.4.6-12 no
pingcheck Internet connection status monitoring (Ping Check)
Performs icmp- and tcp-based tests to verify the Internet connection status. Test results may be used to switch between primary and backup connections.
Контроль состояния интернет-подключения (Ping Check)
Определяет работоспособность подключения к Интернету по доступности заданного узла. Результат проверки может быть использован для переключения между основным и резервным подключениями к Интернету.
Applications PingCheckClient normal 49203 12 3.08.C.3.0-0 dd8d6f244d47a2d00192603a5a60d8b3 3.08.C.3.0-0 no
ppe Network accelerator engine
Improves routing performance.
Сетевой ускоритель
Увеличивает скорость маршрутизации.
Base system PpeRtx optional 107850 3 4.9+5.0-25-1 cb6b97149debe514a639c185581f4f73 4.9+5.0-25-1 no
pppoe PPPoE client
Allows to establish PPPoE connections from this device.
Клиент PPPoE
Позволяет интернет-центру устанавливать PPPoE-соединение. Протокол PPPoE может использоваться интернет-провайдером для авторизации пользователей.
Networking Pppoe,PppoePass normal ppp 57116 2 2.4.4-50-1 89b4c514dbddcfd77d936368c26bc31f 2.4.4-50-1 no
pptp PPTP client
Allows to establish PPTP connections from this device.
Клиент PPTP
Позволяет интернет-центру подключаться к VPN-серверу PPTP. Протокол PPTP может использоваться интернет-провайдером для авторизации пользователей.
Networking Pptp normal ppp 41276 3 2.4.4-50-1 49390841c6981ca2fd59dca5d037cf10 2.4.4-50-1 no
skydns SkyDNS
Safe Internet browsing.
SkyDNS
Защита подключаемых к интернет-центру домашних устройств от опасных сайтов и нежелательного контента с гибкой настройкой в личном кабинете SkyDNS.
Internet filters SkyDnsClient normal EA,RU dns-filter 45177 3 3.08.C.3.0-0 4dbecacc40384e9621b94f48c9a2bdc3 3.08.C.3.0-0 no
storage USB storage support
Allows a USB drive to be connected to this device.
Поддержка USB-накопителей
Необходим для работы с USB-накопителями.
USB storage Storage normal usb 696781 0 4.9-1 c424e9a4586c5c0482cae5541b552b44 4.9-1 no
trafficcontrol Traffic shaper
Provides basic network bandwidth limitation functionality.
Ограничение скорости Интернета для клиентов (Шейпер трафика)
Позволяет ограничивать скорость прохождения трафика для отдельных локальных устройств и сегментов сети.
Applications TrafficControl normal 83083 14 4.9+6.0.9-1 34d46edcac46735a6ab562a96a93254e 4.9+6.0.9-1 no
tsmb SMB file and printer sharing
Allows sharing of USB drives and printers with Windows/Apple/Linux computers and other networked devices.
Общий доступ к файлам и принтерам по протоколу SMB
Предоставляет доступ к USB-накопителям и принтерам для компьютеров под управлением Windows и Linux, компьютеров Apple и других сетевых устройств.
USB storage Cifs,CifsTsmb normal storage,mdns 902803 14 3020.9.24.13-2-1 54e24a2ab734fd7c7e17a9cb20c8b368 3020.9.24.13-2-1 no
usb USB interface
Allows to use the USB host port on this device.
Интерфейс USB
Необходим для работы с USB-устройствами.
Base system Usb optional 207494 2 4.9-1 5ffa12d1ec0de4dde185e473f167103c 4.9-1 no
usblte NDIS interface for 4G/3G USB modems
Enables 4G/3G network connection via a USB modem with an NDIS interface.
Интерфейс NDIS для 4G/3G USB-модемов
Позволяет подключаться к сети 4G/3G через USB-модем с интерфейсом NDIS.
USB modems UsbLte normal dhcpd,mobile,usb 181187 13 3.08.C.3.0-0 09fcb789df0366fb7c3f176b125a5da7 3.08.C.3.0-0 no
usbmodem Serial interface for 4G/3G USB modems
Enables 4G/3G network connection via a USB modem with a serial interface.
Последовательный интерфейс для 4G/3G USB-модемов
Позволяет подключаться к сети 4G/3G через USB-модем с последовательным интерфейсом.
USB modems UsbModem normal mobile,usb,ppp 67601 11 3.08.C.3.0-0 e46a0ee6e06d24adfeb5f478e44934e5 3.08.C.3.0-0 no
usbnet CDC Ethernet interface for 4G/3G USB modems
Enables 4G/3G network connection via a USB modem of the CDC Ethernet type.
Интерфейс CDC Ethernet для 4G/3G USB-модемов
Позволяет подключаться к сети 4G/3G через CDC Ethernet USB-модем.
USB modems UsbEthernet normal mobile,usb,dhcpd 120317 12 3.08.C.3.0-0 3f7a8bb1db90b6a20755be487efb2379 3.08.C.3.0-0 no
usbqmi QMI interface for 4G/3G USB modems
Enables 4G/3G network connection via an external - or internal (on select Keenetic models) - USB modem that supports the QMI protocol.
Интерфейс QMI для 4G/3G USB-модемов
Позволяет подключаться к сети 4G/3G через внешний или встроенный (на некоторых моделях Keenetic) USB-модем с интерфейсом QMI.
USB modems UsbQmi normal dhcpd,mobile,usb 185887 14 3.08.C.3.0-0 8819ba00211087c853e7633f79d5de4f 3.08.C.3.0-0 no
webdav WebDAV server
Allows secure file sharing via the WebDAV protocol.
Сервер WebDAV
Обеспечивает безопасный доступ к файлам по протоколу WebDAV.
USB storage WebDav normal storage,ndns 976463 21 1.5.44-9 36d33f0470d73ad0b5e0a7c7115b2a76 1.5.44-9 no
Applications Utilities and services 6 Утилиты и сервисы Base system Basic components 2 Базовые компоненты Internet filters Internet safety 4 Интернет-фильтры Languages Languages
Please select your desired web interface languages (maximum three).
1 3 Языки
Пожалуйста, выберите желаемые языки веб-конфигуратора (максимум три).
Networking Network functions 5 Сетевые функции USB modems USB modems and extension modules 7 USB-модемы и модули расширения USB storage USB drives 8 USB-накопители a98bb54f197bc499192862ee.keenetic.io yes no no 2022-07-26T14:06:12.000Z 2022-10-23T14:06:12.000Z nailrouter.keenetic.link yes no no 2022-07-31T17:22:22.000Z 2022-10-28T17:22:22.000Z yes yes nailrouter.keenetic.link yes no a98bb54f197bc499192862ee.keenetic.io yes no no no no no no 0 0 85033 0 448272940 -12782769 11886 86:32:ec:e9:77:bc WifiMaster1/AccessPoint0 yes 867 1354 4563508 21971174 80 11ac 400 -50 9 2 yes no <_11>k <_11>r <_11>v ft wpa2-psk 1 8 8 2022 23 29 27 78 inactive Europe/Moscow 10800 0 no MSK-3 no ACTIVE a98bb54f197bc499192862ee8d1b88cd 0 5 57 7 30 10 0 27 yes 79.143.73.201 9 79.143.73.201, 193.135.134.186 udp 0 84872 200 0 0 0 0 0 0 keenetic.io yes 0 0 a98bb54f197bc499192862ee.keenetic.io Mon, 8 Aug 2022 20:23:14 GMT
Keenetic Giga
2.06.1
http/rci
dea5d6b375173af656c71c3594fa9369
Mon, 8 Aug 2022 20:23:14 GMT
admin
interface 0.001 0.263 0.340 37 show/rc/interface 0.007 0.183 0.486 155 interface/openvpn/config 0.074 0.074 0.074 1 show/ip/nat 0.039 0.039 0.039 1 interface/up 0.002 0.024 0.049 4 show/interface 0.001 0.020 0.041 615 components/list 0.000 0.014 0.028 7 show/clock/timezone-list 0.006 0.009 0.014 3 show/ip/hotspot 0.002 0.005 0.007 55 show/ip/route 0.004 0.004 0.005 2 182611325431755 ndss.keenetic.ru *************** Keenetic-1015 ******** ******** RU KN-1011 Giga 7910de0c91845345804e51c9df626bee S2148WF003286 valid ok yes System Policy0 nf_nat_ftp 1636 0 - - nf_conntrack_ftp 5998 1 nf_nat_ftp ports=21 nf_nat_sip 9076 0 - - nf_conntrack_sip 21751 1 nf_nat_sip sip_direct_media=0 fastvpn 144092 0 - - hw_nat 69585 0 - - igmpsn 13668 0 - pcfg=eth2.1:ra5:ra0 xhci_mtk 3884 0 - ? xhci_hcd 107246 1 xhci_mtk ? ntc 60933 2 - - mt7915_ap 2398206 4 - - ubifs 300494 1 - - ubi 118713 2 ubifs - mt7621_eth 136461 1 hw_nat mac="50:ff:20:78:b0:1b" nacct 39750 0 - - rndis_host 5922 0 - - qcserial 5412 0 - - cdc_ether 5927 1 rndis_host - huawei_cdc_ncm 2030 0 - - qmi_wwan 14340 0 - - option 34104 0 - - cdc_ncm 18936 1 huawei_cdc_ncm - usb_wwan 5611 2 qcserial,option - usbextras 2261 0 - - exfat 72136 0 - - nls_utf8 1088 0 - - zstd 1856 1 - - kalmia 3235 0 - - thfsplus 109737 0 - - nf_nat_rtsp 4937 0 - - nls_cp1251 3874 0 - - usb_storage 45085 1 - ? cdc_acm 17852 0 - ? l2tp_ppp 16690 0 - - usblp 11555 0 - - btmtk_uart 16669 0 - - sd_mod 32280 2 - - sr_mod 14976 0 - - nls_cp437 4641 1 - - sierra 8161 0 - - sg 21456 0 - - usbnet 22472 6 rndis_host,cdc_ether,huawei_cdc_ncm,qmi_wwan,cdc_ncm,kalmia - ext4 430111 0 - - tfat 394111 1 - - zstd_decompress 52529 1 zstd - deflate 1999 1 - - nls_cp866 4129 0 - - tntfs 567755 0 - - jffs2 109127 0 - - cdc_wdm 10518 2 huawei_cdc_ncm,qmi_wwan ? l2tp_core 17466 1 l2tp_ppp - zstd_compress 191943 1 zstd - aead 4579 0 - - usbserial 22786 4 qcserial,option,usb_wwan,sierra - nf_nat_pptp 1882 0 - - nf_nat_h323 6255 0 - - usbcore 163867 19 xhci_mtk,xhci_hcd,rndis_host,qcserial,cdc_ether,huawei_cdc_ncm,qmi_wwan,option,cdc_ncm,usb_wwan,usbextras,kalmia,usb_storage,cdc_acm,usblp,sierra,usbnet,cdc_wdm,usbserial - nf_conntrack_pptp 4200 1 nf_nat_pptp - crc32c_generic 1696 0 - - cdrom 28629 1 sr_mod - resetnds 1302 0 - - mtdoops_proc 6793 0 - - nf_conntrack_h323 38583 1 nf_nat_h323 - zlib_deflate 20396 2 deflate,jffs2 - jbd2 67841 1 ext4 - nls_base 5723 9 exfat,nls_utf8,thfsplus,nls_cp1251,nls_cp437,tfat,nls_cp866,tntfs,usbcore - ip6_udp_tunnel 1911 1 l2tp_core - xxhash 8683 2 zstd_decompress,zstd_compress - sch_cake 34555 0 - - nf_conntrack_proto_gre 3772 1 nf_conntrack_pptp - phr 60188 3 mt7915_ap - mbcache 4857 1 ext4 - nf_conntrack_rtsp 5145 1 nf_nat_rtsp - ndm_storage 1358 0 - - ip_gre 13652 0 - - zlib_inflate 14532 2 deflate,jffs2 - bluetooth 366634 1 btmtk_uart - scsi_mod 106223 4 usb_storage,sd_mod,sr_mod,sg - udp_tunnel 2759 1 l2tp_core - crypto_null 3054 1 aead - tsmb 646726 1 - - usb_common 1726 1 usbcore ? nf_nat_proto_gre 1317 1 nf_nat_pptp - _WEBADMIN unknown Thu Jan 1 03:00:00 2015 24888:90:17:ac:be:9a:dc 1 nobind client remote vpn.antizapret.prostovpn.org remote-cert-tls server dev tun proto tcp pull-filter ignore "block-outside-dns" cipher AES-128-CBC setenv opt tls-cipher "DEFAULT:@SECLEVEL=0" resolv-retry infinite persist-key persist-tun setenv FRIENDLY_NAME "AntiZapret VPN TCP" pull-filter ignore "ifconfig-ipv6 " pull-filter ignore "route-ipv6 " <ca>*** stripped ***</ca> <cert>*** stripped ***</cert> <key>*** stripped ***</key> client dev tun proto udp remote 152.89.163.245 1194 resolv-retry infinite remote-random nobind tun-mtu 1500 tun-mtu-extra 32 mssfix 1450 persist-key persist-tun ping 15 ping-restart 0 ping-timer-rem reneg-sec 0 remote-cert-tls server pull-filter ignore "block-outside-dns" <auth-user-pass>*** stripped ***</auth-user-pass> #comp-lzo verb 3 pull fast-io cipher AES-256-CBC auth SHA512 <ca>*** stripped ***</ca> key-direction 1 <tls-auth>*** stripped ***</tls-auth> 0 0 0 {"version":8,"profiles":[{"id":"opendns-family","short":{"en":"OpenDNS - FamilyShield","ru":"OpenDNS - FamilyShield","uk":"OpenDNS - FamilyShield","tr":"OpenDNS - FamilyShield","sv":"OpenDNS - FamilyShield","pt":"OpenDNS - FamilyShield","pl":"OpenDNS - FamilyShield","it":"OpenDNS - FamilyShield","fr":"OpenDNS - FamilyShield","es":"OpenDNS - FamilyShield","de":"OpenDNS - FamilyShield"},"description":{"en":"Blocks domains that are categorized as Tasteless, Proxy/Anonymizer, Sexuality and Pornography.","ru":"Блокирует домены, относящиеся к категориям Бестактность, Прокси/Анонимайзер, Сексуальность и Порнография.","uk":"Блокує домени, які характеризуються як Несмак, Проксі/Анонімайзер, Сексуальність та Порнографія.","tr":"Tatsız (Tasteless), Proxy/Anonimleştirici (Anonymizer), Cinsellik ve Pornografi olarak kategorize edilen alanları engeller.","sv":"Blockerar domäner som kategoriseras som smaklösa, proxy/anonymisering, sexualitet och pornografi.","pt":"Bloqueia domínios categorizados como inapropriados, proxy/anonimizador, sexualidade e pornografia.","pl":"Blokuje domeny sklasyfikowane jako Niesmaczne, Proxy/Anonimizator, Seksualność i Pornografia.","it":"Blocca i domini classificati come inappropriato, proxy/anonimo, sessualità e pornografia.","fr":"Bloque les domaines classés comme étant inappropriés, les proxy/sites web de navigation anonyme, la sexualité et la pornographie.","es":"Bloquea los dominios categorizados como inapropiados, proxy/anonimizador, sexualidad y pornografía.","de":"Sperrt Domänen, die als geschmacklos, Proxy/Anonymizer, Sexualität und Pornografie kategorisiert sind."},"url":"https://www.opendns.com/home-internet-security/","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"208.67.222.123","port":53},{"address":"208.67.220.123","port":53},{"address":"2620:119:35::123","port":53},{"address":"2620:119:53::123","port":53}],"dns-over-https":[{"uri":"https://doh.familyshield.opendns.com/dns-query"}]},{"id":"quad9-security","short":{"en":"Quad9 - Security Protection","ru":"Quad9 - Обеспечение безопасности","uk":"Quad9 - Забезпечення беспеки","tr":"Quad9 - Güvenlik Koruması","sv":"Quad9 - Säkerhetsskydd","pt":"Quad9 - Proteção de segurança","pl":"Quad9 - Ochrona bezpieczeństwa","it":"Quad9 - Protezione di sicurezza","fr":"Quad9 - Protection de la sécurité","es":"Quad9 - Protección de seguridad","de":"Quad9 - Sicherheitsschutz"},"description":{"en":"Blocks malicious hostnames to protect against a wide range of threats such as malware, phishing, spyware, and botnets. Improves performance in addition to guaranteeing privacy.","ru":"Блокирует имена вредоносных хостов для защиты от широкого спектра угроз: вредоносных и шпионских программ, фишинга и ботнетов. Повышает производительность в дополнение к обеспечению конфиденциальности.","uk":"Блокує імена шкідливих хостів для захисту від широкого спектру загроз: шкідливих та шпигунських програм, фішинга та ботнетів. Збільшує продуктивність на додаток до забезпечення конфіденційності.","tr":"Kötü amaçlı yazılım, kimlik avı, casus yazılım ve botnet'ler gibi çok çeşitli tehditlere karşı koruma sağlamak için kötü amaçlı ana bilgisayar adlarını engeller. Gizliliği garanti etmenin yanı sıra performansı artırır.","sv":"Blockerar skadliga värdnamn för att skydda mot ett brett utbud av hot som skadlig kod, nätfiske, spionprogram och botnet. Förbättrar prestanda förutom att garantera säkerhet.","pt":"Bloqueia hostnames maliciosos para proteger contra uma vasta gama de ameaças tais como malware, phishing, spyware, e botnets. Melhora o desempenho, para além de garantir a privacidade.","pl":"Blokuje złośliwe nazwy hostów w celu ochrony przed wieloma różnymi zagrożeniami, takimi jak złośliwe oprogramowanie, phishing, spyware i botnety. Poprawia wydajność i gwarantuje prywatność.","it":"Blocca i nomi host dannosi per proteggere da un'ampia gamma di minacce come malware, phishing, spyware e botnet. Migliora le prestazioni oltre a garantire la privacy.","fr":"Bloque les noms d'hôtes malveillants pour se protéger contre un large éventail de menaces telles que les programmes malveillants, le phishing, les logiciels espions et les botnets. Améliore les performances en plus de garantir la confidentialité.","es":"Bloquea los nombres de host maliciosos para protegerlos de un amplio abanico de amenazas como el \"malware\", el \"phishing\", el \"spyware\" y las redes de bots. Mejora el rendimiento además de garantizar la privacidad.","de":"Sperrt böswillige Hostnamen zum Schutz gegen ein breites Spektrum an Bedrohungen wie Malware, Phishing, Spyware und Botnets. Verbessert Leistung und garantiert zusätzlich die Privatsphäre."},"url":"https://quad9.net/home/individuals/","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"9.9.9.9","port":53},{"address":"149.112.112.112","port":53},{"address":"2620:fe::fe","port":53},{"address":"2620:fe::9","port":53}],"dns-over-tls":[{"address":"dns.quad9.net","port":853,"sni":"dns.quad9.net"}],"dns-over-https":[{"uri":"https://dns.quad9.net/dns-query"}]},{"id":"cleanbrowsing-security","short":{"en":"CleanBrowsing - Security Filter","ru":"CleanBrowsing - Защитный фильтр","uk":"CleanBrowsing - Захисний фільтр","tr":"CleanBrowsing - Güvenlik Filtresi","sv":"CleanBrowsing - Säkerhetsfilter","pt":"CleanBrowsing - Filtro de segurança","pl":"CleanBrowsing - Filtr bezpieczeństwa","it":"CleanBrowsing - Filtro di sicurezza","fr":"CleanBrowsing - Filtre de sécurité","es":"CleanBrowsing - Filtro de seguridad","de":"CleanBrowsing - Sicherheitsfilter"},"description":{"en":"Blocks access to phishing, spam, malware and malicious domains. Our database of malicious domains is updated hourly and considered to be one of the best in the industry. Note that it does not block adult content.","ru":"Блокирует доступ к фишинговым, спамовым, вредоносным и опасным доменам. Наша база данных опасных доменов обновляется ежечасно и считается одной из лучших в отрасли. Не блокирует контент для взрослых.","uk":"Блокує доступ до фішингових, спамових, шкідливих та небезпечних доменів. Наша база даних небезпечних доменів оновлюється щогодини та вважається однією з кращих в галузі. Не блокує контент для дорослих.","tr":"Kimlik avı, spam, kötü amaçlı yazılım ve kötü amaçlı etki alanlarına erişimi engeller. Kötü amaçlı alan adlarından oluşan veritabanımız saatlik olarak güncellenir ve sektördeki en iyilerden biri olarak kabul edilir. Bu ayarın yetişkin içerikleri engellemediğine dikkat edin.","sv":"Blockerar åtkomst till nätfiske, spam, skadlig kod och skadliga domäner. Vår databas med skadliga domäner uppdateras varje timme och anses vara en av de bästa i branschen. Observera att det inte blockerar åtkomst till vuxetinnehåll.","pt":"Bloqueia o acesso a phishing, spam, malware e domínios maliciosos. A nossa base de dados de domínios maliciosos é atualizada a cada hora e considerada como uma das melhores do setor. Note-se que não bloqueia o conteúdo para adultos.","pl":"Blokuje dostęp do domen phishingowych, spamu, złośliwego oprogramowania i złośliwych domen. Nasza baza danych złośliwych domen jest aktualizowana co godzinę i uznawana za jedną z najlepszych w branży. Pamiętaj, że nie blokuje treści dla dorosłych.","it":"Blocca l'accesso a domini dannosi, phishing, spam e malware. Il nostro database di domini dannosi viene aggiornato ogni ora e considerato uno dei migliori del settore. Tieni presente che non blocca i contenuti per adulti.","fr":"Bloque l'accès au phishing, au spam, aux programmes et domaines malveillants. Notre base de données de domaines malveillants est mise à jour toutes les heures et est considérée comme l'une des meilleures du secteur. Notez que les contenus pour adultes ne sont pas bloqués.","es":"Bloquea el acceso a \"phishing\", correo basura, \"malware\" y dominios maliciosos. Nuestra base de datos de dominios maliciosos se actualiza cada hora y está considerada como una de las mejores del sector. Tenga en cuenta que no bloquea el contenido para adultos.","de":"Sperrt den Zugang zu Phishing-, Spam-, Malware- und böswilligen Domänen. Unsere Datenbank mit böswilligen Domänen wird stündlich aktualisiert und gilt als eine der besten in der Branche. Beachten Sie, dass dieser Filter keine Erwachseneninhalte blockiert."},"url":"https://cleanbrowsing.org/filters","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"185.228.168.9","port":53},{"address":"185.228.169.9","port":53},{"address":"2a0d:2a00:1::2","port":53},{"address":"2a0d:2a00:2::2","port":53}],"dns-over-tls":[{"address":"security-filter-dns.cleanbrowsing.org","port":853,"sni":"security-filter-dns.cleanbrowsing.org"}],"dns-over-https":[{"uri":"https://doh.cleanbrowsing.org/doh/security-filter/"}]},{"id":"cleanbrowsing-adult","short":{"en":"CleanBrowsing - Adult Filter","ru":"CleanBrowsing - Фильтр для взрослых","uk":"CleanBrowsing - Фільтр контенту для дорослих","tr":"CleanBrowsing - Yetişkin Filtresi","sv":"CleanBrowsing - Vuxenfilter","pt":"CleanBrowsing - Filtro de conteúdo para adultos","pl":"CleanBrowsing - Filtr treści dla dorosłych","it":"CleanBrowsing - Filtro per adulti","fr":"CleanBrowsing - Filtre pour adultes","es":"CleanBrowsing - Filtro para adultos","de":"CleanBrowsing - Erwachsenen-Filter"},"description":{"en":"Blocks access to all adult, pornographic and explicit sites. It does not block proxy or VPNs, nor mixed-content sites. Sites like Reddit are allowed. Google and Bing are set to the Safe Mode. Malicious and Phishing domains are blocked.","ru":"Закрывает доступ ко всем сайтам для взрослых, порнографическим и откровенным сайтам. Прокси и VPN-домены, сайты смешанного содержания (такие как Reddit) не блокируются. Для Google, Bing и YouTube запросы обслуживаются в безопасном режиме. Вредоносные и фишинговые домены блокируются.","uk":"Блокує доступ до всіх сайтів для дорослих, порнографічних та відвертих сайтів. Не блокуються проксі та VPN, а також сайти змішаного змісту. Сайти такі як Reddit дозволені. Для Google, Bing та YouTube запити обслуговуються в безпечному режимі. Шкідливі та фішингові домени блокуються.","tr":"Tüm yetişkinlere yönelik, pornografik ve müstehcen sitelere erişimi engeller. Proxy veya VPN'leri veya karışık içerikli siteleri engellemez. Reddit gibi sitelere izin verilir. Google ve Bing, Güvenli Mod'a ayarlanmıştır. Kötü amaçlı ve Kimlik Avı alanları engellenir.","sv":"Blockerar åtkomst till webbplatser med vuxet, pronografiskt eller explicit innehåll. Det blockerar inte proxy eller VPN, inte heller webbplatser med blandat innehåll. Google och Bing ställs in på säkert läge. Skadliga och nätfiskedomäner blockeras.","pt":"Bloqueia o acesso a todos os sites para adultos, pornográficos e explícitos. Não bloqueia proxy ou VPN, nem sites de conteúdo misto. Sites como o Reddit são permitidos. O Google e o Bing estão configurados para o Modo de Segurança. Os domínios maliciosos e Phishing são bloqueados.","pl":"Blokuje dostęp do wszystkich stron dla dorosłych, stron pornograficznych i wulgarnych. Nie blokuje proxy ani VPN, ani witryn o mieszanej treści. Strony takie jak Reddit są dozwolone. Google i Bing są ustawione na tryb bezpieczny. Złośliwe domeny i domeny phishingowe są blokowane.","it":"Blocca l'accesso a tutti i siti per adulti, pornografici ed espliciti. Non blocca proxy o VPN, né siti a contenuto misto. Sono consentiti siti come Reddit. Google e Bing sono impostati sulla modalità sicura (o provvisoria). I domini dannosi e di phishing sono bloccati.","fr":"Bloque l'accès à tous les sites pour adultes, pornographiques et explicites. Il ne bloque pas les proxy ou les VPN, ni les sites à contenu mixte. Les sites comme Reddit sont autorisés. Google et Bing sont configurés sur le mode sans échec. Les domaines malveillants et de phishing sont bloqués.","es":"Bloquea el acceso a todos los sitios para adultos, pornográficos y explícitos. No bloquea proxys ni VPN, ni sitios de contenido mixto. Se permiten sitios como Reddit. Google y Bing están configurados en modo seguro. Los dominios maliciosos y de \"phishing\" están bloqueados.","de":"Sperrt den Zugang zu allen Erwachsenen-. pornografischen und expliziten Websites. Der Filter sperrt keine Proxys oder VPNs, und er sperrt auch keine Websites mit gemischten Inhalten. Websites wie Reddit sind erlaubt. Google und Bing sind auf den sicheren Modus eingestellt. Böswillige und Phishing-Domänen werden blockiert."},"url":"https://cleanbrowsing.org/filters","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"185.228.168.10","port":53},{"address":"185.228.169.11","port":53},{"address":"2a0d:2a00:1::1","port":53},{"address":"2a0d:2a00:2::1","port":53}],"dns-over-tls":[{"address":"adult-filter-dns.cleanbrowsing.org","port":853,"sni":"adult-filter-dns.cleanbrowsing.org"}],"dns-over-https":[{"uri":"https://doh.cleanbrowsing.org/doh/adult-filter/"}]},{"id":"cleanbrowsing-family","short":{"en":"CleanBrowsing - Family Filter","ru":"CleanBrowsing - Семейный фильтр","uk":"CleanBrowsing - Сімейний фільтр","tr":"CleanBrowsing - Aile Filtresi","sv":"CleanBrowsing - Familjefilter","pt":"CleanBrowsing - Filtro familiar","pl":"CleanBrowsing - Filtr rodzinny","it":"CleanBrowsing - Filtro famiglia","fr":"CleanBrowsing - Filtre familial","es":"CleanBrowsing - Filtro familiar","de":"CleanBrowsing - Familien-Filter"},"description":{"en":"Blocks access to all adult, pornographic and explicit sites. It also blocks proxy and VPN domains that are used to bypass the filters. Mixed content sites (like Reddit) are also blocked. Google, Bing and YouTube are set to the Safe Mode. Malicious and Phishing domains are blocked.","ru":"Закрывает доступ ко всем сайтам для взрослых, порнографическим и откровенным сайтам. Блокируются прокси и VPN-домены, которые используются для обхода фильтров, а также сайты смешанного содержания (такие как Reddit). Для Google, Bing и YouTube запросы обслуживаются в безопасном режиме. Вредоносные и фишинговые домены блокируются.","uk":"Блокує доступ до всіх сайтів для дорослих, порнографічних та відвертих сайтів. Блокуються проксі та VPN-домени, що використовуються для обходу фільтрів, а також сайти змішаного змісту (такі як Reddit). Для Google, Bing та YouTube запити обслуговуються в безпечному режимі. Шкідливі та фішингові домени блокуються.","tr":"Tüm yetişkinlere yönelik, pornografik ve müstehcen sitelere erişimi engeller. Ayrıca filtreleri atlamak için kullanılan proxy ve VPN alan adlarını da engeller. Karışık/hibrid içerik siteleri (Reddit gibi) de engellenir. Google, Bing ve Youtube Güvenli Mod'a ayarlanmıştır. Kötü amaçlı ve Kimlik Avı alanları engellenir.","sv":"Blockera åtkomst till alla webbplatser med vuxet, pornografiskt och explicit innehåll. Det blockerar även proxy och VPN-domäner som används för att gå förbi filtren. Webbplatser med blandat innehåll (som Reddit) blockeras också. Google, Bing och Youtube ställs in på säkert läge. Skadliga och nätfiskedomäner blockeras.","pt":"Bloqueia o acesso a todos os sites para adultos, pornográficos e explícitos. Também bloqueia os domínios proxy e VPN que são utilizados para contornar os filtros. Os sítios de conteúdo misto (como o Reddit) também são bloqueados. O Google, o Bing e o Youtube estão configurados para o modo de segurança. Domínios maliciosos e Phishing são bloqueados.","pl":"Blokuje dostęp do wszystkich stron dla dorosłych, stron pornograficznych i wulgarnych. Blokuje także proxy i VPN i witryny stosowane do obejścia filtrów. Strony o mieszanej treści (takie jak Reddit) są także zablokowane. Google, Bing i YouTube są ustawione na tryb bezpieczny. Złośliwe domeny i domeny phishingowe są blokowane.","it":"Blocca l'accesso a tutti i siti per adulti, pornografici ed espliciti. Blocca anche i domini proxy e VPN utilizzati per bypassare i filtri. Anche i siti con contenuti misti (come Reddit) sono bloccati. Google, Bing e Youtube sono impostati sulla modalità sicura (o provvisoria). I domini dannosi e di phishing sono bloccati.","fr":"Bloque l'accès à tous les sites pour adultes, pornographiques et explicites. Il bloque également les proxy et les VPN qui sont utilisés pour contourner les filtres. Les sites à contenu mixte (comme Reddit) sont également bloqués. Google, Bing et Youtube sont configurés sur le mode sans échec. Les domaines malveillants et de phishing sont bloqués.","es":"Bloquea el acceso a todos los sitios para adultos, pornográficos y explícitos. También bloquea los dominios proxy y VPN que se utilizan para eludir los filtros. Los sitios de contenido mixto (como Reddit) también están bloqueados. Google, Bing y Youtube están configurados en modo seguro. Los dominios maliciosos y de \"phishing\" están bloqueados.","de":"Sperrt den Zugang zu allen Erwachsenen-, pornografischen und expliziten Websites. Der Filter sperrt auch Proxy- und VPN-Domänen, die zur Umgehung der Filter verwendet werden. Websites mit gemischten Inhalten (wie Reddit) werden ebenfalls blockiert. Google, Bing und YouTube sind auf den sicheren Modus eingestellt. Böswillige und Phishing-Domänen werden blockiert."},"url":"https://cleanbrowsing.org/filters","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"185.228.168.168","port":53},{"address":"185.228.169.168","port":53},{"address":"2a0d:2a00:1::","port":53},{"address":"2a0d:2a00:2::","port":53}],"dns-over-tls":[{"address":"family-filter-dns.cleanbrowsing.org","port":853,"sni":"family-filter-dns.cleanbrowsing.org"}],"dns-over-https":[{"uri":"https://doh.cleanbrowsing.org/doh/family-filter/"}]},{"id":"yandex-base","short":{"en":"Yandex.DNS - Basic","ru":"Yandex.DNS - Базовый","uk":"Yandex.DNS - Базовий","tr":"Yandex.DNS - Standart","sv":"Yandex.DNS - Bas","pt":"Yandex.DNS - Básico","pl":"Yandex.DNS - Podstawowy","it":"Yandex.DNS - Base","fr":"Yandex.DNS - Standard","es":"Yandex.DNS - Básico","de":"Yandex.DNS - Basis"},"description":{"en":"Quick and reliable DNS without filtering.","ru":"Быстрый и надежный DNS без фильтрации.","uk":"Швидкий та надійний DNS без фільтрації.","tr":"Filtreleme olmadan hızlı ve güvenilir DNS.","sv":"Snabb och pålitlig DNS utan filtrering.","pt":"DNS rápido e fiável sem filtros.","pl":"Szybki i niezawodny DNS bez filtrowania.","it":"DNS veloce e affidabile senza filtri.","fr":"DNS rapide et fiable sans filtrage.","es":"DNS rápido y fiable, sin filtros.","de":"Schneller und zuverlässiger DNS ohne Filterung."},"url":"https://dns.yandex.com/","stale":false,"regions":["EA","RU","TR","UA"],"dns53":[{"address":"77.88.8.8","port":53},{"address":"77.88.8.1","port":53},{"address":"77.88.8.8","port":1253},{"address":"77.88.8.1","port":1253},{"address":"2a02:6b8::feed:0ff","port":53},{"address":"2a02:6b8:0:1::feed:0ff","port":53},{"address":"2a02:6b8::feed:0ff","port":1253},{"address":"2a02:6b8:0:1::feed:0ff","port":1253}]},{"id":"yandex-safe","short":{"en":"Yandex.DNS - Safe","ru":"Yandex.DNS - Безопасный","uk":"Yandex.DNS - Безпечний","tr":"Yandex.DNS - Güvenli","sv":"Yandex.DNS - Säker","pt":"Yandex.DNS - Seguro","pl":"Yandex.DNS - Bezpieczny","it":"Yandex.DNS - Sicuro","fr":"Yandex.DNS - Sécurité","es":"Yandex.DNS - Seguro","de":"Yandex.DNS - Sicher"},"description":{"en":"Protection from viruses and fraudsters.","ru":"Без мошеннических сайтов и вирусов.","uk":"Захист від вірусів та шахрайства.","tr":"Virüslere ve dolandırıcılara karşı koruma.","sv":"Skydd mot virus och bedragare.","pt":"Proteção contra vírus e vigaristas.","pl":"Ochrona przed wirusami i oszustwami.","it":"Protezione da virus e truffatori.","fr":"Protection contre les virus et les fraudeurs.","es":"Protección contra virus y estafadores.","de":"Schutz vor Viren und Betrügern."},"url":"https://dns.yandex.com/","stale":false,"regions":["EA","RU","TR","UA"],"dns53":[{"address":"77.88.8.88","port":53},{"address":"77.88.8.2","port":53},{"address":"77.88.8.88","port":1253},{"address":"77.88.8.2","port":1253},{"address":"2a02:6b8::feed:bad","port":53},{"address":"2a02:6b8:0:1::feed:bad","port":53},{"address":"2a02:6b8::feed:bad","port":1253},{"address":"2a02:6b8:0:1::feed:bad","port":1253}]},{"id":"yandex-family","short":{"en":"Yandex.DNS - Family","ru":"Yandex.DNS - Семейный","uk":"Yandex.DNS - Сімейний","tr":"Yandex.DNS - Aile","sv":"Yandex.DNS - Familj","pt":"Yandex.DNS - Familiar","pl":"Yandex.DNS - Rodzina","it":"Yandex.DNS - Famiglia","fr":"Yandex.DNS - Famille","es":"Yandex.DNS - Familia","de":"Yandex.DNS - Familie"},"description":{"en":"Safety for children.","ru":"Без сайтов для взрослых.","uk":"Безпека для дітей.","tr":"Çocuklar için güvenlik.","sv":"Säkerhet för barn.","pt":"Segurança para as crianças.","pl":"Bezpieczeństwo dla dzieci.","it":"Sicurezza per i bambini.","fr":"Sécurité pour les enfants.","es":"Seguridad para los niños.","de":"Sicherheit für Kinder."},"url":"https://dns.yandex.com/","stale":false,"regions":["EA","RU","TR","UA"],"dns53":[{"address":"77.88.8.7","port":53},{"address":"77.88.8.3","port":53},{"address":"77.88.8.7","port":1253},{"address":"77.88.8.3","port":1253},{"address":"2a02:6b8::feed:a11","port":53},{"address":"2a02:6b8:0:1::feed:a11","port":53},{"address":"2a02:6b8::feed:a11","port":1253},{"address":"2a02:6b8:0:1::feed:a11","port":1253}]},{"id":"neustar-unfiltered","short":{"en":"Neustar UltraDNS Public - Unfiltered Resolution","ru":"Neustar UltraDNS Public - Разрешение имен без фильтрации","uk":"Neustar UltraDNS Public - Дозвіл імен без фільтрації","tr":"Neustar UltraDNS Public - Filtresiz","sv":"Neustar UltraDNS Public - Ofiltrerad lösning","pt":"Neustar UltraDNS Public - Resolução sem filtros","pl":"Neustar UltraDNS Public - Rozdzielczość bez filtrowania","it":"Neustar UltraDNS Public - Risoluzione non filtrata","fr":"Neustar UltraDNS Public - Résolution non filtrée","es":"Neustar UltraDNS Public - Resolución sin filtrado","de":"Neustar UltraDNS Public - Ungefilterter Resolver"},"description":{"en":"Reliable and fast DNS lookup without blocking any specific categories.","ru":"Надежная и быстрая обработка запросов DNS без блокировки определенных категорий.","uk":"Надійна та швидка обробка DNS запитів без блокування будь-яких визначених категорій.","tr":"Herhangi belirli bir kategoriyi engellemeden güvenilir ve hızlı DNS araması.","sv":"Pålitlig och snabb DNS-uppslagning utan att blockera några särskilda kategorier.","pt":"Pesquisa de DNS fiável e rápida sem bloquear qualquer categoria específica.","pl":"Niezawodne i szybkie wyszukiwanie DNS bez blokowania konkretnych kategorii.","it":"Ricerca DNS affidabile e veloce senza blocchi per alcuna categoria.","fr":"Recherche DNS fiable et rapide sans blocage de catégories spécifiques.","es":"Búsqueda de DNS fiable y rápida sin bloquear ninguna categoría específica.","de":"Zuverlässige und schnelle DNS-Suche, ohne dass spezifische Kategorien blockiert werden."},"url":"https://www.publicdns.neustar/","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"64.6.64.6","port":53},{"address":"64.6.65.6","port":53},{"address":"2620:74:1b::1:1","port":53},{"address":"2620:74:1c::2:2","port":53}]},{"id":"neustar-security","short":{"en":"Neustar UltraDNS Public - Threat Protection","ru":"Neustar UltraDNS Public - Защита от угроз","uk":"Neustar UltraDNS Public - Захист від загроз","tr":"Neustar UltraDNS Public - Tehdit Koruması","sv":"Neustar UltraDNS Public - Hotskydd","pt":"Neustar UltraDNS Public - Proteção contra ameaças","pl":"Neustar UltraDNS Public - Ochrona przed zagrożeniami","it":"Neustar UltraDNS Public - Protezione dalle minacce","fr":"Neustar UltraDNS Public - Protection contre les menaces","es":"Neustar UltraDNS Public - Protección contra amenazas","de":"Neustar UltraDNS Public - Bedrohungsschutz"},"description":{"en":"Protects against malicious domains for security purposes.","ru":"Защита от вредоносных доменов в целях безопасности.","uk":"Захист від шкідливих доменів задля безпеки.","tr":"Güvenlik amacıyla kötü niyetli etki alanlarına karşı koruma sağlar.","sv":"Skyddar mot skadliga domäner av säkerhetsskäl.","pt":"Protege contra domínios maliciosos para fins de segurança.","pl":"Chroni przed złośliwymi domenami ze względów bezpieczeństwa.","it":"Protegge da domini dannosi per motivi di sicurezza.","fr":"Protège contre les domaines malveillants à des fins de sécurité.","es":"Protege contra los dominios maliciosos por motivos de seguridad.","de":"Schützt gegen böswillige Domänen für Sicherheitszwecke."},"url":"https://www.publicdns.neustar/","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"156.154.70.2","port":53},{"address":"156.154.71.2","port":53},{"address":"2610:a1:1018::2","port":53},{"address":"2610:a1:1019::2","port":53}]},{"id":"neustar-family","short":{"en":"Neustar UltraDNS Public - Family Secure","ru":"Neustar UltraDNS Public - Семейная безопасность","uk":"Neustar UltraDNS Public - Сімейна безпека","tr":"Neustar UltraDNS Public - Güvenli Aile","sv":"Neustar UltraDNS Public - Familjesäker","pt":"Neustar UltraDNS Public - Segurança para a família","pl":"Neustar UltraDNS Public - Ochrona rodziny","it":"Neustar UltraDNS Public - Sicuro per la famiglia","fr":"Neustar UltraDNS Public - Sécurité familiale","es":"Neustar UltraDNS Public - Seguridad para la familia","de":"Neustar UltraDNS Public - Familiensicher"},"description":{"en":"Ensure your children don’t have access to mature content.","ru":"Не допускайте, чтобы ваши дети имели доступ к материалам для взрослых.","uk":"Не дозволяйте, щоб ваші діти мали доступ до дорослого контенту.","tr":"Çocuklarınızın yetişkin içeriğe erişimi olmadığından emin olun.","sv":"Se till att dina barn inte har åtkomst till vuxetinnehåll.","pt":"Assegure-se de que os seus filhos não têm acesso a conteúdos para adultos.","pl":"Miej pewność, że Twoje dzieci nie mają dostępu do treści dla dorosłych.","it":"Assicurati che i tuoi figli non abbiano accesso a contenuti per adulti.","fr":"Veillez à ce que vos enfants n'aient pas accès à des contenus adultes.","es":"Asegúrese de que sus hijos no tengan acceso a contenidos para adultos.","de":"Stellen Sie sicher, dass Ihre Kinder keinen Zugang zu reifen Inhalten haben."},"url":"https://www.publicdns.neustar/","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"156.154.70.3","port":53},{"address":"156.154.71.3","port":53},{"address":"2610:a1:1018::3","port":53},{"address":"2610:a1:1019::3","port":53}]},{"id":"adguard-unfiltered","short":{"en":"AdGuard DNS - Non-filtering","ru":"AdGuard DNS - Нефильтрующие серверы","uk":"AdGuard DNS - Без фільтрації","tr":"AdGuard DNS - Filtresiz","sv":"AdGuard DNS - Icke-filtrering","pt":"AdGuard DNS - Sem filtro","pl":"AdGuard DNS - Brak filtrowania","it":"AdGuard DNS - Non filtrante","fr":"AdGuard DNS - Sans filtrage","es":"AdGuard DNS - Sin filtrado","de":"AdGuard DNS - Nicht filternd"},"description":{"en":"Provides a secure and reliable connection, but doesn't filter anything.","ru":"Если вы не хотите, чтобы AdGuard DNS блокировал рекламу, трекеры или любые другие DNS-запросы.","uk":"Забезпечує надійне та безпечне з'єднання, але не блокує нічого.","tr":"Güvenli, güvenilir bir bağlantı sağlar. Fakat hiçbir şey filtrelenmez.","sv":"Ger en säker och pålitlig anslutning, men filtrerar ingenting.","pt":"Fornece uma ligação segura e fiável, mas não filtra nada.","pl":"Zapewnia bezpieczne i niezawodne połączenie, ale niczego nie filtruje.","it":"Fornisce una connessione sicura e affidabile, ma non filtra nulla.","fr":"Fournit une connexion sécurisée et fiable, mais ne filtre rien.","es":"Proporciona una conexión segura y fiable, pero no filtra nada.","de":"Bietet eine sichere und zuverlässige Verbindung, filtert aber nichts."},"url":"https://adguard-dns.com/en/public-dns.html","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"94.140.14.140","port":53},{"address":"94.140.14.141","port":53},{"address":"94.140.14.140","port":5353},{"address":"94.140.14.141","port":5353},{"address":"2a10:50c0::1:ff","port":53},{"address":"2a10:50c0::2:ff","port":53},{"address":"2a10:50c0::1:ff","port":5353},{"address":"2a10:50c0::2:ff","port":5353}],"dns-over-tls":[{"address":"unfiltered.adguard-dns.com","port":853,"sni":"unfiltered.adguard-dns.com"}],"dns-over-https":[{"uri":"https://unfiltered.adguard-dns.com/dns-query"}]},{"id":"adguard-default","short":{"en":"AdGuard DNS - Default","ru":"AdGuard DNS - Серверы по умолчанию","uk":"AdGuard DNS - Сервери за замовчуванням","tr":"AdGuard DNS - Varsayılan","sv":"AdGuard DNS - Standard","pt":"AdGuard DNS - Padrão","pl":"AdGuard DNS - Domyślny","it":"AdGuard DNS - Standard","fr":"AdGuard DNS - Par défaut","es":"AdGuard DNS - Predeterminado","de":"AdGuard DNS - Standard"},"description":{"en":"Blocks ads everywhere. This includes video ads and ads in your favorite apps, browsers, games, and on any website you can imagine. Dozens of ad filters are available to you and are updated on a regular basis, guaranteeing the best filtering quality.","ru":"Если вы хотите блокировать рекламу и трекеры.","uk":"Блокує рекламу всюди, включно з рекламою у відео та у ваших улюблених програмах, браузерах, іграх, на будь-яких сайтах. Вам доступні десятки фільтрів, що регулярно оновлюються та гарантують найкращу якість фільтрації.","tr":"Her yerde reklamları engeller. Bu, video reklamları ve favori uygulamalarınızdaki, tarayıcılarınızdaki, oyunlarınızdaki ve hayal edebileceğiniz herhangi bir web sitesindeki reklamları içerir. Kullanabileceğiniz düzinelerce reklam filtresi mevcuttur ve düzenli olarak güncellenerek en iyi filtreleme kalitesini garanti eder.","sv":"Blockerar annonser överallt. Det innefattar videoannonser och annonser i dina favoritappar, webbläsare, spel och på alla webbplatser du kan föreställa dig. Dussintals annonsfilter finns tillgängliga för dig och uppdateras regelbundet, vilket garanterar dig den bästa filtreringskvaliteten.","pt":"Bloqueia anúncios em todo o lado. Isto inclui anúncios de vídeo e anúncios nas suas aplicações favoritas, navegadores, jogos e em qualquer website que possa imaginar. Dezenas de filtros de anúncios estão à sua disposição e são atualizados regularmente, garantindo a melhor qualidade de filtragem.","pl":"Blokuje reklamy wszędzie. Blokada dotyczy reklam wideo i reklam w Twoich ulubionych aplikacjach, przeglądarkach, grach i na dowolnej stronie internetowej. Dostępne są dziesiątki filtrów reklam, które są regularnie aktualizowane, gwarantując najlepszą jakość filtrowania.","it":"Blocca la pubblicità ovunque. Ciò include gli annunci video e gli annunci all'interno delle tue app, browser e giochi preferiti, e su qualsiasi sito web tu possa immaginare. Sono disponibili decine di filtri per gli annunci che vengono aggiornati regolarmente, garantendo la migliore qualità di filtraggio.","fr":"Bloque les publicités partout. Cela inclut les publicités vidéo et les publicités dans vos applications, navigateurs et jeux préférés, ainsi que sur tous les sites web que vous pouvez imaginer. Des dizaines de filtres publicitaires sont à votre disposition et sont mis à jour régulièrement, garantissant ainsi la meilleure qualité de filtrage.","es":"Bloquea los anuncios en todas partes. Esto incluye los anuncios de vídeo y los anuncios en tus aplicaciones favoritas, navegadores, juegos y en cualquier sitio web que puedas imaginar. Tiene a su disposición decenas de filtros de anuncios que se actualizan regularmente, garantizando la mejor calidad de filtrado.","de":"Sperrt Werbung überall. Dies umfasst Videowerbung und Werbung in Ihren Lieblings-Apps, Browsern, Spielen und auf jeder Website, die Sie sich vorstellen können. Dutzende von Werbefiltern sind für Sie verfügbar und werden regelmäßig aktualisiert, wodurch die beste Filterungsqualität gewährleistet wird."},"url":"https://adguard-dns.com/en/public-dns.html","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"94.140.14.14","port":53},{"address":"94.140.15.15","port":53},{"address":"94.140.14.14","port":5353},{"address":"94.140.15.15","port":5353},{"address":"2a10:50c0::ad1:ff","port":53},{"address":"2a10:50c0::ad2:ff","port":53},{"address":"2a10:50c0::ad1:ff","port":5353},{"address":"2a10:50c0::ad2:ff","port":5353}],"dns-over-tls":[{"address":"dns.adguard-dns.com","port":853,"sni":"dns.adguard-dns.com"}],"dns-over-https":[{"uri":"https://dns.adguard-dns.com/dns-query"}]},{"id":"adguard-family","short":{"en":"AdGuard DNS - Family protection","ru":"AdGuard DNS - Семейные серверы","uk":"AdGuard DNS - Сімейний захист","tr":"AdGuard DNS - Aile koruması","sv":"AdGuard DNS - Familjeskydd","pt":"AdGuard DNS - Proteção familiar","pl":"AdGuard DNS - Ochrona rodziny","it":"AdGuard DNS - Protezione famiglia","fr":"AdGuard DNS - Protection familiale","es":"AdGuard DNS - Protección familiar","de":"AdGuard DNS - Familienschutz"},"description":{"en":"Use the Family protection mode to block access to all websites with adult content and enforce safe search in the browser, in addition to the regular perks of ad blocking and browsing security.","ru":"Если вы хотите блокировать контент для взрослых, включить безопасный поиск и безопасный режим везде, где это возможно, а также блокировать рекламу и трекеры.","uk":"Використовуйте режим сімейного захисту щоб заблокувати доступ до всіх сайтів для дорослих, увімкнути безпечний пошук, а також блокувати рекламу та трекери.","tr":"Yetişkinlere uygun içeriğe sahip tüm web sitelerine erişimi engellemek ve normal reklam engelleme ve tarama güvenliği avantajlarına ek olarak tarayıcıda güvenli aramayı zorunlu kılmak için Aile koruması modunu kullanın.","sv":"Använd Familjeskyddsläge för att blockera åtkomst till alla webbplatser med vuxeninnehåll och säkerställa säker sökning i webbläsaren, förutom de vanliga fördelarna med annonsblockering och surfsäkerhet.","pt":"Utilize o modo de proteção familiar para bloquear o acesso a todos os websites com conteúdo adulto e impor uma pesquisa segura no browser, para além das vantagens regulares do bloqueio de anúncios e da segurança de navegação.","pl":"Oprócz zwykłych korzyści związanych z blokowaniem reklam i bezpieczeństwem przeglądania masz także możliwość skorzystania z trybu ochrony rodziny, aby zablokować dostęp do wszystkich stron internetowych z treścią dla dorosłych oraz wymusić bezpieczne wyszukiwanie w przeglądarce.","it":"Utilizza la modalità Protezione famiglia per bloccare l'accesso a tutti i siti web con contenuti per adulti e imporre una ricerca sicura nel browser, oltre ai normali vantaggi dati dal blocco degli annunci e dalla sicurezza della navigazione.","fr":"Utilisez le mode Protection familiale pour bloquer l'accès à tous les sites web présentant un contenu pour adultes et renforcer la sécurité des recherches dans le navigateur, en plus des avantages habituels que sont le blocage des publicités et la sécurité de la navigation.","es":"Utilice el modo de Protección familiar para bloquear el acceso a todos los sitios web con contenido para adultos y aplicar la búsqueda segura en el navegador, además de las ventajas habituales de bloqueo de anuncios y seguridad en la navegación.","de":"Verwenden Sie den Familienschutz-Modus, um den Zugang zu allen Websites mit Erwachseneninhalten zu sperren und eine sichere Suche im Browser zu erzwingen, zusätzlich zu den normalen Vorteilen von Werbesperren und einem sicheren Browsen."},"url":"https://adguard-dns.com/en/public-dns.html","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"94.140.14.15","port":53},{"address":"94.140.15.16","port":53},{"address":"94.140.14.15","port":5353},{"address":"94.140.15.16","port":5353},{"address":"2a10:50c0::bad1:ff","port":53},{"address":"2a10:50c0::bad2:ff","port":53},{"address":"2a10:50c0::bad1:ff","port":5353},{"address":"2a10:50c0::bad2:ff","port":5353}],"dns-over-tls":[{"address":"family.adguard-dns.com","port":853,"sni":"family.adguard-dns.com"}],"dns-over-https":[{"uri":"https://family.adguard-dns.com/dns-query"}]},{"id":"cloudflare-unfiltered","short":{"en":"Cloudflare - Unfiltered, Fast and Private","ru":"Cloudflare - без фильтрации, быстро и конфиденциально","uk":"Cloudflare - без фільтрації, швидко та конфіденційно","tr":"Cloudflare - Filtresiz, Hızlı ve Gizli","sv":"Cloudflare - Ofiltrerat, snabbt och privat","pt":"Cloudflare - Sem filtro, rápido e privado","pl":"Cloudflare - Bez filtrowania, szybka i prywatna","it":"Cloudflare - Non filtrato, veloce e privato","fr":"Cloudflare - Non filtré, rapide et privé","es":"Cloudflare - Sin filtrado, rápido y privado","de":"Cloudflare - Ungefiltert, schnell und privat"},"description":{"en":"1.1.1.1 DNS - the Internet’s Fastest, Privacy First DNS resolver.","ru":"1.1.1.1 DNS - самый быстрый и конфиденциальный DNS-резолвер в Интернете.","uk":"1.1.1.1 DNS - найшвидший та найбільш конфіденційний DNS - резолвер.","tr":"1.1.1.1 DNS - İnternetin En Hızlı, Gizliliği yüksek DNS çözümleyicisi.","sv":"1.1.1.1 DNS - Internets snabbaste DNS-resolver som sätter integriteten främst.","pt":"1.1.1.1 DNS - o mais rápido DNS resolver da Internet com a privacidade em primeiro lugar.","pl":"1.1.1.1 DNS - najszybszy w Internecie program rozpoznawania nazw DNS oparty na ochronie prywatności.","it":"1.1.1.1 DNS - il risolutore DNS più veloce di internet, con un occhio di riguardo per la privacy.","fr":"1.1.1.1 DNS - la résolution DNS la plus rapide et la plus confidentielle d'Internet.","es":"1.1.1.1 DNS - la resolución de DNS más rápida y con mayor privacidad de Internet.","de":"1.1.1.1 DNS - der schnellste DNS-Resolver im Internet, der die Privatsphäre an die oberste Stelle setzt."},"url":"https://1.1.1.1/dns/","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"1.1.1.1","port":53},{"address":"1.0.0.1","port":53},{"address":"2606:4700:4700::1111","port":53},{"address":"2606:4700:4700::1001","port":53}],"dns-over-tls":[{"address":"cloudflare-dns.com","port":853,"sni":"cloudflare-dns.com"}],"dns-over-https":[{"uri":"https://cloudflare-dns.com/dns-query"}]},{"id":"cloudflare-malware","short":{"en":"Cloudflare - Automatic malware protection","ru":"Cloudflare - Автоматическая защита от вредоносного контента","uk":"Cloudflare - Автоматичний захист від шкідливого контенту","tr":"Cloudflare - Otomatik kötü amaçlı yazılım koruması","sv":"Cloudflare - Automatiskt skydd mot skadlig kod","pt":"Cloudflare - Proteção de malware automática","pl":"Cloudflare - Automatyczna ochrona przed złośliwym oprogramowaniem","it":"Cloudflare - Protezione antimalware automatica","fr":"Cloudflare - Protection automatique contre les programmes malveillants","es":"Cloudflare - Protección automática contra \"malware\"","de":"Cloudflare - Automatischer Malware-Schutz"},"description":{"en":"1.1.1.1 for Families adds a layer of malware protection to your home Wi-Fi, automatically blocking access to known malicious sites.","ru":"1.1.1.1 для семьи добавляет уровень защиты от вредоносных программ к вашему домашнему Wi-Fi, автоматически блокируя доступ к известным вредоносным сайтам.","uk":"1.1.1.1 для сім'ї збільшує рівень захисту від шкідливих програм вашого домашнього Wi-Fi, автоматично блокуючи доступ до відомих шкідливих сайтів.","tr":"Aileler için 1.1.1.1, evinizdeki Wi-Fi ağınıza kötü amaçlı yazılımlara karşı koruma katmanı ekleyerek bilinen kötü amaçlı sitelere erişimi otomatik olarak engeller.","sv":"1.1.1.1 för familjer ge ett skikt med skydd mot skadlig kod till ditt hem-Wi-Fi och blockerar automatiskt åtkomst till kända skadliga webbplatser.","pt":"1.1.1.1 para famílias adiciona uma camada de proteção contra malware ao Wi-Fi da sua casa, bloqueando automaticamente o acesso a sites maliciosos conhecidos.","pl":"1.1.1.1 dla rodzin dodaje warstwę ochrony przed złośliwym oprogramowaniem do domowej sieci Wi-Fi, automatycznie blokując dostęp do znanych złośliwych witryn.","it":"1.1.1.1 for Families aggiunge un livello di protezione antimalware al Wi-Fi di casa, bloccando automaticamente l'accesso a siti dannosi noti.","fr":"1.1.1.1 pour les familles, ajoute une couche de protection contre les programmes malveillants à votre réseau Wi-Fi domestique, en bloquant automatiquement l'accès aux sites malveillants connus.","es":"1.1.1.1 para las familias, añade una capa de protección contra el \"malware\" a su wifi doméstico, bloqueando automáticamente el acceso a sitios maliciosos conocidos.","de":"1.1.1.1 für Familien versieht Ihr Heim-WLAN mit einer zusätzlichen Schutzebene gegen Malware, indem der Zugang zu bekannten böswilligen Websites automatisch blockiert wird."},"url":"https://1.1.1.1/family/","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"1.1.1.2","port":53},{"address":"1.0.0.2","port":53},{"address":"2606:4700:4700::1112","port":53},{"address":"2606:4700:4700::1002","port":53}],"dns-over-tls":[{"address":"security.cloudflare-dns.com","port":853,"sni":"security.cloudflare-dns.com"}],"dns-over-https":[{"uri":"https://security.cloudflare-dns.com/dns-query"}]},{"id":"cloudflare-adult","short":{"en":"Cloudflare - Adult content filtering","ru":"Cloudflare - фильтрация контента для взрослых","uk":"Cloudflare - Фільтрація контента для дорослих","tr":"Cloudflare - Yetişkin içerik filtreleme","sv":"Cloudflare - Filtrering av vuxetinnehåll","pt":"Cloudflare - Filtro de conteúdo para adultos","pl":"Cloudflare - Filtrowanie treści dla dorosłych","it":"Cloudflare - Filtro dei contenuti per adulti","fr":"Cloudflare - Filtrage des contenus pour adultes","es":"Cloudflare - Filtro de contenido para adultos","de":"Cloudflare - Erwachseneninhalt-Filterung"},"description":{"en":"1.1.1.1 for Families Malware and Adult Content Blocking Together. Keep adult content away from kids on your network with always-on content controls.","ru":"1.1.1.1 для семьи - блокирование вредоносного и взрослого содержимого. Не допускайте детей в вашей сети к контенту для взрослых.","uk":"1.1.1.1 для сім'ї - блокування шкідливого та дорослого контенту. Не допускайте дітей до контенту для дорослих у вашій мережі.","tr":"1.1.1.1 Aileler için Kötü Amaçlı Yazılım ve Yetişkin İçeriğinin Birlikte Engellenmesi. Her zaman açık olan içerik denetimleriyle çocuklarınızı yetişkin içeriklerden uzak tutun.","sv":"1.1.1.1 för familjer ger blockering av både skadlig kod och vuxetinnehåll. Håll vuxetinnehåll borta från barn på ditt nätverk med innehållskontroller som alltid är på.","pt":"1.1.1.1 para bloqueio conjunto de malware e conteúdo para adultos para famílias. Mantenha o conteúdo para adultos afastado de crianças na sua rede com controlos de conteúdo sempre ligados.","pl":"1.1.1.1 do jednoczesnego blokowania złośliwego oprogramowania i treści dla dorosłych. Ochroń swoje dzieci przed treściami dla dorosłych w swojej sieci dzięki kontroli treści, która jest zawsze włączona.","it":"1.1.1.1 for Families con blocco dei contenuti per adulti e malware insieme. Tieni i contenuti per adulti lontani dai bambini sulla tua rete con i controlli dei contenuti sempre attivi.","fr":"1.1.1.1 pour les familles, avec blocage des contenus pour adultes et des programmes malveillants. Gardez les contenus pour adultes hors de portée des enfants sur votre réseau grâce à des contrôles de contenu permanents.","es":"1.1.1.1 para las familias, con Bloqueo conjunto de \"malware\" y contenido para adultos. Mantenga el contenido para adultos lejos de los niños en su red con controles de contenido siempre activos.","de":"1.1.1.1 für Familien - Sowohl Malware als auch Erwachseneninhalte werden blockiert. Halten Sie Erwachseneninhalte mit Inhaltskontrollen, die immer eingeschaltet sind, von Kindern in Ihrem Netzwerk fern."},"url":"https://1.1.1.1/family/","stale":false,"regions":["EA","RU","TR","UA","EU"],"dns53":[{"address":"1.1.1.3","port":53},{"address":"1.0.0.3","port":53},{"address":"2606:4700:4700::1113","port":53},{"address":"2606:4700:4700::1003","port":53}],"dns-over-tls":[{"address":"family.cloudflare-dns.com","port":853,"sni":"family.cloudflare-dns.com"}],"dns-over-https":[{"uri":"https://family.cloudflare-dns.com/dns-query"}]}]} Mon, 8 Aug 2022 14:23:57 GMT 182611325431755 S2148WF003286 50:ff:20:78:b0:1c KN-1011 22b9805c-4b27-11ec-9396-6185f0c2ac88 GigabitEthernet0 0 GigabitEthernet0 GigabitEthernet Mac Switch EthernetPort MtkSwitch MtkGigabitEthernet down no up 1500 2000 GigabitEthernet0/0 0 1 Port EthernetPort SwitchPort MtkSwitchPort down 1456.216108 0 no no no GigabitEthernet0/1 1 2 Port EthernetPort SwitchPort MtkSwitchPort up 100 full on off off 1440.937968 0 no no no GigabitEthernet0/2 2 3 Port EthernetPort SwitchPort MtkSwitchPort up 10 full on off off 1440.437133 0 no no no GigabitEthernet0/3 3 4 Port EthernetPort SwitchPort MtkSwitchPort up 100 full on on off 1440.436762 0 no no no GigabitEthernet0/0 0 1 Port EthernetPort SwitchPort MtkSwitchPort down 1456.217184 0 no no no GigabitEthernet0/1 1 2 Port EthernetPort SwitchPort MtkSwitchPort up 100 full on off off 1440.938996 0 no no no GigabitEthernet0/2 2 3 Port EthernetPort SwitchPort MtkSwitchPort up 10 full on off off 1440.438155 0 no no no GigabitEthernet0/3 3 4 Port EthernetPort SwitchPort MtkSwitchPort up 100 full on on off 1440.437780 0 no no no GigabitEthernet0/Vlan1 1 GigabitEthernet0/Vlan1 Vlan Home VLAN Mac Ip Ip6 Supplicant Ethernet Vlan up yes up 1500 0 Home Bridge0 50:ff:20:78:b0:1b none GigabitEthernet0/Vlan3 3 GigabitEthernet0/Vlan3 Vlan Guest VLAN Mac Ip Ip6 Supplicant Ethernet Vlan down no up 1500 0 Guest Bridge1 52:ff:20:78:b0:1a none GigabitEthernet1 1 ISP GigabitEthernet Подключение Ethernet Mac Ip Ip6 Supplicant Ethernet MtkSfpEthernet up yes up 1500 2000 no public PPPoE0 50:ff:20:78:b0:1c none GigabitEthernet1/0 0 0 Port EthernetPort MtkSfpEthernetPort up 1000 full on off off no internal yes GigabitEthernet1/0 0 0 Port EthernetPort MtkSfpEthernetPort up 1000 full on off off no internal yes WifiMaster0 0 WifiMaster0 WifiMaster WifiRadio WifiMaster MtkWifiMaster up yes up 1500 1000 on 573000000 3 47 WifiMaster0/AccessPoint0 0 AccessPoint AccessPoint Wi-Fi access point Wireless Mac Ip Ip6 Supplicant Ethernet Wifi AccessPoint MtkAccessPoint up yes up 1500 1000 Home WifiMaster1/AccessPoint0 Bridge0 52:ff:20:58:b0:1b none ASUS wpa2 WifiMaster0/AccessPoint1 1 GuestWiFi AccessPoint Guest access point Wireless Mac Ip Ip6 Supplicant Ethernet Wifi AccessPoint MtkAccessPoint up yes down 1500 1000 Guest WifiMaster1/AccessPoint1 Bridge1 52:ff:20:68:b0:1b none WifiMaster0/AccessPoint2 2 WifiMaster0/AccessPoint2 AccessPoint Wireless Mac Ip Ip6 Supplicant Ethernet Wifi AccessPoint MtkAccessPoint up yes down 1500 1000 no private 52:ff:20:78:b0:1b none WifiMaster0/AccessPoint3 3 WifiMaster0/AccessPoint3 AccessPoint Wireless Mac Ip Ip6 Supplicant Ethernet Wifi AccessPoint MtkAccessPoint up yes down 1500 1000 no private 52:ff:20:88:b0:1b none 00:00:00:00:00:00 WifiMaster0/WifiStation0 0 WifiMaster0/WifiStation0 WifiStation Wireless Mac Ip Ip6 Supplicant Ethernet Wifi WifiStation MtkWifiStation down no down 1500 1000 no public 5a:ff:20:78:b0:1b none WifiMaster1 1 WifiMaster1 WifiMaster WifiRadio WifiMaster MtkWifiMaster up yes up 1500 1000 on 1201000000 52 47 WifiMaster1/AccessPoint0 0 AccessPoint_5G AccessPoint 5GHz Wi-Fi access point Wireless Mac Ip Ip6 Supplicant Ethernet Wifi AccessPoint MtkAccessPoint up yes up 1500 1000 Home Bridge0 50:ff:20:78:b0:1b none ASUS wpa2 WifiMaster1/AccessPoint1 1 GuestWiFi_5G AccessPoint 5GHz Guest access point Wireless Mac Ip Ip6 Supplicant Ethernet Wifi AccessPoint MtkAccessPoint up yes down 1500 1000 Guest Bridge1 52:ff:20:18:b0:1b none WifiMaster1/AccessPoint2 2 WifiMaster1/AccessPoint2 AccessPoint Wireless Mac Ip Ip6 Supplicant Ethernet Wifi AccessPoint MtkAccessPoint up yes down 1500 1000 no private 52:ff:20:28:b0:1b none WifiMaster1/AccessPoint3 3 WifiMaster1/AccessPoint3 AccessPoint Wireless Mac Ip Ip6 Supplicant Ethernet Wifi AccessPoint MtkAccessPoint up yes down 1500 1000 no private 52:ff:20:38:b0:1b none 00:00:00:00:00:00 WifiMaster1/WifiStation0 0 WifiMaster1/WifiStation0 WifiStation Wireless Mac Ip Ip6 Supplicant Ethernet Wifi WifiStation MtkWifiStation down no down 1500 1000 no public 56:ff:20:78:b0:1b none Bridge0 0 Home Bridge Home network Mac Ip Ip6 Supplicant Ethernet Bridge up yes up 1500 0
192.168.1.1
255.255.255.0 1447 no private 50:ff:20:78:b0:1b none GigabitEthernet0/Vlan1 WifiMaster0/AccessPoint0 WifiMaster1/AccessPoint0
Bridge1 1 Guest Bridge Guest network Mac Ip Ip6 Supplicant Ethernet Bridge up yes up 1500 0
10.1.30.1
255.255.255.0 1445 no protected 52:ff:20:78:b0:1a none GigabitEthernet0/Vlan3 WifiMaster0/AccessPoint1 WifiMaster1/AccessPoint1
PPPoE0 0 PPPoE0 PPPoE Подключение Ethernet Ip Ip6 Supplicant Peer Ppp Pppoe up yes up inet 1480 1000
95.139.193.129
255.255.255.255 yes yes 57342 public none 95.139.192.1 1436 no GigabitEthernet1 1435.997008 24888 90:17:ac:be:9a:dc
OpenVPN0 0 OpenVPN0 OpenVPN antizapret Mac Ip Ip6 Supplicant Ethernet OpenVpn up yes up misc 1500 0
192.168.105.208
255.255.248.0 368 no public ea:64:a3:61:de:28 none RU ProstoVPN.ru antizapret-server tcp-client PPPoE0
OpenVPN1 1 OpenVPN1 OpenVPN surfshark-vpn Mac Ip Ip6 Supplicant Ethernet OpenVpn down no down misc 1500 0 yes no 28671 public 0e:40:e4:c1:24:e6 none 4 e4:27:71:19:a3:2b 0 1 2 2c:cc:44:7b:64:98 0 1 Mon Aug 8 23:29:24 2022 yes yes yes yes yes yes yes PPPoE0
0.0.0.0
0 yes no
200 (OK) 0 yes
185.151.243.41
192.168.1.141 e4:27:71:19:a3:2b Home STALE 192.168.1.89 2c:cc:44:7b:64:98 Home ps4 lan REACHABLE 192.168.1.93 86:32:ec:e9:77:bc Home REACHABLE 192.168.1.140 e4:27:71:19:a3:2b Home REACHABLE 192.168.1.89 2c:cc:44:7b:64:98 2c:cc:44:7b:64:98 ps4 lan 23764 192.168.1.93 86:32:ec:e9:77:bc 86:32:ec:e9:77:bc 23776 192.168.1.140 e4:27:71:19:a3:2b e4:27:71:19:a3:2b 23782 WifiMaster1/AccessPoint1 GuestWiFi_5G disabled disabled WifiMaster0/AccessPoint3 WifiMaster0/AccessPoint3 disabled disabled WifiMaster0/AccessPoint0 AccessPoint disabled disabled WifiMaster1/AccessPoint2 WifiMaster1/AccessPoint2 disabled disabled WifiMaster0/AccessPoint1 GuestWiFi disabled disabled WifiMaster1/AccessPoint3 WifiMaster1/AccessPoint3 disabled disabled WifiMaster1/AccessPoint0 AccessPoint_5G disabled disabled WifiMaster0/AccessPoint2 WifiMaster0/AccessPoint2 disabled disabled WifiMaster1/WifiStation0 WifiMaster1/WifiStation0 disabled disabled WifiMaster0/WifiStation0 WifiMaster0/WifiStation0 disabled disabled GigabitEthernet0/Vlan1 GigabitEthernet0/Vlan1 disabled disabled GigabitEthernet0/Vlan3 GigabitEthernet0/Vlan3 disabled disabled GigabitEthernet1 ISP running deconfigured Bridge0 Home disabled disabled Bridge1 Guest disabled disabled OpenVPN0 OpenVPN0 disabled disabled OpenVPN1 OpenVPN1 disabled disabled Home 192.168.1.1/24 192.168.1.33 192.168.1.152 192.168.1.1 25200 running no Guest 10.1.30.1/24 10.1.30.33 10.1.30.152 10.1.30.1 25200 running no 2c:cc:44:7b:64:98 2c:cc:44:7b:64:98 192.168.1.89 ps4 lan Bridge0 Home Home network 23764 yes permit 6 yes 9982 9077 1437 1438 7 up yes 100 yes 2 0 0 mac 86:32:ec:e9:77:bc 86:32:ec:e9:77:bc 192.168.1.93 Bridge0 Home Home network no permit 6 yes 0 0 1425 7 up ASUS WifiMaster1/AccessPoint0 yes 867 1356 80 11ac 400 -50 9 2 yes <_11>k <_11>r <_11>v ft wpa2-psk 0 0 mac e4:27:71:19:a3:2b e4:27:71:19:a3:2b 192.168.1.140 Bridge0 Home Home network 23782 no permit 6 yes 0 0 1414 1423 7 up yes 100 yes 4 0 0 mac e4:27:71:19:a3:2b e4:27:71:19:a3:2b 192.168.1.141 Bridge0 Home Home network no permit 6 yes 0 0 31 1434 7 up yes 100 yes 4 0 0 mac 22:9c:a6:ed:1e:f6 22:9c:a6:ed:1e:f6 0.0.0.0 iphone 8+ yes permit 6 no 0 0 0 down 0 0 mac 48:51:b7:c4:ba:30 48:51:b7:c4:ba:30 0.0.0.0 nyanguzarov-not yes permit 6 no 0 0 0 down 0 0 mac 74:c1:4f:d0:ed:2a 74:c1:4f:d0:ed:2a 0.0.0.0 Дима Honor_10 yes permit 6 no 0 0 0 down 0 0 mac a6:21:f5:95:ba:d3 a6:21:f5:95:ba:d3 0.0.0.0 Карина iphone yes permit 6 no 0 0 0 down 0 0 mac b4:2e:99:d5:8c:3b b4:2e:99:d5:8c:3b 0.0.0.0 DESKTOP-NIJ49Q4 yes permit 6 no 0 0 0 down 0 0 mac eNrtHGtz2zbyu38FrNNMbF/EhyQ7knxux2OrTaZJnLGTu3aahEORoISYrxKQbaVyfvstwIdIiaTl2G6dFHlIIrAA9oXdxS7JKcUR8oNRYM+Sr/2NyyA6x5ERRoGFKcUUmVMWZM1WODVMxyE+YbNiT+QSjzDDDxziYtTWur39DdvEXuCjwHH2N3AUBZHhBmNEZxS+BrD2BY4Opj65Gqg2vlCh8aljWsSFuQ/ioU+ZOT7wx8S/ggkusM8o+nMDIW/qMmKYloVDhgJ/H5pS/ALfxxYjgU+R3u5p+xvXG6EVYeMTiSEnjIViDj6aUoGQwA8h+AnoM8MJpr6dNnpmaExMOjFGU+scM4OSz5jPXOjzzKukY6/T6/IuYM3EsMkYU2Z8DnyM+MeBH/iw6EDvt8/FgoJjEf4jBmmOiG9GM2jwAoYN07ajeFiII34xaO/unaPIZPigvRuptDgFx94FHrlIcJp3MisEgmzsmrOES3FLOKWTpIFi3xYCiy8jTIFGRjxsB1OW42bSD4zBEbUCgDOIb0ywya+zubhADd/0oHeFZ4B8OVDGvFhnOAinyHQNEhpOFHhIqEiMXtwar4tAR69mXFNZYAVuHiDC1jSi5CKl6xzj0HThWtAGpKE9TRMM/Bf/jywcMeIQC3iLTBD+OZ4hJ4hQw+z3RqPdrqP3n42sbr8PouvttTFWYEYfM2IpJGgk04A6oOYkoAw1fdsz+JyGJnQNIRs7Jigt2tmh5yQMsb2zw1e/Xh0GS68z6ga8fZO4EdCJowWmLvHP63DVvwrXNUc1xLBBcxqRBgwOTrFNQEpsaXSjsS+uG95sgTh8DlQLxokevQZEbRRBvqzARAC006ibxZmSxg0L8d3dKC60M1CVS+y6rXM/uPRV0/Jwy5qYrov9Mc6tmOMHWCKDMwX4Qal74ruzKmaspYWrKyR7LQwiYHxxsxi5vkYszFxLFR5fPm5t/a61+h/+1J92r+e/663dD/E1XO3Br25y2YHL3dx1m1/zhnbcwK868Gv3w/ZgZ7vZKCKbW25w7+vx1WC5GnakTLRcAh5H2CfuGmMjpfHeIMS+wc2mYZnWBKe+Ip6Tm6/EQD0XOyUTdCnM0cLGxpALo1sK/y4cgzfACfA0viqFPBT+sTX0rcAm/jgR4wrYr62fgujSjGxs818oYQ14HOMKfGHSxX8JDxBSBlbWQ6AyiZrEvIuttHphRmo09VXoVqg1JgoNuA9IeZoN51vopvEcJhmPuBQ4Zyj4vnSyZGA8i0sowz645meKBn/1wbN+qsCJdBH4VztWrZx7ToWXNI5MSqxFmxuAbeWyUZNlEMJXIVguilr6ftKyAALrksEBfkC/EZqUcmbtZ83Et9wpSFDFzFJFcKMmkJHp0f3l4dCIzoan/x2eGofHx6co3Sk8JCgFPh2+Onk7NF4cD1+/TdWE8gFjUOfSEc/fvn1j/Gr8dHL6v8PT4+Ex/3WDHqyiePTzC+PwZ77mE74m58WTcsizl8bJa+P58PB4eBpvqBwMw14IgKAdKvPCPH94zwJ4VQwgQcA10erXttc6m1EPwh8UO8JSMFB+QAm3TsI4ZmwA035rVM8I8ShG3VpZehBhKGwW4pwoU0XkzcgMQ5fEGqN+ovE2zzFgNHUcHPENu9IFcd6UR5Q1IHyfCBYK87QwWfzP9UYJ/ceYQayAGtqV3u48e4pAbC2u0C7M7c4ayHQvzVlGSoTZNPJRV+vELdfrbcXew2zFSkJ2gRAWmT71CKVx+Lo+LXFoteT0EwqT7gK5oIWByy8zgvfzbHjWU7rPFMBJ0XvaoKf19Bz1JUQlnombjSYF7+LhgaqK6KmZyh+CqP0CdKwQFPVQ97zYU6YP5zWyy8XnyywoUAUhiKLv9RQdxNvTagmOO4mDtvJx3+YBD1i2M7ITaXS0NuLmgwLRVUHsKh+ui8z8+AWpjnlBwGEo8LG8RlfLdjDoTH4TpUZFy8x1TsWOuK9vgb9mUeACe8kFhN03wnlTyloRvoDjh10OX2eDlgj7soM+bv24ufVepSyIwBa9V+fvVRsiTjcwbXEB1gU+L/HINi+2t5Wd98rWmDjzT+F4HvrjuUXp/BOdA1fm9GI8v/LcObdBc+I7wfwSNpv4aM8nzOP/3e1mxr3srFk4laIRnLTYQVvTUHLWTEkssY3jzyRUQCpOCgMhcgSxCJoyp9WrGbhqVCtNamAxzFpxmJFt9SBgSJ1SODXDglidMDuwqFEt9iW9eCgtoAxwtgwefpuWu7B111XGQeyi9LSwtINq7KEO9pDyMzFGuTM930ZAt71sGFdN48J33IMS3FGWX61WNygBi2bCSILZBbuCVLDR+ErhewAd5CzGQiiX5DOERFTNCaBePPcooDIRLYS0SkyKawVR1491I9wiWCsYSdXYUnbyvM+5F7Wpr4aRC4qvy+bbUi2y1ZyrMOn2fEtkEYrzPxrJ329EKgKxxN0ikfeojX3FiS2/Eb+hQ1Ay4h0sg5qC7isxhIdCRt2Io5OTX14MszFWEJyTihHyoPW1B62/6GiUbfqDWNsf4w5f7Kjifizs1ZwFlRmHh9sIf5NaOly5HqFqlrEoG6HXelied28+RpqkC5Qu8PG4wBKD4jh3sShi7yXZBHXrkQa1d9+Ddw2Ly06iK6ejGzWl9swEkC4xaayLns8K5xR+r4U4vKGl8DxuNfCVaSWV9oJCLCBEUpeXvytmKDl71Z3LKg7Z5fqVZqjUrR//w/fbD9+tngl9Qn/m5rylSvFcRpHPD6xkXB53EHgivdQucZMjkscg9wZIe2RScf3D7x/fqx/+vd2sFi3HGDxT65jQMKBEiPKJyRiQ43GPhdK5DxrNdNrGk1UxXpdk86M07cwC4YHOyhL5X5vazufMlXVq9ZW5/5IkeEXmv7bwcicCqrLuD4z0ovwb7y3f9qkSuibx0xLw6u0+JaWmJXr7QGinr+j9DhDdX+7NGKXtKm2tt9INEyqd/Kz3J+lqk6Y/BVNDwb0Ti99/ENs3fruduLvrLgW5b4/Ft9bFh2ZrctuVyaxJy3RdYUvAZk5HNfbkZrYvFUfXlMLSsHqh1AGvyqgWOieyUri8BNNbh24lKu0eRZXewxQLqrKGW2o5b0+dLDzKwqMsPMrCoyw8ysKjLDzKwqPMusrCoyw8ysKjLDzKwqMsPEoXKAuPsvAoC4+y8CgLj/+UwiP4gaW0M+VPm4qnkpKnR0VSyB4A5EAX8siDpM+r61rWZc98/oC7AXiMsif38x18M8KuQ3pb00r7JgT0sL+33McmINxJ4Nqw2kpfggdMqcUxAu8NIwzOIH161iLhJPc6AOhnLtU7Wfvbl2fG0fND+NfWjDcnL3/TO9qucQaXu3sD3nk4PDP0ds/4+ehVWfNRdXNvuQN+p9Mkr2SI8Y1rKgKXC11pJ9+dFCBFdXh0/HzYgs+zw1aKcitFeRD3ntb0xSMBEcCjBXi0YjxyI6v6spFAWtrLCSuMLO0rrFm1XvVaVesk7dWrb5qv3718OdjE8dfw1zcnp28Hm8fDs8Hmq+Pdweabs18Gm6dHmRTsSRwj5Qya49gT/v4HJcSZnvPA9TKIbLG1kXhFSGT6duDt36bQBjOlZTb4KSrU7fUqbN1uZzGkrrpWDbhcWauBzKpqJTBfWXYWCp17Q4RtMnOQezdFKRR/qUMOUryOYgEIVhr8SO40mW80AEnizAp9LJoCfXYBj1zMy5upug5JigBN9aP6qcu0PbNYu/T2Jche9ynyA8F3YuE7PQSbqyhWS794W4bUgAfWAFmmlWXa77NMK6ukdVVSWZz8q4uTsiYoE6JlCVH9KxOiSxOevX6RztiMT81ZmCTriMt1RFm++7Z19nGU/O6x0ibtubTn37Y9/0uLYrIW9V3XomQJ6LsrAf1zk9T1D+7ckJbU101L6g+dlqwiQyajpaRl0lkmnWXSWSadZdJZJp1lkkImKWTSWSadZdJZJp2lPZf2XCadZdJZJp1l0vnve+5g8Yoi8QRC/RuKlvOCS+8jWicZvNaQm3LfVZOsnwpfC42SzPh6FJckyusH5jOlhrwl92558H7v9nnw6/8Dgu1U7w==
192.168.104.1
0 0 OpenVPN0 OpenVPN0
77.88.8.8
0 57342 Dns::InterfaceSpecific-PPPoE0 PPPoE0
1 2c:cc:44:7b:64:98 2c:cc:44:7b:64:98 ipv4
192.168.1.89
Bridge0 1438 7 1436 no no no
2 e4:27:71:19:a3:2b e4:27:71:19:a3:2b ipv4
192.168.1.141
Bridge0 1434 7 0 no no no
3 86:32:ec:e9:77:bc 86:32:ec:e9:77:bc ipv4
192.168.1.93
Bridge0 1425 7 1424 no no yes
4 e4:27:71:19:a3:2b e4:27:71:19:a3:2b ipv4
192.168.1.140
Bridge0 1423 7 1418 no no no
ffffd00 42
0.0.0.0/0 0.0.0.0 PPPoE0 0 U no boot no no 8.8.8.8/32 0.0.0.0 PPPoE0 0 U no boot no no 10.1.30.0/24 0.0.0.0 Guest 0 U no boot no no 10.224.0.0/15 192.168.104.1 OpenVPN0 0 U no boot yes no 51.75.75.245/32 0.0.0.0 PPPoE0 0 U no boot no no 68.171.224.0/19 192.168.104.1 OpenVPN0 0 U no boot yes no 74.82.64.0/19 192.168.104.1 OpenVPN0 0 U no boot yes no 77.88.8.8/32 0.0.0.0 PPPoE0 0 U no boot no no 95.139.192.1/32 0.0.0.0 PPPoE0 0 U no boot no no 103.246.200.0/22 192.168.104.1 OpenVPN0 0 U no boot yes no 178.239.88.0/21 192.168.104.1 OpenVPN0 0 U no boot yes no 185.104.45.0/24 192.168.104.1 OpenVPN0 0 U no boot yes no 192.168.1.0/24 0.0.0.0 Home 0 U no boot no no 192.168.104.0/21 0.0.0.0 OpenVPN0 0 U no boot yes no 192.168.104.1/32 0.0.0.0 OpenVPN0 0 U no boot yes no 193.105.213.36/30 192.168.104.1 OpenVPN0 0 U no boot yes no 203.104.128.0/20 192.168.104.1 OpenVPN0 0 U no boot yes no 203.104.144.0/21 192.168.104.1 OpenVPN0 0 U no boot yes no 203.104.152.0/22 192.168.104.1 OpenVPN0 0 U no boot yes no
0.0.0.0/0 0.0.0.0 PPPoE0 0 U no boot no no 8.8.8.8/32 0.0.0.0 PPPoE0 0 U no boot no no 10.1.30.0/24 0.0.0.0 Guest 0 U no boot no no 10.224.0.0/15 192.168.104.1 OpenVPN0 0 U no boot yes no 51.75.75.245/32 0.0.0.0 PPPoE0 0 U no boot no no 68.171.224.0/19 192.168.104.1 OpenVPN0 0 U no boot yes no 74.82.64.0/19 192.168.104.1 OpenVPN0 0 U no boot yes no 77.88.8.8/32 0.0.0.0 PPPoE0 0 U no boot no no 95.139.192.1/32 0.0.0.0 PPPoE0 0 U no boot no no 103.246.200.0/22 192.168.104.1 OpenVPN0 0 U no boot yes no 178.239.88.0/21 192.168.104.1 OpenVPN0 0 U no boot yes no 185.104.45.0/24 192.168.104.1 OpenVPN0 0 U no boot yes no 192.168.1.0/24 0.0.0.0 Home 0 U no boot no no 192.168.104.0/21 0.0.0.0 OpenVPN0 0 U no boot yes no 192.168.104.1/32 0.0.0.0 OpenVPN0 0 U no boot yes no 193.105.213.36/30 192.168.104.1 OpenVPN0 0 U no boot yes no 203.104.128.0/20 192.168.104.1 OpenVPN0 0 U no boot yes no 203.104.144.0/21 192.168.104.1 OpenVPN0 0 U no boot yes no 203.104.152.0/22 192.168.104.1 OpenVPN0 0 U no boot yes no 0.0.0.0/0 0.0.0.0 PPPoE0 0 U no boot no no 8.8.8.8/32 0.0.0.0 PPPoE0 0 U no boot no no 10.1.30.0/24 0.0.0.0 Guest 0 U no boot no no 10.224.0.0/15 192.168.104.1 OpenVPN0 0 U no boot yes no 51.75.75.245/32 0.0.0.0 PPPoE0 0 U no boot no no 68.171.224.0/19 192.168.104.1 OpenVPN0 0 U no boot yes no 74.82.64.0/19 192.168.104.1 OpenVPN0 0 U no boot yes no 77.88.8.8/32 0.0.0.0 PPPoE0 0 U no boot no no 95.139.192.1/32 0.0.0.0 PPPoE0 0 U no boot no no 95.139.193.129/32 0.0.0.0 PPPoE0 0 U no boot no no 103.246.200.0/22 192.168.104.1 OpenVPN0 0 U no boot yes no 178.239.88.0/21 192.168.104.1 OpenVPN0 0 U no boot yes no 185.104.45.0/24 192.168.104.1 OpenVPN0 0 U no boot yes no 192.168.1.0/24 0.0.0.0 Home 0 U no boot no no 192.168.104.0/21 0.0.0.0 OpenVPN0 0 U no boot yes no 192.168.104.1/32 0.0.0.0 OpenVPN0 0 U no boot yes no 193.105.213.36/30 192.168.104.1 OpenVPN0 0 U no boot yes no 203.104.128.0/20 192.168.104.1 OpenVPN0 0 U no boot yes no 203.104.144.0/21 192.168.104.1 OpenVPN0 0 U no boot yes no 203.104.152.0/22 192.168.104.1 OpenVPN0 0 U no boot yes no 0.0.0.0/0 0.0.0.0 PPPoE0 0 U no boot no no 8.8.8.8/32 0.0.0.0 PPPoE0 0 U no boot no no 10.1.30.0/24 0.0.0.0 Guest 0 U no kernel no no 10.224.0.0/15 192.168.104.1 OpenVPN0 0 U no boot yes no 51.75.75.245/32 0.0.0.0 PPPoE0 0 U no boot no no 68.171.224.0/19 192.168.104.1 OpenVPN0 0 U no boot yes no 74.82.64.0/19 192.168.104.1 OpenVPN0 0 U no boot yes no 77.88.8.8/32 0.0.0.0 PPPoE0 0 U no boot no no 95.139.192.1/32 0.0.0.0 PPPoE0 0 U no kernel no no 103.246.200.0/22 192.168.104.1 OpenVPN0 0 U no boot yes no 178.239.88.0/21 192.168.104.1 OpenVPN0 0 U no boot yes no 185.104.45.0/24 192.168.104.1 OpenVPN0 0 U no boot yes no 192.168.1.0/24 0.0.0.0 Home 0 U no kernel no no 192.168.104.0/21 0.0.0.0 OpenVPN0 0 U no kernel yes no 192.168.104.1/32 0.0.0.0 OpenVPN0 0 U no boot yes no 193.105.213.36/30 192.168.104.1 OpenVPN0 0 U no boot yes no 203.104.128.0/20 192.168.104.1 OpenVPN0 0 U no boot yes no 203.104.144.0/21 192.168.104.1 OpenVPN0 0 U no boot yes no 203.104.152.0/22 192.168.104.1 OpenVPN0 0 U no boot yes no <_NDM_BFD_Telnet> <_NDM_BFD_Http> <_NDM_HTSP_MAC_BLOCK> <_NDM_HTSP_MAC_ALLOW> <_NDM_DNS_SRVS> <_NDM_DNS_IC> <_NDM_DNS_FLT> <_NDM_DNS_SKYDNS> Mon, 8 Aug 2022 20:23:14 GMT http/rci admin dea5d6b375173af656c71c3594fa9369 no no 0 no Media0 2 2.00 ACTIVE SMI Corporation USB DISK AA08013000008428 2004877312 1ED2-3E52 vfat MOUNTED 2000666624 1335656448 nailrouter nailrouter keenetic.link
95.139.193.129
yes direct ub1 yes PPPoE0
95.139.193.129
ndss.keenetic.ru periodic PERIODIC 84998 95.139.193.129 95.139.193.129 periodic 00000000 1402 1402 0 no Chain default policy: ACCEPT == Chain INPUT == -> Chain default policy: ACCEPT == Chain OUTPUT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_DNAT" -> Chain default policy: ACCEPT == Chain POSTROUTING == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_IPSEC_POSTROUTING_NAT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_SNAT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_SNAT_MAPT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_MASQ" -> Chain default policy: ACCEPT == Chain _NDM_DNAT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_STATIC_DNAT" -> Chain default policy: RETURN == Chain _NDM_SNAT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_STATIC_LOOP" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ppp0", proto: "any"; jump to "_NDM_STATIC_SNAT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ovpn_br0", proto: "any"; jump to "_NDM_STATIC_SNAT" -> Chain default policy: RETURN == Chain _NDM_SNAT_MAPT == -> Chain default policy: RETURN == Chain _NDM_MASQ == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_MASQ_BYPASS" src: 192.168.1.0/24, dst: 0.0.0.0/0, in: "*", out: !"br0", proto: "any"; "ndmmark" match, value: 0x4/0x4, invert: 0x0; MASQUERADE src: 10.1.30.0/24, dst: 0.0.0.0/0, in: "*", out: !"br1", proto: "any"; "ndmmark" match, value: 0x4/0x4, invert: 0x0; MASQUERADE -> Chain default policy: RETURN == Chain _NDM_MASQ_BYPASS == src: 224.0.0.0/4, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; ACCEPT src: 0.0.0.0/0, dst: 224.0.0.0/4, in: "*", out: "*", proto: "any"; ACCEPT -> Chain default policy: RETURN == Chain _NDM_SL_PRIVATE == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra8", out: "*", proto: "any"; jump to "_NDM_EZ_DNAT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra2", out: "*", proto: "any"; jump to "_NDM_EZ_DNAT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra3", out: "*", proto: "any"; jump to "_NDM_EZ_DNAT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra7", out: "*", proto: "any"; jump to "_NDM_EZ_DNAT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "br0", out: "*", proto: "any"; jump to "_NDM_EZ_DNAT" -> Chain default policy: RETURN == Chain _NDM_EZ_DNAT == -> Chain default policy: RETURN == Chain _NDM_DNS_REDIRECT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_SD_WEBREDIRECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_SD_DNSREDIRECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_DNS_FLT_REDIR" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_IC_REDIRECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_HOTSPOT_DNSREDIR" -> Chain default policy: RETURN == Chain _NDM_IPSEC_POSTROUTING_NAT == -> Chain default policy: RETURN == Chain _NDM_STATIC_SNAT == -> Chain default policy: RETURN == Chain _NDM_STATIC_DNAT == -> Chain default policy: RETURN == Chain _NDM_STATIC_LOOP == src: 192.168.1.0/24, dst: 192.168.1.0/24, in: "*", out: "br0", proto: "any"; SNAT, address: 192.168.1.1 src: 192.168.1.0/24, dst: 0.0.0.0/0, in: "*", out: "br0", proto: "any"; "ndmmark" match, value: 0x4/0x4, invert: 0x0; SNAT, address: 192.168.1.1 src: 10.1.30.0/24, dst: 10.1.30.0/24, in: "*", out: "br1", proto: "any"; SNAT, address: 10.1.30.1 src: 10.1.30.0/24, dst: 0.0.0.0/0, in: "*", out: "br1", proto: "any"; "ndmmark" match, value: 0x4/0x4, invert: 0x0; SNAT, address: 10.1.30.1 -> Chain default policy: RETURN == Chain _NDM_HOTSPOT_DNSREDIR == -> Chain default policy: RETURN == Chain _NDM_IC_REDIRECT == -> Chain default policy: RETURN == Chain _NDM_DNS_FLT_REDIR == -> Chain default policy: RETURN == Chain _NDM_EZ_BYPASS == src: 0.0.0.0/0, dst: 192.168.1.1/32, in: "*", out: "*", proto: "any"; ACCEPT -> Chain default policy: RETURN == Chain _NDM_SD_DNSREDIRECT == -> Chain default policy: RETURN == Chain _NDM_SD_WEBREDIRECT == -> Chain default policy: RETURN == Chain _NDM_UPNP_REDIRECT_SYS == -> Chain default policy: RETURN == Chain _NDM_UPNP_REDIRECT_0 == -> Chain default policy: RETURN == Chain _NDM_HTTP_PRER_DNAT_ == src: 0.0.0.0/0, dst: 95.139.193.129/32, in: "br0", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , dport: 80; DNAT, address: 78.47.125.180 src: 0.0.0.0/0, dst: 95.139.193.129/32, in: "br0", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , dport: 443; DNAT, address: 78.47.125.180 src: 0.0.0.0/0, dst: 192.168.105.208/32, in: "br0", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , dport: 80; DNAT, address: 78.47.125.180 src: 0.0.0.0/0, dst: 192.168.105.208/32, in: "br0", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , dport: 443; DNAT, address: 78.47.125.180 -> Chain default policy: RETURN ==== Table: "filter" ==== == Chain INPUT == src: 0.0.0.0/0, dst: 224.0.0.0/4, in: "*", out: "*", proto: "UDP"; jump to "_NDM_MULTICAST_INPUT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "IGMP"; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_ACL_IN_EXCEPTIONS" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; "state" match, state: ESTABLISHED, RELATED; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "lo", out: "*", proto: "any"; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_BFD_INPUT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_ACL_IN" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_IPSEC_INPUT_FILTER" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_TUNNELS_INPUT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; "state" match, state: INVALID; DROP src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; "conntrack" match, conntrack state: DNAT; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_INPUT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_SL_PRIVATE" -> Chain default policy: DROP == Chain FORWARD == src: 0.0.0.0/0, dst: 224.0.0.0/4, in: "*", out: "*", proto: "UDP"; jump to "_NDM_MULTICAST_INPUT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; "state" match, state: ESTABLISHED, RELATED; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_ACL_IN" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_ACL_OUT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_IPSEC_FORWARD" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_VPN_FORWARD" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_FORWARD" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; "state" match, state: INVALID; DROP src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; "conntrack" match, conntrack state: DNAT; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_SL_FORWARD" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "lo", out: "*", proto: "any"; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "br0", out: "br0", proto: "any"; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "br1", out: "br1", proto: "any"; ACCEPT -> Chain default policy: DROP == Chain OUTPUT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_BFD_OUTPUT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_ACL_OUT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_IPSEC_OUTPUT_FILTER" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_OUTPUT" -> Chain default policy: ACCEPT == Chain _NDM_ACL_IN_EXCEPTIONS == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "COALAGENT_NF_CHAIN_" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "CLOUD_UDP_SERVICE_NF_CHAIN_" -> Chain default policy: RETURN == Chain _NDM_ACL_IN == -> Chain default policy: RETURN == Chain _NDM_ACL_OUT == -> Chain default policy: RETURN == Chain _NDM_SL_FORWARD == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "eth3", proto: "any"; "state" match, state: NEW; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "apcli0", proto: "any"; "state" match, state: NEW; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "apcli1", proto: "any"; "state" match, state: NEW; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ppp0", proto: "any"; "state" match, state: NEW; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ovpn_br0", proto: "any"; "state" match, state: NEW; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ovpn_br1", proto: "any"; "state" match, state: NEW; jump to "_NDM_SL_PROTECT" -> Chain default policy: RETURN == Chain _NDM_SL_PRIVATE == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra8", out: "*", proto: "any"; "state" match, state: NEW; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra2", out: "*", proto: "any"; "state" match, state: NEW; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra3", out: "*", proto: "any"; "state" match, state: NEW; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra7", out: "*", proto: "any"; "state" match, state: NEW; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "br0", out: "*", proto: "any"; "state" match, state: NEW; ACCEPT -> Chain default policy: RETURN == Chain _NDM_SL_PROTECT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_SL_PRIVATE" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "br1", out: "*", proto: "any"; "state" match, state: NEW; ACCEPT -> Chain default policy: RETURN == Chain _NDM_IP_PUBLIC == -> Chain default policy: RETURN == Chain _NDM_IP_PROTECT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_IP_PUBLIC" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "UDP"; "udp" match, dport: 53; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , dport: 53; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "br0", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , dport: 3517; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "br0", out: "*", proto: "UDP"; "udp" match, dport: 3517; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "br0", out: "*", proto: "UDP"; "udp" match, dport: 3518; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "br1", out: "*", proto: "UDP"; "udp" match, dport: 3518; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "UDP"; "udp" match, dport: 41100; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , dport: 41100; jump to "_NDM_SL_PROTECT" -> Chain default policy: RETURN == Chain _NDM_IP_PRIVATE == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_IP_PROTECT" -> Chain default policy: RETURN == Chain _NDM_FORWARD == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_HOTSPOT_FWD" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_UPNP_FORWARD_SYS" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_UPNP_FORWARD_0" -> Chain default policy: RETURN == Chain _NDM_INPUT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "UDP"; "udp" match, sports: 67-68, dports: 67-68; jump to "_NDM_SL_PROTECT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "UDP"; "udp" match, sport: 67, dport: 68; ACCEPT src: 0.0.0.0/0, dst: 192.168.1.1/32, in: "*", out: "*", proto: "any"; jump to "_NDM_IP_PRIVATE" src: 0.0.0.0/0, dst: 10.1.30.1/32, in: "*", out: "*", proto: "any"; jump to "_NDM_IP_PROTECT" src: 0.0.0.0/0, dst: 95.139.193.129/32, in: "*", out: "*", proto: "any"; jump to "_NDM_IP_PUBLIC" src: 0.0.0.0/0, dst: 192.168.105.208/32, in: "*", out: "*", proto: "any"; jump to "_NDM_IP_PUBLIC" -> Chain default policy: RETURN == Chain _NDM_OUTPUT == -> Chain default policy: RETURN == Chain _NDM_MULTICAST_INPUT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; ACCEPT -> Chain default policy: RETURN == Chain _NDM_BFD_INPUT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_TELNET_INPUT_IN" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_HTTP_INPUT_IN" -> Chain default policy: RETURN == Chain _NDM_BFD_OUTPUT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_TELNET_INPUT_OUT" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_HTTP_INPUT_OUT" -> Chain default policy: RETURN == Chain _NDM_TUNNELS_INPUT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "ESP"; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "GRE"; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "IPIP"; ACCEPT -> Chain default policy: RETURN == Chain _NDM_VPN_FORWARD == -> Chain default policy: RETURN == Chain _NDM_IPSEC_INPUT_FILTER == -> Chain default policy: RETURN == Chain _NDM_IPSEC_INPUT_FLT_BPS == -> Chain default policy: RETURN == Chain _NDM_IPSEC_FORWARD == -> Chain default policy: RETURN == Chain _NDM_IPSEC_OUTPUT_FILTER == -> Chain default policy: RETURN == Chain _NDM_IPSEC_OUTPUT_FLT_BPS == -> Chain default policy: RETURN == Chain NDM_FORWARD_ACL == -> Chain default policy: RETURN == Chain _NDM_TELNET_INPUT_IN == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , dport: 23; "set" match, direction: SRC, name: "_NDM_BFD_Telnet"; DROP -> Chain default policy: RETURN == Chain _NDM_TELNET_INPUT_OUT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , sport: 23; "set" match, direction: DST, name: "_NDM_BFD_Telnet"; DROP -> Chain default policy: RETURN == Chain _NDM_HTTP_INPUT_IN == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , dport: 80; "set" match, direction: SRC, name: "_NDM_BFD_Http"; DROP src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , dport: 443; "set" match, direction: SRC, name: "_NDM_BFD_Http"; DROP -> Chain default policy: RETURN == Chain _NDM_HTTP_INPUT_OUT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , sport: 80; "set" match, direction: DST, name: "_NDM_BFD_Http"; DROP src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , sport: 443; "set" match, direction: DST, name: "_NDM_BFD_Http"; DROP -> Chain default policy: RETURN == Chain _NDM_HOTSPOT_FWD == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra1", out: "*", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ra1", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra8", out: "*", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ra8", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra5", out: "*", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ra5", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra2", out: "*", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ra2", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra6", out: "*", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ra6", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra3", out: "*", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ra3", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra0", out: "*", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ra0", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ra7", out: "*", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ra7", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "br0", out: "*", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "br0", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "br1", out: "*", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "br1", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "eth2.1", out: "*", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "eth2.1", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "eth2.3", out: "*", proto: "any"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "eth2.3", proto: "any"; RETURN -> Chain default policy: RETURN == Chain COALAGENT_NF_CHAIN_ == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "UDP"; "udp" match, dport: 59825; ACCEPT -> Chain default policy: RETURN == Chain _NDM_UPNP_FORWARD_SYS == -> Chain default policy: RETURN == Chain _NDM_UPNP_FORWARD_0 == -> Chain default policy: RETURN == Chain CLOUD_UDP_SERVICE_NF_CHAIN_ == src: 79.143.73.201/32, dst: 95.139.193.129/32, in: "*", out: "*", proto: "UDP"; "udp" match, sport: 9, dport: 4043; ACCEPT -> Chain default policy: RETURN ==== Table: "mangle" ==== == Chain PREROUTING == src: 0.0.0.0/0, dst: 224.0.0.0/4, in: "*", out: "*", proto: "any"; jump to "_NDM_PREROUTING_MC" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_IPSEC_PREROUTING" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_HOTSPOT_PRERT" -> Chain default policy: ACCEPT == Chain INPUT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; "state" match, state: ESTABLISHED, RELATED; "connndmmark" match, mark: 0x20/0x20, invert: 0x1; ACCEPT src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , cmp: , dport: 443; jump to "_NDM_HTTP_INPUT_TLS_" -> Chain default policy: ACCEPT == Chain FORWARD == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; NDMMARK, value: 0x4/0x4 src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_BACKUP_FORWARD" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; "connskip" match, skipcount: 10; jump to "_NDM_DNS_FORWARD" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_IPSEC_FORWARD_MANGLE" src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ppp0", out: "*", proto: "TCP"; "tcp" match, mask: , SYN | RST, cmp: , SYN; TCPMSS, MSS: Clamp to PMTU src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ppp0", proto: "TCP"; "tcp" match, mask: , SYN | RST, cmp: , SYN; TCPMSS, MSS: Clamp to PMTU src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ovpn_br0", out: "*", proto: "TCP"; "tcp" match, mask: , SYN | RST, cmp: , SYN; TCPMSS, MSS: Clamp to PMTU src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ovpn_br0", proto: "TCP"; "tcp" match, mask: , SYN | RST, cmp: , SYN; TCPMSS, MSS: Clamp to PMTU src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ovpn_br1", out: "*", proto: "TCP"; "tcp" match, mask: , SYN | RST, cmp: , SYN; TCPMSS, MSS: Clamp to PMTU src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "ovpn_br1", proto: "TCP"; "tcp" match, mask: , SYN | RST, cmp: , SYN; TCPMSS, MSS: Clamp to PMTU -> Chain default policy: ACCEPT == Chain OUTPUT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_IPSEC_OUTPUT_MANGLE" -> Chain default policy: ACCEPT == Chain POSTROUTING == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_IPSEC_POSTR_MANGLE" -> Chain default policy: ACCEPT == Chain _NDM_PREROUTING_MC == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "UDP"; TTL, mode: INC, value: 1 -> Chain default policy: RETURN == Chain _NDM_IPSEC_PREROUTING == -> Chain default policy: RETURN == Chain _NDM_IPSEC_FORWARD_MANGLE == -> Chain default policy: RETURN == Chain _NDM_IPSEC_POSTR_MANGLE == -> Chain default policy: RETURN == Chain _NDM_IPSEC_POSTR_MANGLE_BPS == -> Chain default policy: RETURN == Chain _NDM_IPSEC_OUTPUT_MANGLE == -> Chain default policy: RETURN == Chain _NDM_BACKUP_DNAT == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; "conntrack" match, conntrack state: DNAT; CONNNDMMARK, ctmark = 0x80, ctmask = 0x80, nfmask = 0xff, mode = SET src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; "conntrack" match, conntrack state: DNAT; NDMMARK, value: 0x80/0x80 -> Chain default policy: RETURN == Chain _NDM_BACKUP_FORWARD == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; "connndmmark" match, mark: 0x80/0x80, invert: 0x0; CONNNDMMARK, ctmark = 0x80, ctmask = 0x80, nfmask = 0x80, mode = RESTORE src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; "connndmmark" match, mark: 0x80/0x80, invert: 0x0; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "ppp0", out: "*", proto: "any"; jump to "_NDM_BACKUP_DNAT" -> Chain default policy: RETURN == Chain _NDM_DNS_FORWARD == -> Chain default policy: RETURN == Chain _NDM_DNS_FORWARD_BLOCK == -> Chain default policy: RETURN == Chain _NDM_HOTSPOT_PRERT == src: 192.168.1.89/32, dst: 0.0.0.0/0, in: "br0", out: "*", proto: "any"; RETURN -> Chain default policy: RETURN == Chain _NDM_FORWARD_DNS_BLOCK_DOH == -> Chain default policy: RETURN == Chain _NDM_FORWARD_DNS_BLOCK_ACT == -> Chain default policy: RETURN == Chain _NDM_HTTP_INPUT_TLS_ == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , SYN, cmp: , SYN, dport: 443; CONNNDMMARK, ctmark = 0x20, ctmask = 0x20, nfmask = 0xff, mode = SET src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , SYN, cmp: , SYN, dport: 443; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , ACK, cmp: , ACK, dport: 443; CONNNDMMARK, ctmark = 0x20, ctmask = 0x20, nfmask = 0xff, mode = SET src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tcp" match, mask: , ACK, cmp: , ACK, dport: 443; "connskip" match, skipcount: 2; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; jump to "_NDM_HTTP_INPUT_TLS_PASS_" -> Chain default policy: RETURN == Chain _NDM_HTTP_INPUT_TLS_PASS_ == src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tls" match, host: "*a98bb54f197bc499192862ee.keenetic.io"; CONNNDMMARK, ctmark = 0x0, ctmask = 0x20, nfmask = 0xff, mode = SET src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tls" match, host: "*a98bb54f197bc499192862ee.keenetic.io"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tls" match, host: "*nailrouter.keenetic.link"; CONNNDMMARK, ctmark = 0x0, ctmask = 0x20, nfmask = 0xff, mode = SET src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "TCP"; "tls" match, host: "*nailrouter.keenetic.link"; RETURN src: 0.0.0.0/0, dst: 0.0.0.0/0, in: "*", out: "*", proto: "any"; DROP -> Chain default policy: RETURN]]> 1429 2.pool.ntp.org yes yes no no default init 0 0 0 S (sleeping) 1 0 1100 kB 620 kB 24 kB 132 kB 12 kB 920 kB 0 kB 1 3 30 1464.402347 0 0 0 0 kthreadd 0 0 0 S (sleeping) 2 0 1 0 30 1464.402370 0 0 0 0 kworker/0:0H 0 0 0 S (sleeping) 4 2 1 0 30 1464.402381 0 0 0 0 kworker/u8:0 0 0 0 S (sleeping) 5 2 1 0 30 1464.402392 0 0 0 0 ksoftirqd/0 0 0 0 S (sleeping) 6 2 1 0 30 1464.402401 0 0 0 0 rcu_sched 0 0 0 S (sleeping) 7 2 1 0 30 1464.402412 0 0 0 0 rcu_bh 0 0 0 S (sleeping) 8 2 1 0 30 1464.402422 0 0 0 0 migration/0 0 0 0 S (sleeping) 9 2 1 0 30 1464.402432 0 0 0 0 lru-add-drain 0 0 0 S (sleeping) 10 2 1 0 30 1464.402443 0 0 0 0 cpuhp/0 0 0 0 S (sleeping) 11 2 1 0 30 1464.402454 0 0 0 0 cpuhp/1 0 0 0 S (sleeping) 12 2 1 0 30 1464.402465 0 0 0 0 migration/1 0 0 0 S (sleeping) 13 2 1 0 30 1464.402477 0 0 0 0 ksoftirqd/1 0 0 0 S (sleeping) 14 2 1 0 30 1464.402488 0 0 0 0 kworker/1:0H 0 0 0 S (sleeping) 16 2 1 0 30 1464.402499 0 0 0 0 cpuhp/2 0 0 0 S (sleeping) 17 2 1 0 30 1464.402511 0 0 0 0 migration/2 0 0 0 S (sleeping) 18 2 1 0 30 1464.402523 0 0 0 0 ksoftirqd/2 0 0 0 S (sleeping) 19 2 1 0 30 1464.402534 0 0 0 0 kworker/2:0H 0 0 0 S (sleeping) 21 2 1 0 30 1464.402546 0 0 0 0 cpuhp/3 0 0 0 S (sleeping) 22 2 1 0 30 1464.402558 0 0 0 0 migration/3 0 0 0 S (sleeping) 23 2 1 0 30 1464.402570 0 0 0 0 ksoftirqd/3 0 0 0 S (sleeping) 24 2 1 0 30 1464.402582 0 0 0 0 kworker/3:0 0 0 0 S (sleeping) 25 2 1 0 30 1464.402593 0 0 0 0 kworker/3:0H 0 0 0 S (sleeping) 26 2 1 0 30 1464.402605 0 0 0 0 kworker/u8:3 0 0 0 S (sleeping) 40 2 1 0 30 1464.402617 0 0 0 0 oom_reaper 0 0 0 S (sleeping) 104 2 1 0 30 1464.402629 0 0 0 0 writeback 0 0 0 S (sleeping) 105 2 1 0 30 1464.402642 0 0 0 0 crypto 0 0 0 S (sleeping) 107 2 1 0 30 1464.402654 0 0 0 0 kworker/0:1 0 0 0 S (sleeping) 108 2 1 0 30 1464.402669 0 1 0 0 bioset 0 0 0 S (sleeping) 109 2 1 0 30 1464.402682 0 0 0 0 kblockd 0 0 0 S (sleeping) 110 2 1 0 30 1464.402695 0 0 0 0 kswapd0 0 0 0 S (sleeping) 145 2 1 0 30 1464.402708 0 0 0 0 vmstat 0 0 0 S (sleeping) 146 2 1 0 30 1464.402721 0 0 0 0 bioset 0 0 0 S (sleeping) 167 2 1 0 30 1464.402735 0 0 0 0 bioset 0 0 0 S (sleeping) 172 2 1 0 30 1464.402748 0 0 0 0 bioset 0 0 0 S (sleeping) 177 2 1 0 30 1464.402761 0 0 0 0 bioset 0 0 0 S (sleeping) 182 2 1 0 30 1464.402774 0 0 0 0 bioset 0 0 0 S (sleeping) 187 2 1 0 30 1464.402787 0 0 0 0 bioset 0 0 0 S (sleeping) 192 2 1 0 30 1464.402802 0 0 0 0 bioset 0 0 0 S (sleeping) 196 2 1 0 30 1464.402816 0 0 0 0 bioset 0 0 0 S (sleeping) 202 2 1 0 30 1464.402830 0 0 0 0 bioset 0 0 0 S (sleeping) 207 2 1 0 30 1464.402844 0 0 0 0 bioset 0 0 0 S (sleeping) 212 2 1 0 30 1464.402859 0 0 0 0 bioset 0 0 0 S (sleeping) 217 2 1 0 30 1464.402873 0 0 0 0 bioset 0 0 0 S (sleeping) 222 2 1 0 30 1464.402887 0 0 0 0 bioset 0 0 0 S (sleeping) 227 2 1 0 30 1464.402901 0 0 0 0 bioset 0 0 0 S (sleeping) 232 2 1 0 30 1464.402916 0 0 0 0 bioset 0 0 0 S (sleeping) 237 2 1 0 30 1464.402931 0 0 0 0 bioset 0 0 0 S (sleeping) 242 2 1 0 30 1464.402946 0 0 0 0 bioset 0 0 0 S (sleeping) 247 2 1 0 30 1464.402961 0 0 0 0 ipv6_addrconf 0 0 0 S (sleeping) 257 2 1 0 30 1464.402976 0 0 0 0 kworker/2:1H 0 0 0 S (sleeping) 262 2 1 0 30 1464.402991 0 0 0 0 kworker/0:1H 0 0 0 S (sleeping) 263 2 1 0 30 1464.403007 0 0 0 0 kworker/1:1H 0 0 0 S (sleeping) 264 2 1 0 30 1464.403022 0 0 0 0 kworker/1:1 0 0 0 S (sleeping) 265 2 1 0 30 1464.403038 0 1 0 0 ndm -16 0 -999 S (sleeping) 266 1 43660 kB 25128 kB 24740 kB 132 kB 28 kB 18428 kB 0 kB 37 62 30 1464.403110 0 18 2 15 kworker/3:1 0 0 0 S (sleeping) 267 2 1 0 30 1464.403127 0 0 0 0 kworker/3:1H 0 0 0 S (sleeping) 268 2 1 0 30 1464.403143 0 0 0 0 bioset 0 0 0 S (sleeping) 303 2 1 0 30 1464.403159 0 0 0 0 bioset 0 0 0 S (sleeping) 345 2 1 0 30 1464.403175 0 0 0 0 irq/38-esw 0 0 0 S (sleeping) 417 2 1 0 30 1464.403191 0 0 0 0 ubi_bgt0d 0 0 0 S (sleeping) 428 2 1 0 30 1464.403209 0 0 0 0 ubifs_bgt0_0 0 0 0 S (sleeping) 429 2 1 0 30 1464.403226 0 0 0 0 ndnproxy -6 0 -400 -c /var/ndnproxymain.conf -p /var/ndnproxymain.pid -s /var/ndnproxysafe.conf -f /var/ndnproxyhostmap.conf S (sleeping) 447 266 1680 kB 1400 kB 180 kB 164 kB 160 kB 1164 kB 0 kB 1 73 30 1464.403243 0 0 0 0 Dns::Proxy RUNNING yes yes yes STARTED kworker/2:2 0 0 0 S (sleeping) 455 2 1 0 30 1465.404972 0 0 0 0 telnetd -11 0 -650 -l ndmc -p 23 -c /var/telnetd.conf -F S (sleeping) 456 266 1356 kB 964 kB 28 kB 132 kB 20 kB 1164 kB 0 kB 1 5 30 1465.404989 0 0 0 0 Telnet::Server RUNNING yes yes yes STARTED coalagent 0 4 0 -c 22b9805c-4b27-11ec-9396-6185f0c2ac88 -C /var/coalagent.conf -s /var/run/coalagent-feedback -t router -f -k **************************************************************** 192.168.1.1 S (sleeping) 458 266 3256 kB 2344 kB 96 kB 132 kB 124 kB 2892 kB 0 kB 1 11 30 1465.405005 0 0 0 0 Coala Agent RUNNING yes yes yes STARTED wind -12 0 -750 -b br0 -i ra5 -i ra0 -k ******************************** S (sleeping) 459 266 3096 kB 864 kB 48 kB 132 kB 12 kB 2892 kB 0 kB 1 7 30 1465.405024 0 0 0 0 Bridge0 Wind RUNNING yes yes yes STARTED mtkiappd -12 0 -750 -e br0 -wi ra5 -wi ra0 -k ******************************** S (sleeping) 463 266 1384 kB 932 kB 32 kB 132 kB 44 kB 1164 kB 0 kB 1 10 30 1465.405044 0 0 0 0 Bridge0 IAPP RUNNING yes yes yes STARTED wind -12 0 -750 -b br1 -i ra6 -i ra1 -k ******************************** S (sleeping) 464 266 3096 kB 968 kB 48 kB 132 kB 12 kB 2892 kB 0 kB 1 7 30 1465.405064 0 0 0 0 Bridge1 Wind RUNNING yes yes yes STARTED ndnproxy -6 0 -400 -c /var/ndnproxy_Policy0.conf -p /var/ndnproxy_Policy0.pid S (sleeping) 466 266 1604 kB 1324 kB 124 kB 144 kB 160 kB 1164 kB 0 kB 1 72 30 1465.405085 0 0 0 0 Dns::Proxy::Policy0 RUNNING yes yes yes STARTED ndhcpc -12 0 -750 -f -n GigabitEthernet1 -i eth3 -s /var/run/ndhcpc-eth3 -p /var/run/ndhcpc-eth3.pid -H Keenetic-1015 S (sleeping) 467 266 1440 kB 1040 kB 28 kB 132 kB 104 kB 1164 kB 0 kB 1 7 30 1465.405106 0 0 0 0 GigabitEthernet1 DHCP client RUNNING yes yes yes STARTED ndhcps -12 0 -750 -f -s -i br0 -I Bridge0 -m 192.168.1.1 -P name:_WEBADMIN,192.168.1.33,192.168.1.152,255.255.255.0,25200 -O opt:router,192.168.1.1 -O opt:dns,192.168.1.1 S (sleeping) 468 266 1456 kB 1064 kB 44 kB 132 kB 104 kB 1164 kB 0 kB 1 8 30 1465.405126 0 0 0 0 _WEBADMIN DHCP pool RUNNING yes yes yes STARTED ndhcps -12 0 -750 -f -s -i br1 -I Bridge1 -m 10.1.30.1 -P name:_WEBADMIN_GUEST_AP,10.1.30.33,10.1.30.152,255.255.255.0,25200 -O opt:router,10.1.30.1 -O opt:dns,10.1.30.1 S (sleeping) 469 266 1456 kB 1064 kB 44 kB 132 kB 104 kB 1164 kB 0 kB 1 8 30 1465.405147 0 0 0 0 _WEBADMIN_GUEST_AP DHCP pool RUNNING yes yes yes STARTED nlldo 0 1 0 -u nobody S (sleeping) 470 266 1348 kB 960 kB 28 kB 132 kB 12 kB 1164 kB 0 kB 1 5 30 1465.405167 0 0 0 0 Link-layer discovery observer RUNNING yes yes yes STARTED avahi-daemon 10 599 600 -s --no-proc-title S (sleeping) 474 266 1608 kB 1168 kB 212 kB 132 kB 328 kB 924 kB 0 kB 1 13 30 1465.405188 0 0 0 0 AVAHI RUNNING yes yes yes STARTED tsmb-server 4 253 250 -c /var/run/tsmb/tsmb.conf S (sleeping) 476 266 10200 kB 2588 kB 6076 kB 132 kB 1008 kB 2644 kB 0 kB 42 85 30 1465.405270 0 0 0 0 CIFS RUNNING yes yes yes STARTED nimproxy -12 0 -750 -e eth3 -i br0 -j /var/run/igmp-join -l /var/run/igmp-leave S (sleeping) 477 266 1364 kB 960 kB 28 kB 132 kB 28 kB 1164 kB 0 kB 1 5 30 1465.405292 0 0 0 0 nimproxy RUNNING yes yes yes STARTED tsmb_core 0 0 0 S (sleeping) 482 2 1 0 30 1465.405313 0 0 0 0 smbd/transp_rx_ 0 0 0 S (sleeping) 483 2 1 0 30 1465.405334 0 0 0 0 send_wait_queue 0 0 0 S (sleeping) 484 2 1 0 30 1465.405355 0 0 0 0 smbd/transp_rx_ 0 0 0 S (sleeping) 485 2 1 0 30 1465.405377 0 0 0 0 timer_smb2_serv 0 0 0 S (sleeping) 486 2 1 0 30 1465.405398 0 0 0 0 smb-crypt 0 0 0 S (sleeping) 487 2 1 0 30 1465.405419 0 0 0 0 open_db_thread 0 0 0 S (sleeping) 488 2 1 0 30 1465.405439 0 0 0 0 timer_open_db 0 0 0 S (sleeping) 489 2 1 0 30 1465.405459 0 0 0 0 pppd -12 0 -750 file /var/run/options-PPPoE0 S (sleeping) 503 266 3292 kB 1548 kB 132 kB 132 kB 276 kB 2740 kB 0 kB 1 11 30 1465.405481 0 0 0 0 PPPoE0 RUNNING yes yes yes STARTED scsi_eh_0 0 0 0 S (sleeping) 506 2 1 0 30 1465.405502 0 0 0 0 scsi_tmf_0 0 0 0 S (sleeping) 507 2 1 0 30 1465.405521 0 0 0 0 usb-storage 0 0 0 S (sleeping) 508 2 1 0 30 1465.405541 0 0 0 0 RtmpCmdQTask 0 0 0 S (sleeping) 509 2 1 0 30 1465.405562 0 0 0 0 RtmpWscTask 0 0 0 S (sleeping) 510 2 1 0 30 1465.405588 0 0 0 0 HwCtrlTask 0 0 0 D (disk sleep) 511 2 1 0 30 1465.405609 0 0 0 0 ser_task 0 0 0 S (sleeping) 512 2 1 0 30 1465.405629 0 0 0 0 RtmpMlmeTask 0 0 0 S (sleeping) 514 2 1 0 30 1465.405646 0 0 0 0 bioset 0 0 0 S (sleeping) 515 2 1 0 30 1465.405663 0 0 0 0 nginx -8 0 -500 S (sleeping) 519 266 8852 kB 5956 kB 2384 kB 132 kB 1232 kB 3616 kB 0 kB 1 29 30 1465.405682 0 0 0 0 Nginx RUNNING yes yes yes STARTED tfat32d/sda1 0 0 0 S (sleeping) 522 2 1 0 30 1465.405702 0 0 0 0 tfatud/sda1 0 0 0 S (sleeping) 523 2 1 0 30 1465.405726 0 0 0 0 audit 0 0 0 S (sleeping) 544 2 1 0 30 1465.405746 0 0 0 0 smbd/transp_rx_ 0 0 0 S (sleeping) 545 2 1 0 30 1465.405764 0 0 0 0 tsmb_transport0 0 0 0 S (sleeping) 546 2 1 0 30 1465.405784 0 0 0 0 vfs-ctrl-378027 0 0 0 S (sleeping) 547 2 1 0 30 1465.405804 0 0 0 0 vfs-io-37802708 0 0 0 S (sleeping) 548 2 1 0 30 1465.405820 0 0 0 0 bndstrg -12 0 -750 -d 0 S (sleeping) 567 266 1152 kB 644 kB 52 kB 132 kB 36 kB 920 kB 0 kB 1 6 30 1465.405836 0 0 0 0 bndstrg RUNNING yes yes yes STARTED miniupnpd 11 699 700 -a Bridge0 br0 -i PPPoE0 -m KN-1011 -u 22b9805c-4b27-11ec-9396-6185f0c2ac88 -s S2148WF003286 -N -U -S -R 1 -g 0 -Y 1900 -C 5351 -p 1900 -Q 1900 -P /var/run/miniupnpd_System.pid S (sleeping) 575 266 1468 kB 1004 kB 56 kB 132 kB 104 kB 1164 kB 0 kB 1 9 30 1465.405851 0 0 0 0 System RUNNING yes yes yes STARTED nllda 0 1 0 -I Bridge0 -p Home -M 50:ff:20:78:b0:1b -x 23 -n Keenetic-1015 -D Keenetic Giga (NDMS 3.08.C.3.0-0): KN-1011 -m router -V 3.08.C.3.0-0 -c 22b9805c-4b27-11ec-9396-6185f0c2ac88 -u nobody -T a98bb54f197bc499192862ee.keenetic.io -P 80 -A 192.168.1.1 -S private -b S (sleeping) 593 266 1348 kB 944 kB 28 kB 132 kB 12 kB 1164 kB 0 kB 1 5 30 1465.405866 0 0 0 0 LLDP agent on Bridge0 RUNNING yes yes yes STARTED kworker/1:2 0 0 0 S (sleeping) 1064 2 1 0 30 1465.405882 0 0 0 0 kworker/0:2 0 0 0 S (sleeping) 2579 2 1 0 30 1465.405898 0 0 0 0 openvpn -5 0 -300 --syslog OpenVPN0 --config /tmp/openvpn/OpenVPN0/openvpn.config --user nobody --group nobody --syslog OpenVPN0 --up /tmp/openvpn/OpenVPN0/openvpn-up --down /tmp/openvpn/OpenVPN0/openvpn-down --ipchange /tmp/openvpn/OpenVPN0/openvpn-ipchange --tls-verify /tmp/openvpn/OpenVPN0/openvpn-tls-verify --client-connect /tmp/openvpn/OpenVPN0/openvpn-client-connect --route-up /tmp/openvpn/OpenVPN0/openvpn-route-up --client-disconnect /tmp/openvpn/OpenVPN0/openvpn-client-disconnect --learn-address /tmp/openvpn/OpenVPN0/openvpn-learn-address --up-restart --down-pre S (sleeping) 2789 266 4496 kB 3948 kB 304 kB 132 kB 496 kB 3552 kB 0 kB 1 6 30 1465.405914 0 0 0 0 OpenVPN0 RUNNING yes yes yes STARTED kworker/2:0 0 0 0 S (sleeping) 2804 2 1 0 30 1465.405931 0 0 0 0 nginx: worker process -8 0 -500 S (sleeping) 2824 519 9180 kB 3072 kB 2712 kB 132 kB 1232 kB 3616 kB 0 kB 1 27 30 1465.405948 0 0 0 0 nginx: worker process -8 0 -500 S (sleeping) 2825 519 9180 kB 3848 kB 2712 kB 132 kB 1232 kB 3616 kB 0 kB 1 31 30 1465.405965 0 1 0 0 nginx: worker process -8 0 -500 S (sleeping) 2826 519 9180 kB 3844 kB 2712 kB 132 kB 1232 kB 3616 kB 0 kB 1 27 30 1465.405981 0 0 0 0 nginx: worker process -8 0 -500 S (sleeping) 2827 519 9180 kB 3072 kB 2712 kB 132 kB 1232 kB 3616 kB 0 kB 1 27 30 1465.405998 0 0 0 0 miniupnpd 11 699 700 -a Bridge0 br0 -i PPPoE0 -m KN-1011 -u 22b9805c-4b27-11ec-9396-6185f0c2ac88 -s S2148WF003286 -N -U -S -R 0 -g 1 -Y 41117 -C 41118 -p 1900 -Q 41117 -P /var/run/miniupnpd_Policy0.pid S (sleeping) 2832 266 1468 kB 1068 kB 56 kB 132 kB 104 kB 1164 kB 0 kB 1 9 30 1465.406014 0 0 0 0 Policy0 RUNNING yes yes yes STARTED kworker/0:0 0 0 0 S (sleeping) 3390 2 1 0 30 1465.406031 0 23 1 0 -1 Reboot helper STOPPED -1 ARP ping check STOPPED -1 LLDP agent on GigabitEthernet1 STOPPED yes no no STOPPED -1 Dhcp::RelayService STOPPED no no no STOPPED -1 DLNA STOPPED no no no STOPPED -1 LLDP agent on WifiMaster1/AccessPoint1 STOPPED yes no no STOPPED -1 WebDAV server STOPPED yes no no STOPPED -1 LLDP agent on WifiMaster0/AccessPoint3 STOPPED yes no no STOPPED -1 LLDP agent on WifiMaster0/AccessPoint0 STOPPED yes no no STOPPED -1 LLDP agent on WifiMaster1/AccessPoint2 STOPPED yes no no STOPPED -1 LLDP agent on WifiMaster0/AccessPoint1 STOPPED yes no no STOPPED -1 LLDP agent on WifiMaster1/AccessPoint3 STOPPED yes no no STOPPED -1 LLDP agent on WifiMaster1/AccessPoint0 STOPPED yes no no STOPPED -1 LLDP agent on WifiMaster0/AccessPoint2 STOPPED yes no no STOPPED -1 LLDP agent on WifiMaster1/WifiStation0 STOPPED yes no no STOPPED -1 LLDP agent on WifiMaster0/WifiStation0 STOPPED yes no no STOPPED -1 Bridge1 IAPP STOPPED no no yes STOPPED -1 OpenVPN1 STOPPED no no no STOPPED -1 LLDP agent on GigabitEthernet0/Vlan1 STOPPED yes no no STOPPED -1 LLDP agent on GigabitEthernet0/Vlan3 STOPPED yes no no STOPPED -1 LLDP agent on Bridge1 STOPPED yes no no STOPPED -1 LLDP agent on OpenVPN0 STOPPED yes no no STOPPED -1 LLDP agent on OpenVPN1 STOPPED yes no no STOPPED Keenetic-1015 WORKGROUP 22 91012/524288 0/0 524288 371564 24216 37496 0 0 1465 36 22 1 22 5 6 0 11 2 0 0 0 0 15 0 15 2 8 0 8 0 0 0 0 0 0 0 0 0 off off router router router, extender no no no cli readonly http http-proxy printers cifs vpn-dlna webdav Main 266 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Io::Pollable::Wait(Io::Pollable**, Io::ModeT const*, pollfd*, unsigned int, int, char const*)+0x01128 Core::Server::Loop_()+0x0284 Core::Server::Run()+0x0556 Core::Main::Run() [clone .part.0]+0x01676 main()+0x076 ]]> 0 0.000000 0 0 0 0 Syslog 269 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Core::Syslog::Run()+0x0272 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398176 0 0 0 0 Watchdog 272 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 __clock_nanosleep_time64()+0x0336 __nanosleep_time64()+0x048 Sleep(Time::Span const&)+0x0488 Sleep(long)+0x076 Core::Watchdog::Run()+0x02436 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398213 0 0 0 0 Kernel neighbour netlink listener 408 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Io::Pollable::Wait(Io::Pollable**, Io::ModeT const*, pollfd*, unsigned int, int, char const*)+0x01128 Io::PollableDgram::GetBytesAvailable(unsigned int&)+0x0204 (anonymous namespace)::WaitForReply_(Io::Netlink&, nlmsghdr const*, Io::Nla::Parse::OnResponse*, AutoBufferBase&)+0x0336 Io::Netlink::Recv(unsigned int, Io::Nla::Parse::OnResponse&)+0x0164 Network::NeighbourListener::Run()+0x0176 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398291 0 0 0 0 Cloud agent service 430 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Io::Pollable::Wait(Io::Pollable**, Io::ModeT const*, pollfd*, unsigned int, int, char const*)+0x01128 Cloud::UdpTransport::WaitEvents(int)+0x0124 Cloud::Agent::UhpService_::DoControlListener_()+0x0472 Cloud::Agent::UhpService_::DoActive_()+0x0284 Cloud::Agent::UhpService_::Run()+0x0700 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398371 0 0 0 0 Peripheral manager 398 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 __clock_nanosleep_time64()+0x0336 __nanosleep_time64()+0x048 Sleep(Time::Span const&)+0x0488 Core::Peripheral::Manager::Run()+0x01276 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398239 0 0 0 0 Interface Bridge1 IPv4 neighbour explorer 453 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Io::Pollable::Wait(Io::Pollable**, Io::ModeT const*, pollfd*, unsigned int, int, char const*)+0x01128 Hotspot::Discovery::Explorer::Run()+0x0344 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398590 0 0 0 0 SCGI Session /var/run/ndm.scgi.socket 0 yes 0 0.000000 0 0 0 0 SCGI Session /var/run/ndm.scgi.socket 3913 yes 2 1465.398647 5 24 13 24 Component lister 0 yes 0 0.000000 0 0 0 0 Process manager 401 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 __sigtimedwait_time64()+0x0292 (anonymous namespace)::Posix::Exec_::Run()+0x0224 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398260 0 0 0 0 Session /var/run/ndm.core.socket 2833 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Io::Pollable::Wait(Io::Pollable**, Io::ModeT const*, pollfd*, unsigned int, int, char const*)+0x01128 Io::PollableBase::SysRead(void*, unsigned int, unsigned int&)+0x0220 Io::Buffer::Fill_()+0x068 Io::Buffer::GetChar()+0x0152 Xml::Stream::Read(Io::IStream&, Xml::Node&, unsigned int)+0x0128 Core::Session::Run()+0x0272 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398637 0 0 0 0 Authentication request /var/run/ndm.auth.socket 0 yes 0 0.000000 0 0 0 0 Component lister 0 yes 0 0.000000 0 0 0 0 Session /var/run/ndm.core.socket 576 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Io::Pollable::Wait(Io::Pollable**, Io::ModeT const*, pollfd*, unsigned int, int, char const*)+0x01128 Io::PollableBase::SysRead(void*, unsigned int, unsigned int&)+0x0220 Io::Buffer::Fill_()+0x068 Io::Buffer::GetChar()+0x0152 Xml::Stream::Read(Io::IStream&, Xml::Node&, unsigned int)+0x0128 Core::Session::Run()+0x0272 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398617 0 0 0 0 Telnet brute force detection 411 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Io::Pollable::Wait(Io::Pollable**, Io::ModeT const*, pollfd*, unsigned int, int, char const*)+0x01128 Netfilter::Util::BfdManager::Run()+0x0264 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398315 0 0 0 0 HTTP brute force detection 413 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Io::Pollable::Wait(Io::Pollable**, Io::ModeT const*, pollfd*, unsigned int, int, char const*)+0x01128 Netfilter::Util::BfdManager::Run()+0x0264 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398331 0 0 0 0 Hotplug manager 427 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Io::Pollable::Wait(Io::Pollable**, Io::ModeT const*, pollfd*, unsigned int, int, char const*)+0x01128 Io::PollableDgram::GetBytesAvailable(unsigned int&)+0x0204 Usb::Hotplug::Manager::Run()+0x0320 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398363 0 0 0 0 Mws::MemberList 528 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 __clock_nanosleep_time64()+0x0336 __nanosleep_time64()+0x048 Sleep(Time::Span const&)+0x0488 Mws::(anonymous namespace)::DataGatherTask_::Run()+0x0156 Task::Thread::Run_()+0x01160 Task::Thread::Run()+0x056 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398607 0 0 0 0 WPS state machine 0 yes 0 0.000000 0 0 0 0 Feedback listener 414 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Io::Pollable::Wait(Io::Pollable**, Io::ModeT const*, pollfd*, unsigned int, int, char const*)+0x01128 Io::UnixStreamServer::Accept(AutoPtr&, Io::ModeT, unsigned int, Io::EndOfLineT)+0x0460 FeedbackListener::Server_::Run()+0x0176 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398339 0 0 0 0 WPS state machine 0 yes 0 0.000000 0 0 0 0 WPS state machine 0 yes 0 0.000000 0 0 0 0 WPS state machine 0 yes 0 0.000000 0 0 0 0 Interface Bridge0 IPv4 neighbour explorer 452 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Io::Pollable::Wait(Io::Pollable**, Io::ModeT const*, pollfd*, unsigned int, int, char const*)+0x01128 Hotspot::Discovery::Explorer::Run()+0x0344 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398581 0 0 0 0 Wi-Fi events netlink listener 433 yes ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 poll()+0x060 Io::Pollable::Wait(Io::Pollable**, Io::ModeT const*, pollfd*, unsigned int, int, char const*)+0x01128 Io::PollableDgram::GetBytesAvailable(unsigned int&)+0x0204 (anonymous namespace)::WaitForReply_(Io::Netlink&, nlmsghdr const*, Io::Nla::Parse::OnResponse*, AutoBufferBase&)+0x0336 Io::Netlink::Recv(unsigned int, Io::Nla::Parse::OnResponse&)+0x0164 Network::Interface::Rtx::WifiMonitor::Run()+0x0196 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1465.398396 0 0 0 0 WPS state machine 0 yes 0 0.000000 0 0 0 0 WPS state machine 0 yes 0 0.000000 0 0 0 0 WPS state machine 0 yes 0 0.000000 0 0 0 0 WPS state machine 0 yes 0 0.000000 0 0 0 0 WPS state machine 0 yes 0 0.000000 0 0 0 0 WPS state machine 0 yes 0 0.000000 0 0 0 0 Hotspot::Manager::Queue_ 416 yes TASK_QUEUE_THREAD 216 WAITING Aug 8 23:23:22 368.700657 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Task::Thread::Run_()+0x01448 Task::Thread::Run()+0x056 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398387 0 0 0 0 Acme::Client::Queue_ 426 yes TASK_QUEUE_THREAD 216 WAITING Aug 8 23:06:40 1371.166396 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Task::Thread::Run_()+0x01448 Task::Thread::Run()+0x056 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398394 0 0 0 0 NTP client 412 yes CORE 4 WAITING Aug 8 23:02:50 1431.214750 ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0292 Ntp::Client::Run()+0x02732 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398368 0 0 0 0 Network::PolicyTable::Queue_ 410 yes TASK_QUEUE_THREAD 216 WAITING Aug 8 23:23:22 368.276532 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Task::Thread::Run_()+0x01448 Task::Thread::Run()+0x056 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398356 0 0 0 0 Internet checker 409 yes EASYCONFIG_MANAGER 27 WAITING Aug 8 23:29:24 7.268256 ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0292 Network::InternetChecker::Run()+0x0836 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398350 0 0 0 0 NDNS updater 432 yes CLOUD_COMPONENT 49 WAITING Jan 1 03:00:09 1457.284659 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Ndns::Client::Updater_::Run()+0x0572 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398418 0 0 0 0 Network::Interface::OpenVpn::Queue_ 448 yes TASK_QUEUE_THREAD 216 WAITING Aug 8 23:23:15 376.098641 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Task::Thread::Run_()+0x01448 Task::Thread::Run()+0x056 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398436 0 0 0 0 Ndns::Client::Queue_ 431 yes TASK_QUEUE_THREAD 216 WAITING Jan 1 03:00:09 1457.374298 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Task::Thread::Run_()+0x01448 Task::Thread::Run()+0x056 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398412 0 0 0 0 Core::Webhelp::EventRelay 403 yes NDSS_OWNER 87 WAITING Aug 8 23:05:40 1431.481159 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Core::Webhelp::EventRelay::Impl_::Run()+0x0272 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398323 0 0 0 0 Process kill timer 400 yes ALARM_QUEUE 222 WAITING Aug 8 23:23:24 366.539069 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Timer::Run()+0x01292 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398281 0 0 0 0 Core::System::StartupConfig 402 yes CONFIG_STORAGE 200 WAITING Aug 8 23:23:15 376.023254 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Core::System::StartupConfig::Impl_::Run()+0x0192 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398316 0 0 0 0 Neighbour table queue 407 yes TASK_QUEUE_THREAD 216 WAITING Aug 8 23:29:23 8.272408 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Task::Thread::Run_()+0x01448 Task::Thread::Run()+0x056 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398336 0 0 0 0 Event sender 397 yes EVENT_SENDER_QUEUE 224 WAITING Aug 8 23:29:29 1.488939 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Event::Sender::Run()+0x01668 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398246 0 0 0 0 Statistics collector thread 273 yes ULTIMATE 255 WAITING Aug 8 23:29:29 1.588790 ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0292 Stats::Thread_::Run()+0x0224 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398240 0 0 0 0 Main task queue 271 yes TASK_QUEUE_THREAD 216 WAITING Aug 8 23:23:23 368.419417 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Task::Thread::Run_()+0x01448 Task::Thread::Run()+0x056 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398225 0 0 0 0 Timer 270 yes ALARM_QUEUE 222 WAITING Aug 8 23:29:29 1.653040 ()+0x00 __cp_end()+0x00 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0292 Timer::Run()+0x0780 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398218 0 0 0 0 Reboot timer 399 yes ALARM_QUEUE 222 WAITING Jan 1 00:00:08 1458.891782 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Timer::Run()+0x01292 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398270 0 0 0 0 Queue::default::coala/rci 461 yes TASK_QUEUE_THREAD 216 WAITING Aug 8 23:29:29 2.075111 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Task::Thread::Run_()+0x01448 Task::Thread::Run()+0x056 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398456 0 0 0 0 Queue::ACPVSZJNHMZRSIJI::http/rci 663 yes TASK_QUEUE_THREAD 216 WAITING Aug 8 23:29:30 1.743128 ()+0x00 __cp_begin()+0x060 __syscall_cp_c()+0x0204 __timedwait_cp()+0x0448 __pthread_cond_timedwait_time64()+0x0328 Condition::Wait(long) const+0x0844 Task::Thread::Run_()+0x01448 Task::Thread::Run()+0x056 Thread::StartRoutine_(void*)+0x01068 start()+0x0200 __clone()+0x0108 ]]> 30 1466.398477 0 7 1 0 Media0 /devices/platform/xhci-mtk/usb1/1-2/1-2:1.0 /devices/platform/xhci-mtk/usb1/1-2/1-2:1.0/host0/target0:0:0/0:0:0:0/block/sda SMI Corporation USB DISK AA08013000008428 media 2 yes 2.00 3.08.C.3.0-0 stable 3.8.3 mips 0-c2b5ea4c4 8 Jul 2022 0-c9dbac3d8e 8 Jul 2022 3.8.206 dual_image,wifi_button,usb_3,usb_3_first,led_control,wifi5ghz,vht2ghz,mimo2ghz,mimo5ghz,atf2ghz,atf5ghz,wifi6,wifi_ft,wpa3,wsa5ghz,hwnat,sfp base,cloudcontrol,corewireless,ddns,dhcpd,dlna,dns-filter,dns-https,dns-tls,dot1x,easyconfig,exfat,ext,fat,hfsplus,igmp,l2tp,lang-en,lang-ru,miniupnpd,mws,nathelper-ftp,nathelper-h323,nathelper-pptp,nathelper-rtsp,nathelper-sip,ndmp,ndns,ntfs,openvpn,pingcheck,ppe,pppoe,pptp,skydns,storage,trafficcontrol,tsmb,usb,usblte,usbmodem,usbnet,usbqmi,webdav 1.35 Keenetic Ltd. Keenetic KN Giga (KN-1011) 11108000 router KN-1011 Giga RU Keenetic Giga (KN-1011)