BandaAncha.eu

  • 🔍 en 📰 artículos ⏎
  • 🔍 en 💬 foros ⏎
  • 🔍 en 👇 este 💬 foro ⏎
  • 🔍 en 👇 este 💬 tema ⏎
Regístrate Regístrate Identifícate Identifícate
ADSL

Microcortes muy constantes!

BocaDePez
BocaDePez

Hola que tal?

Vereis tengo Jazztel desde hace un par de meses y desde el primer día he tenido cortes constantes, incrementados cada vez que conecto a algun juego online con lo que se hace imposible poder jugar durante mas de 10min. Ultimamente parece que se han incrementado los cortes, como digo, sobretodo cuando juego online, no aguanta la conexion ni un minuto.

He hablado varias veces con Jazztel, me abrieron incidencia, vinieron tecnicos y esto sigue como el primero día o peor.

Pego aquí el log del router a ver si vosotros que entendeis mas de esto podeis echarme una manita.

Muchas gracias!

Date/TimeFacilitySeverityMessageJan 1 00:30:56useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=85.61.28.53 DST=87.221.11.117 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=20322 DF PROTO=TCP SPT=2890 DPT=6882 WINDOW=65535 RES=0x00 SYN URGP=0Jan 1 00:30:59useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=85.61.28.53 DST=87.221.11.117 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=20385 DF PROTO=TCP SPT=2890 DPT=6882 WINDOW=65535 RES=0x00 SYN URGP=0Jan 1 00:31:05useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=85.61.28.53 DST=87.221.11.117 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=20499 DF PROTO=TCP SPT=2890 DPT=6882 WINDOW=65535 RES=0x00 SYN URGP=0Jan 1 00:33:02useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=85.61.28.53 DST=87.221.11.117 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=22767 DF PROTO=TCP SPT=3359 DPT=6882 WINDOW=65535 RES=0x00 SYN URGP=0Jan 1 00:33:04useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=85.61.28.53 DST=87.221.11.117 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=22824 DF PROTO=TCP SPT=3359 DPT=6882 WINDOW=65535 RES=0x00 SYN URGP=0Jan 1 00:39:01usercritkernel: ADSL link downJan 1 00:39:03daemoncritpppd[606]: Clear IP addresses. Connection DOWN.Jan 1 00:39:03daemoncritpppd[606]: Clear IP addresses. PPP connection DOWN.Jan 1 00:39:11usercritkernel: ADSL G.994 trainingJan 1 00:39:21usercritkernel: ADSL G.992 startedJan 1 00:39:26usercritkernel: ADSL G.992 channel analysisJan 1 00:39:28usercritkernel: ADSL link up, fast, us=1024, ds=6144Jan 1 00:39:44daemoncritpppd[606]: PPP server detected.Jan 1 00:39:44daemoncritpppd[606]: PPP session established.Jan 1 00:39:47daemoncritpppd[606]: PPP LCP UP.Jan 1 00:39:47daemoncritpppd[606]: Received valid IP address from server. Connection UP.Jan 1 00:42:38usercritkernel: OAM loopback response not received on VPI/VCI 8/35.Jan 1 00:42:39usercritkernel: OAM loopback response not received on VPI/VCI 8/35.Jan 1 00:45:56useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=86.194.143.183 DST=87.221.10.151 LEN=52 TOS=0x00 PREC=0x00 TTL=253 ID=6809 DF PROTO=TCP SPT=53737 DPT=39591 WINDOW=8192 RES=0x00 SYN URGP=0Jan 1 00:45:59useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=86.194.143.183 DST=87.221.10.151 LEN=52 TOS=0x00 PREC=0x00 TTL=253 ID=7565 DF PROTO=TCP SPT=53737 DPT=39591 WINDOW=8192 RES=0x00 SYN URGP=0Jan 1 00:46:39useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=86.194.143.183 DST=87.221.10.151 LEN=52 TOS=0x00 PREC=0x00 TTL=253 ID=16086 DF PROTO=TCP SPT=53798 DPT=39591 WINDOW=8192 RES=0x00 SYN URGP=0Jan 1 00:47:27useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=79.151.214.95 DST=87.221.10.151 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=24434 DF PROTO=TCP SPT=62218 DPT=39591 WINDOW=8192 RES=0x00 SYN URGP=0Jan 1 00:47:30useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=79.151.214.95 DST=87.221.10.151 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=24583 DF PROTO=TCP SPT=62218 DPT=39591 WINDOW=8192 RES=0x00 SYN URGP=0Jan 1 00:54:16usercritkernel: OAM loopback response not received on VPI/VCI 8/35.Jan 1 00:54:17usercritkernel: OAM loopback response not received on VPI/VCI 8/35.Jan 1 00:55:57useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=86.194.143.183 DST=87.221.10.151 LEN=52 TOS=0x00 PREC=0x00 TTL=253 ID=27403 DF PROTO=TCP SPT=54637 DPT=39591 WINDOW=8192 RES=0x00 SYN URGP=0Jan 1 00:58:09usercritkernel: ADSL link downJan 1 00:58:11daemoncritpppd[606]: Clear IP addresses. Connection DOWN.Jan 1 00:58:11daemoncritpppd[606]: Clear IP addresses. PPP connection DOWN.Jan 1 00:58:21usercritkernel: ADSL G.994 trainingJan 1 00:58:31usercritkernel: ADSL G.992 startedJan 1 00:58:36usercritkernel: ADSL G.992 channel analysisJan 1 00:58:38usercritkernel: ADSL link up, fast, us=1024, ds=6144Jan 1 00:58:54daemoncritpppd[606]: PPP server detected.Jan 1 00:58:54daemoncritpppd[606]: PPP session established.Jan 1 00:58:57daemoncritpppd[606]: PPP LCP UP.Jan 1 00:58:57daemoncritpppd[606]: Received valid IP address from server. Connection UP.Jan 1 01:03:40usercritkernel: OAM loopback response not received on VPI/VCI 8/35.Jan 1 01:03:41usercritkernel: OAM loopback response not received on VPI/VCI 8/35.

Un saludete!

BocaDePez
BocaDePez
1

Cuelgo de nuevo el log que lo pegué mal antes, perdon.

Date/TimeFacilitySeverityMessage
Jan 1 00:30:56useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=85.61.28.53 DST=87.221.11.117 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=20322 DF PROTO=TCP SPT=2890 DPT=6882 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:30:59useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=85.61.28.53 DST=87.221.11.117 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=20385 DF PROTO=TCP SPT=2890 DPT=6882 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:31:05useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=85.61.28.53 DST=87.221.11.117 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=20499 DF PROTO=TCP SPT=2890 DPT=6882 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:33:02useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=85.61.28.53 DST=87.221.11.117 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=22767 DF PROTO=TCP SPT=3359 DPT=6882 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:33:04useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=85.61.28.53 DST=87.221.11.117 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=22824 DF PROTO=TCP SPT=3359 DPT=6882 WINDOW=65535 RES=0x00 SYN URGP=0
Jan 1 00:39:01usercritkernel: ADSL link down
Jan 1 00:39:03daemoncritpppd[606]: Clear IP addresses. Connection DOWN.
Jan 1 00:39:03daemoncritpppd[606]: Clear IP addresses. PPP connection DOWN.
Jan 1 00:39:11usercritkernel: ADSL G.994 training
Jan 1 00:39:21usercritkernel: ADSL G.992 started
Jan 1 00:39:26usercritkernel: ADSL G.992 channel analysis
Jan 1 00:39:28usercritkernel: ADSL link up, fast, us=1024, ds=6144
Jan 1 00:39:44daemoncritpppd[606]: PPP server detected.
Jan 1 00:39:44daemoncritpppd[606]: PPP session established.
Jan 1 00:39:47daemoncritpppd[606]: PPP LCP UP.
Jan 1 00:39:47daemoncritpppd[606]: Received valid IP address from server. Connection UP.
Jan 1 00:42:38usercritkernel: OAM loopback response not received on VPI/VCI 8/35.
Jan 1 00:42:39usercritkernel: OAM loopback response not received on VPI/VCI 8/35.
Jan 1 00:45:56useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=86.194.143.183 DST=87.221.10.151 LEN=52 TOS=0x00 PREC=0x00 TTL=253 ID=6809 DF PROTO=TCP SPT=53737 DPT=39591 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:45:59useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=86.194.143.183 DST=87.221.10.151 LEN=52 TOS=0x00 PREC=0x00 TTL=253 ID=7565 DF PROTO=TCP SPT=53737 DPT=39591 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:46:39useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=86.194.143.183 DST=87.221.10.151 LEN=52 TOS=0x00 PREC=0x00 TTL=253 ID=16086 DF PROTO=TCP SPT=53798 DPT=39591 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:47:27useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=79.151.214.95 DST=87.221.10.151 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=24434 DF PROTO=TCP SPT=62218 DPT=39591 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:47:30useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=79.151.214.95 DST=87.221.10.151 LEN=48 TOS=0x00 PREC=0x00 TTL=253 ID=24583 DF PROTO=TCP SPT=62218 DPT=39591 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:54:16usercritkernel: OAM loopback response not received on VPI/VCI 8/35.
Jan 1 00:54:17usercritkernel: OAM loopback response not received on VPI/VCI 8/35.
Jan 1 00:55:57useralertkernel: Intrusion -> IN=ppp_8_35_1 OUT= MAC= SRC=86.194.143.183 DST=87.221.10.151 LEN=52 TOS=0x00 PREC=0x00 TTL=253 ID=27403 DF PROTO=TCP SPT=54637 DPT=39591 WINDOW=8192 RES=0x00 SYN URGP=0
Jan 1 00:58:09usercritkernel: ADSL link down
Jan 1 00:58:11daemoncritpppd[606]: Clear IP addresses. Connection DOWN.
Jan 1 00:58:11daemoncritpppd[606]: Clear IP addresses. PPP connection DOWN.
Jan 1 00:58:21usercritkernel: ADSL G.994 training
Jan 1 00:58:31usercritkernel: ADSL G.992 started
Jan 1 00:58:36usercritkernel: ADSL G.992 channel analysis
Jan 1 00:58:38usercritkernel: ADSL link up, fast, us=1024, ds=6144
Jan 1 00:58:54daemoncritpppd[606]: PPP server detected.
Jan 1 00:58:54daemoncritpppd[606]: PPP session established.
Jan 1 00:58:57daemoncritpppd[606]: PPP LCP UP.
Jan 1 00:58:57daemoncritpppd[606]: Received valid IP address from server. Connection UP.
Jan 1 01:03:40usercritkernel: OAM loopback response not received on VPI/VCI 8/35.
Jan 1 01:03:41usercritkernel: OAM loopback response not received on VPI/VCI 8/35.
🗨️ 23
Ari

¿ Puedes pegarnos lo que verás aquí 192.168.1.1/statsadsl.html ?

Saludos

🗨️ 10
BocaDePez
BocaDePez

Ahí va eso!

Modo:G.DMT
Tipo:Fast
Codigo linea:Trellis On
Estado:No Defect
Estado del enlace:L0
DescargaSubida
Margen SNR (dB):19.310.0
Atenuacion (dB):23.011.5
Potencia Salida (dBm):19.812.5
Sincronismo sostenido alcanzable (Kbps):89281088
Sincronismo (Kbps):61441024
K (numero de bytes en un cuadro DMT):19333
R (numero de bytes comprob. en palabra RS.):00
S (dimensiones de palabra codigo RS en cuadro DMT.):11
D (profundidad del Interleaver):11
reatardo (msec):00
Super cuadros:5381253810
Errores super cuadro:1592
Palabras RS:00
Errores corregidos RS:00
Errores no corregidos RS:0N/A
Errores HEC:160
Errores OCD:10
Errores LCD:00
Celdas totales:132216420
Celdas datos:8590690
Errores de bit:00
ES Totales:370
SES Totales:250
UAS Totales:2450
🗨️ 9
BocaDePez
BocaDePez
🗨️ 7
Ari
🗨️ 6
BocaDePez
BocaDePez
🗨️ 5
Ari
🗨️ 4
BocaDePez
BocaDePez
🗨️ 3
BocaDePez
BocaDePez
🗨️ 2
Ari
🗨️ 1
BocaDePez
BocaDePez
BocaDePez
BocaDePez

haz la prueba con los P2P cerrados, comprueba con netstat las conexiones abiertas, y mira en el interior del PTR que no tenga modulo de diagnostico, un objeto rectangular y negro, y por supuesto todos los telefonos con microfiltro, el router no, cualquier terminal conectado a la linea (fax, alarma) con microfiltro

🗨️ 11
BocaDePez
BocaDePez

Hola de nuevo, pues no utilizo nada de P2P, hice lo del netstat y aquí van los resultados, tambien decir, que abrí el PTR y dentro tiene eso que dices, un objeto rectangular negro, y esta puesto en la posicion de abajo, vamos creo yo que puede subirse y bajarse, si es así, esta abajo XD. El tema de los microfiltros esta al día, unicamente uso un telefono.

Conexiones activas

Proto Dirección local Dirección remota Estado

TCP 14d44891f3434a7:5152 localhost:1188 CLOSE_WAIT

TCP 14d44891f3434a7:1194 by1msg4093107.phx.gbl:1863 ESTABLISHED

TCP 14d44891f3434a7:1521 69.57.184.211:http TIME_WAIT

TCP 14d44891f3434a7:1570 65.55.21.250:http ESTABLISHED

TCP 14d44891f3434a7:1571 207.46.16.252:http ESTABLISHED

TCP 14d44891f3434a7:1572 80.67.86.22:http ESTABLISHED

TCP 14d44891f3434a7:1573 80.67.86.22:http ESTABLISHED

TCP 14d44891f3434a7:1574 207.46.16.252:http ESTABLISHED

TCP 14d44891f3434a7:1575 80.67.86.22:http ESTABLISHED

TCP 14d44891f3434a7:1576 80.67.86.38:http ESTABLISHED

TCP 14d44891f3434a7:1578 80.67.86.22:http ESTABLISHED

TCP 14d44891f3434a7:1579 80.67.86.22:http ESTABLISHED

TCP 14d44891f3434a7:1580 80.67.86.24:http ESTABLISHED

TCP 14d44891f3434a7:1581 80.67.86.22:http ESTABLISHED

TCP 14d44891f3434a7:1582 80.67.86.22:http ESTABLISHED

TCP 14d44891f3434a7:1590 80.67.86.54:http ESTABLISHED

TCP 14d44891f3434a7:1593 ew-in-f164.google.com:http CLOSE_WAIT

TCP 14d44891f3434a7:1594 ew-in-f156.google.com:http CLOSE_WAIT

TCP 14d44891f3434a7:1595 ew-in-f127.google.com:http CLOSE_WAIT

TCP 14d44891f3434a7:1596 www.estadisticasgratis.com:http CLOSE_WAIT

TCP 14d44891f3434a7:1597 www.estadisticasgratis.com:http CLOSE_WAIT

TCP 14d44891f3434a7:1598 www.estadisticasgratis.com:http CLOSE_WAIT

TCP 14d44891f3434a7:1599 www.estadisticasgratis.com:http CLOSE_WAIT

TCP 14d44891f3434a7:1600 www.estadisticasgratis.com:http CLOSE_WAIT

TCP 14d44891f3434a7:1601 www.estadisticasgratis.com:http CLOSE_WAIT

TCP 14d44891f3434a7:1602 80.67.86.6:http ESTABLISHED

TCP 14d44891f3434a7:1604 80.67.86.33:http ESTABLISHED

TCP 14d44891f3434a7:1612 ey-in-f104.google.com:http ESTABLISHED

Muchas gracias de nuevo!!

🗨️ 10
BocaDePez
BocaDePez

en la cosita esa que parece una palanquita rectangular negra debajo pone SW1 no se si valdrá de algo.

🗨️ 9
jmagustin
Ari
🗨️ 7
BocaDePez
BocaDePez
🗨️ 6
Ari
🗨️ 5
BocaDePez
BocaDePez
🗨️ 4
Ari
🗨️ 3
Tot
🗨️ 2
BocaDePez
BocaDePez
🗨️ 1
BocaDePez
BocaDePez