Oh sorry I forgot to mention my router I'm using AC66U. This doesn't happen often it's usually at night but then again it could be my crappy TalkTalk Fibre
Sent from my iPhone
RT-AC66U driver in 374.41 is the same as in 374.39.
Oh sorry I forgot to mention my router I'm using AC66U. This doesn't happen often it's usually at night but then again it could be my crappy TalkTalk Fibre
Sent from my iPhone
ip6tables -t mangle -L -v
I just uploaded a Beta 2 build. Main change is a fix for the Comcast IPv6 filtering rule that wasn't properly applied. Please give this new build a shot if you are on Comcast with an IPv6, and were previously experiencing table overflows.
Also post the output of the firewall packet count after a while, so we can see how many packets got filtered by the rule:
Code:ip6tables -t mangle -L -v
Took a few reboots to pull an ipv6 address but I finally got one, never had this happen before. I'll keep an eye out for neighbor table overflow errors.
Chain PREROUTING (policy ACCEPT 5267 packets, 655K bytes)
pkts bytes target prot opt in out source destination
704 50688 DROP ipv6-icmp eth0 any anywhere ff02::1:ff00:0/104 ipv6-icmp neighbour-solicitation
Chain INPUT (policy ACCEPT 864 packets, 96989 bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 2890 packets, 284K bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 452 packets, 47445 bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 3529 packets, 348K bytes)
pkts bytes target prot opt in out source destination
Just tried bata 2 here and i can not get a v6 address. Factory reset and many reboots no go. @ Merlin this build is broke for V6 here. Back to 5047
24 minutes, no neighbor messages.
Code:Chain PREROUTING (policy ACCEPT 5267 packets, 655K bytes) pkts bytes target prot opt in out source destination 704 50688 DROP ipv6-icmp eth0 any anywhere ff02::1:ff00:0/104 ipv6-icmp neighbour-solicitation Chain INPUT (policy ACCEPT 864 packets, 96989 bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 2890 packets, 284K bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 452 packets, 47445 bytes) pkts bytes target prot opt in out source destination Chain POSTROUTING (policy ACCEPT 3529 packets, 348K bytes) pkts bytes target prot opt in out source destination
It's still working the same on my RT-N66U. Messages go to both /tmp/var/log/nmbd.log and syslog.
Nope
ASUS changed the connection script, /rom/etc/ppp/3g/Generic_conn.scr,
Both scripts within this pastebin, (beta1 row 131)
http://paste.ubuntu.com/7256272/
I have no idea how become root with this read-only file system for testing....
merlin@mint-dev ~/fmk/trunk/374-5517-ac66/rootfs $ ls rom/etc/ppp/3g/Generic_conn.scr -l
-rwxr-xr-x 1 root root 5763 Apr 13 21:18 rom/etc/ppp/3g/Generic_conn.scr
merlin@mint-dev ~/fmk/trunk/374-5517-ac66/rootfs $ ls ../../374-5047-ac68/rootfs/rom/etc/ppp/3g/Generic_conn.scr -l
-rwxr-xr-x 1 root root 5252 Apr 2 07:49 ../../374-5047-ac68/rootfs/rom/etc/ppp/3g/Generic_conn.scr
merlin@mint-dev ~/fmk/trunk/374-5517-ac66/rootfs $ ls ../../374-4887-ac68/rootfs/rom/etc/ppp/3g/Generic_conn.scr -l
-rwxr-xr-x 1 root root 2555 Mar 25 06:09 ../../374-4887-ac68/rootfs/rom/etc/ppp/3g/Generic_conn.scr
Asus seems to still be fiddling with that script.
[...]
I could try switching to the newer script found in their recent 5517 release to see if it helps.
Jan 1 01:00:31 WAN Connection: Ethernet link down.
Jan 1 01:00:32 pppd[909]: Connect script failed
...
Jan 1 01:01:37 pppd[1225]: In file /tmp/ppp/peers/3g: unrecognized option '/dev/'
Jan 1 01:01:37 WAN Connection: Fail to connect with some issues.
/dev/ttyACM0
linkname wan0
modem
crtscts
noauth
noipdefault
usepeerdns
defaultroute
nopcomp
noaccomp
novj
nobsdcomp
nodeflate
persist
holdoff 10
connect "/bin/comgt -d /dev/ttyACM0 -s /etc/ppp/3g/Generic_conn.scr"
disconnect "/bin/comgt -d /dev/ttyACM0 -s /etc/ppp/3g/Generic_disconn.scr"
Jan 1 01:00:23 WAN Connection: Ethernet link down.
Jan 1 01:00:25 pppd[824]: Serial connection established.
Jan 1 01:00:25 pppd[824]: Using interface ppp0
Jan 1 01:00:25 pppd[824]: Connect: ppp0 <--> /dev/ttyACM0
Jan 1 01:00:28 pppd[824]: local IP address 77.xxx.xxx.82
Jan 1 01:00:28 pppd[824]: remote IP address 10.0.0.1
Jan 1 01:00:28 pppd[824]: primary DNS address 213.xx.xx.16
Jan 1 01:00:28 pppd[824]: secondary DNS address 213.xx.xx.17
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!