Buonasera a tutti,
apro questa discussione perchè dopo ormai 3 mesi e circa 15 segnalazioni aperte e chiuse come "RISOLTE", prima di procedere alla disdetta del contratto vorrei avere un parere su cosa potrebbe essere che mi crea problemi alla rete.
Ho una Fibra FTTH 1000 con modem fibra TIM e ONT esterno huawei.
Sono alcuni mesi che riscontravo strane perdite di connessione, con azzeramento sia del download che uplod (Dumeter sulla taskbar che segnava entrambi i valori a zero) per poi ripartire dopo pochi istanti.
Stato attuale:
- velocità di connessione buona (raggiungo con sppedtest o fast.com anche i 980Mbps, con una media di 850).
- Modem Fibra aggiornato all'ultima versione (frutto della decima segnalazione aperta)
- Tutti i led sempre verdi, sia su TimHUB che su ONT esterno.
- PC windows collegato con cavo CAT6 da 50 centimetri
Nell'ultimo mese le cadute di segnale sono diventate continue, online per non più di 2 minuti e ciclicamente perdita di connessione... tanto da rendere impossibile la navigazione. Dopo ogni segnalazione ha funzionato per qualche ora. Dall'ultima segnalazione del 12 novembre ha funzionato per 2 giorni almeno, da stasera ha ripreso a disconnettersi.
Vi posto allego l'ultimo log dell'ultima mezz'ora, nel quale ci sono state le due disconnessioni, magari riuscite a darmi qualche indicazione in più per la prossima apertura di segnalazione.
Inutile dire che con 10 tecnici con i quali mi sono confrontanto, 10 versioni diverse mi sono state presentate... totalità delle quali cercavano di far ricadere la colpa sui miei sistemi (ho anche acquistato una nuova scheda ethernet per fugare ogni dubbio).
ditemi se serve altro
Sun Nov 14 21:17:18 2021 daemon.warn nginx: 2021/11/14 21:17:18 [warn] 2716#0: *107938 [lua] session.lua:344: new(): new session for default user, client: 192.168.1.10, server: localhost, request: "GET / HTTP/1.1", host: "192.168.1.1"
Sun Nov 14 21:17:18 2021 daemon.err nginx: 2021/11/14 21:17:18 [error] 2716#0: *107938 [lua] sessionmgr.lua:262: redirectIfNotAuthorized(): Unauthorized request, client: 192.168.1.10, server: localhost, request: "GET / HTTP/1.1", host: "192.168.1.1"
Sun Nov 14 21:17:18 2021 daemon.err nginx: 2021/11/14 21:17:18 [error] 2716#0: *107938 [lua] sessionmgr.lua:262: redirectIfNotAuthorized(): Unauthorized request, client: 192.168.1.10, server: localhost, request: "GET /gateway.lp?action=scheduleReboot HTTP/1.1", host: "192.168.1.1", referrer: "http://192.168.1.1/"
Sun Nov 14 21:17:21 2021 daemon.err nginx: 2021/11/14 21:17:21 [error] 2716#0: *107940 [lua] sessionmgr.lua:262: redirectIfNotAuthorized(): Unauthorized request, client: 192.168.1.10, server: localhost, request: "GET / HTTP/1.1", host: "192.168.1.1", referrer: "http://192.168.1.1/"
Sun Nov 14 21:17:22 2021 daemon.err nginx: 2021/11/14 21:17:21 [error] 2716#0: *107940 [lua] sessionmgr.lua:262: redirectIfNotAuthorized(): Unauthorized request, client: 192.168.1.10, server: localhost, request: "GET /gateway.lp?action=scheduleReboot HTTP/1.1", host: "192.168.1.1", referrer: "http://192.168.1.1/"
Sun Nov 14 21:17:25 2021 daemon.warn nginx: 2021/11/14 21:17:25 [warn] 2716#0: *107940 [lua] session.lua:103: changeUser(): changing user to admin, client: 192.168.1.10, server: localhost, request: "POST /authenticate HTTP/1.1", host: "192.168.1.1", referrer: "http://192.168.1.1/"
Sun Nov 14 21:18:39 2021 daemon.notice igmpproxy[4712]: Send IGMP packet to group 224.0.0.1 on intf br-lan
Sun Nov 14 21:18:39 2021 daemon.notice igmpproxy[4712]: IGMP report received from 192.168.1.10 on intf br-lan
Sun Nov 14 21:18:39 2021 daemon.notice igmpproxy[4712]: Updating IGMPv2 timer (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:18:39 2021 daemon.notice igmpproxy[4712]: IS_EX report (group: 239.255.255.250, srcs: 0) received on intf br-lan
Sun Nov 14 21:18:39 2021 daemon.notice igmpproxy[4712]: Setting timer to GMI (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:18:45 2021 daemon.notice igmpproxy[4712]: IGMP report received from 192.168.1.220 on intf br-lan
Sun Nov 14 21:18:45 2021 daemon.notice igmpproxy[4712]: Updating IGMPv2 timer (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:18:45 2021 daemon.notice igmpproxy[4712]: IS_EX report (group: 239.255.255.250, srcs: 0) received on intf br-lan
Sun Nov 14 21:18:45 2021 daemon.notice igmpproxy[4712]: Setting timer to GMI (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:18:47 2021 daemon.notice igmpproxy[4712]: IGMP report received from 192.168.1.127 on intf br-lan
Sun Nov 14 21:18:47 2021 daemon.notice igmpproxy[4712]: Updating IGMPv2 timer (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:18:47 2021 daemon.notice igmpproxy[4712]: IS_EX report (group: 239.255.255.250, srcs: 0) received on intf br-lan
Sun Nov 14 21:18:47 2021 daemon.notice igmpproxy[4712]: Setting timer to GMI (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:18:59 2021 daemon.info odhcpd[3447]: Using a RA lifetime of 0 seconds on wl1_1
Sun Nov 14 21:18:59 2021 daemon.notice odhcpd[3447]: Failed to send to ff02::1%wl1_1 (Permission denied)
Sun Nov 14 21:19:04 2021 daemon.info cwmpd[4297]: PROT_TRACE: Events are waiting, need to contact ACS
Sun Nov 14 21:19:04 2021 daemon.info cwmpd[4297]: CONNECTION: Connecting to server
Sun Nov 14 21:19:04 2021 daemon.info cwmpd[4297]: UBUS_CLIENT: external IP address is 79.33.141.122
Sun Nov 14 21:19:04 2021 daemon.info cwmpd[4297]: CONNECTION: Connected to server, starting transaction.
Sun Nov 14 21:19:04 2021 daemon.info cwmpd[4297]: UBUS_CLIENT: external IP address is 79.33.141.122
Sun Nov 14 21:19:04 2021 daemon.info cwmpd[4297]: PROT_TRACE: ConnectionRequestURL updated to http://79.33.141.122:7170/ConnectionRequest
Sun Nov 14 21:19:04 2021 daemon.info cwmpd[4297]: PROT_TRACE: ConnectionRequestURL updated to http://79.33.141.122:7170/ConnectionRequest
Sun Nov 14 21:19:06 2021 daemon.info cwmpd[4297]: PROT_TRACE: > Inform (2 PERIODIC)
Sun Nov 14 21:19:06 2021 daemon.info cwmpd[4297]: PROT_TRACE: < InformResponse
Sun Nov 14 21:19:06 2021 daemon.info cwmpd[4297]: PROT_TRACE: > Empty Post
Sun Nov 14 21:19:06 2021 daemon.info cwmpd[4297]: PROT_TRACE: < GetParameterValues Request
Sun Nov 14 21:19:08 2021 daemon.info cwmpd[4297]: PROT_TRACE: > GetParameterValues Response
Sun Nov 14 21:19:09 2021 daemon.info cwmpd[4297]: PROT_TRACE: < GetParameterValues Request
Sun Nov 14 21:19:09 2021 daemon.info cwmpd[4297]: PROT_TRACE: > GetParameterValues Response
Sun Nov 14 21:19:09 2021 daemon.info cwmpd[4297]: PROT_TRACE: < GetParameterNames Request
Sun Nov 14 21:19:09 2021 daemon.info cwmpd[4297]: PROT_TRACE: > GetParameterNames Response
Sun Nov 14 21:19:09 2021 daemon.info cwmpd[4297]: PROT_TRACE: < GetParameterValues Request
Sun Nov 14 21:19:09 2021 daemon.info cwmpd[4297]: PROT_TRACE: > GetParameterValues Response
Sun Nov 14 21:19:09 2021 daemon.info cwmpd[4297]: PROT_TRACE: < GetParameterNames Request
Sun Nov 14 21:19:09 2021 daemon.info cwmpd[4297]: PROT_TRACE: > GetParameterNames Response
Sun Nov 14 21:19:09 2021 daemon.info cwmpd[4297]: PROT_TRACE: < GetParameterNames Request
Sun Nov 14 21:19:09 2021 daemon.info cwmpd[4297]: PROT_TRACE: > GetParameterNames Response
Sun Nov 14 21:19:09 2021 daemon.info cwmpd[4297]: PROT_TRACE: < GetParameterValues Request
Sun Nov 14 21:19:10 2021 daemon.info cwmpd[4297]: PROT_TRACE: > GetParameterValues Response
Sun Nov 14 21:19:10 2021 daemon.info cwmpd[4297]: PROT_TRACE: < GetParameterNames Request
Sun Nov 14 21:19:10 2021 daemon.info cwmpd[4297]: PROT_TRACE: > GetParameterNames Response
Sun Nov 14 21:19:10 2021 daemon.info cwmpd[4297]: PROT_TRACE: < GetParameterValues Request
Sun Nov 14 21:19:11 2021 daemon.notice wansensing: (L3UpSense) runs L3UpMain.check(ETH,timeout)
Sun Nov 14 21:19:11 2021 daemon.notice wansensing: WAN Sensing L3 Up Checking
Sun Nov 14 21:19:11 2021 daemon.notice wansensing: FRS L3UpMain -- One WAN Interface is up, do nothing
Sun Nov 14 21:19:11 2021 daemon.info cwmpd[4297]: PROT_TRACE: > GetParameterValues Response
Sun Nov 14 21:19:11 2021 daemon.info cwmpd[4297]: PROT_TRACE: < Empty Response
Sun Nov 14 21:19:11 2021 daemon.info cwmpd[4297]: PROT_TRACE: Transaction succeeded, closing connection.
Sun Nov 14 21:19:11 2021 daemon.info cwmpd[4297]: PROT_TRACE: LAST STATE: <Idle>
Sun Nov 14 21:20:44 2021 daemon.notice igmpproxy[4712]: Send IGMP packet to group 224.0.0.1 on intf br-lan
Sun Nov 14 21:20:44 2021 daemon.notice igmpproxy[4712]: IGMP report received from 192.168.1.220 on intf br-lan
Sun Nov 14 21:20:44 2021 daemon.notice igmpproxy[4712]: Updating IGMPv2 timer (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:20:44 2021 daemon.notice igmpproxy[4712]: IS_EX report (group: 239.255.255.250, srcs: 0) received on intf br-lan
Sun Nov 14 21:20:44 2021 daemon.notice igmpproxy[4712]: Setting timer to GMI (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:20:49 2021 daemon.notice igmpproxy[4712]: IGMP report received from 192.168.1.10 on intf br-lan
Sun Nov 14 21:20:49 2021 daemon.notice igmpproxy[4712]: Updating IGMPv2 timer (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:20:49 2021 daemon.notice igmpproxy[4712]: IS_EX report (group: 239.255.255.250, srcs: 0) received on intf br-lan
Sun Nov 14 21:20:49 2021 daemon.notice igmpproxy[4712]: Setting timer to GMI (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:20:52 2021 daemon.notice igmpproxy[4712]: IGMP report received from 192.168.1.127 on intf br-lan
Sun Nov 14 21:20:52 2021 daemon.notice igmpproxy[4712]: Updating IGMPv2 timer (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:20:52 2021 daemon.notice igmpproxy[4712]: IS_EX report (group: 239.255.255.250, srcs: 0) received on intf br-lan
Sun Nov 14 21:20:52 2021 daemon.notice igmpproxy[4712]: Setting timer to GMI (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:22:32 2021 daemon.info odhcpd[3447]: Using a RA lifetime of 0 seconds on wl1_1
Sun Nov 14 21:22:32 2021 daemon.notice odhcpd[3447]: Failed to send to ff02::1%wl1_1 (Permission denied)
Sun Nov 14 21:22:49 2021 daemon.notice igmpproxy[4712]: Send IGMP packet to group 224.0.0.1 on intf br-lan
Sun Nov 14 21:22:56 2021 daemon.notice igmpproxy[4712]: IGMP report received from 192.168.1.127 on intf br-lan
Sun Nov 14 21:22:56 2021 daemon.notice igmpproxy[4712]: Updating IGMPv2 timer (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:22:56 2021 daemon.notice igmpproxy[4712]: IS_EX report (group: 239.255.255.250, srcs: 0) received on intf br-lan
Sun Nov 14 21:22:56 2021 daemon.notice igmpproxy[4712]: Setting timer to GMI (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:22:56 2021 daemon.notice igmpproxy[4712]: IGMP report received from 192.168.1.10 on intf br-lan
Sun Nov 14 21:22:56 2021 daemon.notice igmpproxy[4712]: Updating IGMPv2 timer (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:22:56 2021 daemon.notice igmpproxy[4712]: IS_EX report (group: 239.255.255.250, srcs: 0) received on intf br-lan
Sun Nov 14 21:22:56 2021 daemon.notice igmpproxy[4712]: Setting timer to GMI (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:22:57 2021 daemon.info odhcpd[3447]: Using a RA lifetime of 0 seconds on wl0_1
Sun Nov 14 21:22:57 2021 daemon.notice odhcpd[3447]: Failed to send to ff02::1%wl0_1 (Permission denied)
Sun Nov 14 21:22:58 2021 daemon.notice igmpproxy[4712]: IGMP report received from 192.168.1.220 on intf br-lan
Sun Nov 14 21:22:58 2021 daemon.notice igmpproxy[4712]: Updating IGMPv2 timer (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:22:58 2021 daemon.notice igmpproxy[4712]: IS_EX report (group: 239.255.255.250, srcs: 0) received on intf br-lan
Sun Nov 14 21:22:58 2021 daemon.notice igmpproxy[4712]: Setting timer to GMI (260 sec) for group 239.255.255.250 on intf br-lan
Sun Nov 14 21:23:45 2021 daemon.debug mmpbxfwctl[5621]: received cmd:iptables -t filter -C MMPBX --src 85.38.239.101 -p udp --dport 5060 -m comment --comment Allow_SIP -j ACCEPT
Sun Nov 14 21:23:45 2021 user.info mmpbxd[3751]: SIP Registration: SIP: : Register Success
Sun Nov 14 21:24:11 2021 daemon.notice wansensing: (L3UpSense) runs L3UpMain.check(ETH,timeout)
Sun Nov 14 21:24:11 2021 daemon.notice wansensing: WAN Sensing L3 Up Checking
Sun Nov 14 21:24:11 2021 daemon.notice wansensing: FRS L3UpMain -- One WAN Interface is up, do nothing
Sun Nov 14 21:24:16 2021 daemon.info odhcpd[3447]: Using a RA lifetime of 0 seconds on br-lan
Sun Nov 14 21:24:16 2021 daemon.notice odhcpd[3447]: Failed to send to ff02::1%br-lan (Permission denied)