Hallo,
ich verzweifle gerade am POE Passthrough bei zweien CPE210. Ich hab mir dieses kleine Shellscript in die /etc/rc.local [1] geschrieben (wird ja über GPIO20 aktiviert) und das VOR exit0. Nach dem Reboot geht der zweite CPE210 kurz an und sobald am ersten CPE, auf dem das script läuft, die LED LAN0 anfängt zu blinken, so geht die zweite CPE aus. Somit ist die nur eine Sekunde oder so an. Wenn ich nun die zeilen normal über die command line ausführe, dann bleibt das zweite Gerät auch an. Ich hab auch schon das script in eine eigene Datei ausgelagert (unter /etc) und ausführbar gemacht und dann in die rc.local geschrieben - genau das gleiche Ergebnis.
Wenn ich die Zeilen/das Script unter /erc normal per cmd ausführe, dann kommt noch ein Error, dass die „ressource busy“ ist.
Die UCI Einstellung von gluon 2016.1 ist irgendwie nicht vorhanden.
Vielleicht kann mir da ja jemand helfen.
Grüße
Marcel[1] https://forum.freifunk.net/t/tp-link-cpe210-510/594/151
Outlook für iOS beziehen
Hallo,
seit einigen Tagen habe ich mit Freifunk Probleme. Meine Router
verbinden sich wohl mit dem Netzwerk. Ich kann aber über meine Router
fast keine Internetseite mehr aufrufen. Nur Freifunkseiten und Google.
Woran kann dies liegen? Ich habe meine Router resetet und noch mal
konfiguriert, aber es ändert sich nichts.
Meine Router:
ffnw-bakum-loherstr-router1
Status online, letzte Nachricht vor einer Minute (26.06.2017, 13:09:58)
Koordinaten 52°?44,551'?N 008°?11,747'?E
Kontakt freifunk(a)rosenbaum-bakum.de
Hardware TP-Link TL-WR941N/ND v6
Primäre MAC f4:f2:6d:6e:82:d6
Node ID f4f26d6e82d6
Firmware 20170530 / gluon-v2016.2.5-6-g97f44c20
Site Freifunk Nordwest
ffnw-bakum-loherstr-router2
Status online, letzte Nachricht vor 2 Minuten (26.06.2017, 13:15:58)
Koordinaten 52°?44,554'?N 008°?11,762'?E
Kontakt freifunk(a)rosenbaum-bakum.de
Hardware TP-Link TL-WR841N/ND v10
Primäre MAC 60:e3:27:be:62:12
Node ID 60e327be6212
Firmware 20170530 / gluon-v2016.2.5-6-g97f44c20
Freundlichen Gruß,
Georg
Moin,
seit dem letzten Update habe ich inButjadingen (Burhave Deichgraf) mit
mehreren Routern und 2 CPE210 das diese auf der Map rot/blau blinken und
klickt man den Router an kommt das
Butjadingen-Deichgraf-C3
Status online, letzte Nachricht vor 12 Minuten (23.06.2017, 14:39:40)
Koordinaten 53°?34,408'?N 008°?21,762'?E
Kontakt ve17c(a)web.de
Hardware TP-Link TL-WDR3600 v1
Primäre MAC 10:fe:ed:40:7c:c6
Node ID 10feed407cc6
Firmware 20170530 / gluon-v2016.2.5-6-g97f44c20
Site Freifunk Nordwest
Teil des Netzes 6 Monate
IP Adressen 2a03:2260:1001:b000:12fe:edff:fe40:7cc6
<http://[2a03:2260:1001:b000:12fe:edff:fe40:7cc6]/>
fd74:fdaa:9dc4:0:12fe:edff:fe40:7cc6
<http://[fd74:fdaa:9dc4:0:12fe:edff:fe40:7cc6]/>
fd74:fdaa:9dc4:b000:12fe:edff:fe40:7cc6
<http://[fd74:fdaa:9dc4:b000:12fe:edff:fe40:7cc6]/>
fe80::12fe:edff:fe40:7cc6
Autom. Updates aktiviert (stable)
Clients keine (10 in der lokalen Wolke)
Client-Statistik
wobei bei allen Routern der Gateway fehlt, bei den CPE210 fehlte zusätzlich
auch die IP6-Adresse, mittlerweile fehlen jetzt zwei Router und zwei
CPE210 komplett, habe den Fehler begangen einen funktionierenden Router mal
zu rebooten,jetzt fehlt dem auch das Gateway und per Terminal komme ich an
diese Geräte nicht mehr dran, biite um eine schnelle Lösungj da bei uns
etzt die Turis einfliegen und die möchten ein funktionierendes WLAN
benutzen.
Gruß Gert
Butjadingen
Hallo zusammen,
ich brauche noch mal Eure Hilfe.
Ich habe hier im Ort auf dem Dachboden eines Hauses (Unterkunft für
Geflüchtete) einen Offloader und zwei Router (ffnw-muehlen-offloader-01,
ffnw-muehlen-04 und ffnw-muehlen-05).
Alle drei Geräte sind per Kabel an einer Fritzbox angeschlossen - haben
also alle eine ipv4 Adresse. Der offloader macht das VPN ins FF Netz.
Das ganze läuft über einen 16000er Anschluss von EWE.
Das ganze hat bis vor ein paar Tagen mehr oder weniger problemlos
funktioniert. Seit dem kommen verstärkt Meldungen: "Das Internet ist tot"
Wenn ich mit Grafana
(https://grafana.ffnw.de/dashboard/db/single-node-hopglass?var-hostname=ffnw…)
nachsehe, dann sieht alles so aus wie immer.
Ich komme von zu Hause auch von meinem FF Router per ssh auf die Router
auf dem Dachboden. Ich habe einen 50000er Anschluss von EWE.
Ich habe jetzt auf dem einen Router mal den hoodselector ausgeführt:
root@ffnw-muehlen-04:~# hoodselector
No VPN connection found
Batman gateways found
gw source is wan
gluon-neighbour-info -i br-wan -p 1001 -d ff02::2 -r hoodselector -t 0.5
No VPN routers over mesh on lan or wan
Interface mesh_lan enabled.
Testing neighboring adhoc networks for batman advanced gw connection.
The following wireless networks have been found:
42 2437 02:ca:ff:ee:ba:bf ffnw-mesh_
42 2437 02:ca:ff:ee:ba:bf ffnw-mesh_
43 2437 02:ca:ff:ee:ba:bf mesh.ffnw
After filtering we will test the following wireless networks:
42 2437 02:ca:ff:ee:ba:bf ffnw-mesh_
43 2437 02:ca:ff:ee:ba:bf mesh.ffnw
Prepare configuration for testing wireless networks...
VPN stopped.
Testing MESH 02:ca:ff:ee:ba:bf...
VPN started.
Interface br-client restarted.
Wireless restarted.
Finished testing wireless networks, restored previous configuration
Neighoring freifunk batman advanced mesh with BSSID 02:ca:ff:ee:ba:bf found
Set hood "default"
Hood set by scan mode
Interface mesh_lan enabled.
root@ffnw-muehlen-04:~#
Was bedeutet das? Warum die default Hood?
Hier noch ein logread vom offloader. Der ist ja offensichtlich in der
VEC Hood.
root@ffnw-muehlen-offloader01:~# logread
Thu Jun 22 10:20:02 2017 daemon.info fastd[3060]: adding peer
<mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 10:20:02 2017 daemon.info fastd[3060]: resolving host
`lk-vec01.sn.ffnw.de' for peer <mesh_vpn_backbone_peer_lk_vec01_10002>...
Thu Jun 22 10:20:02 2017 daemon.notice netifd: Bridge 'br-client' link
is down
Thu Jun 22 10:20:02 2017 daemon.notice netifd: Interface 'client' has
link connectivity loss
Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.103824] br-client:
port 1(bat0) entered disabled state
Thu Jun 22 10:20:02 2017 daemon.info fastd[3060]: resolved host
`lk-vec01.sn.ffnw.de' successfully
Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.206996] br-client:
port 1(bat0) entered forwarding state
Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.224031] br-client:
port 1(bat0) entered forwarding state
Thu Jun 22 10:20:02 2017 daemon.notice netifd: Bridge 'br-client' link is up
Thu Jun 22 10:20:02 2017 daemon.notice netifd: Interface 'client' has
link connectivity
Thu Jun 22 10:20:02 2017 daemon.notice netifd: Interface 'client' is
setting up now
Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.255239] batman_adv:
bat0: Adding interface: mesh-vpn
Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.271275] batman_adv:
bat0: The MTU of interface mesh-vpn is too small (1312) to handle the
transport of batman-adv packets. Packets going over this interface will
be fragmented on layer2 which could impact the performance. Setting the
MTU to 1532 would solve the problem.
Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.343991] batman_adv:
bat0: Interface activated: mesh-vpn
Thu Jun 22 10:20:02 2017 kern.info kernel: [ 170.384423] batman_adv:
bat0: no_rebroadcast: Changing from: disabled to: enabled
Thu Jun 22 10:20:02 2017 daemon.warn dnsmasq[2423]: no servers found in
/tmp/resolv.conf.auto, will retry
Thu Jun 22 10:20:02 2017 daemon.notice netifd: Interface 'mesh_vpn' is
now up
Thu Jun 22 10:20:02 2017 daemon.notice netifd: Interface 'client' is now
down
Thu Jun 22 10:20:02 2017 daemon.notice netifd: Interface 'client' is
setting up now
Thu Jun 22 10:20:04 2017 kern.info kernel: [ 172.220013] br-client:
port 1(bat0) entered forwarding state
Thu Jun 22 10:20:04 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[[2a01:4f8:161:5205::23]:10002]...
Thu Jun 22 10:20:13 2017 daemon.notice netifd: Interface 'client' is now up
Thu Jun 22 10:20:13 2017 user.notice firewall: Reloading firewall due to
ifup of client (br-client)
Thu Jun 22 10:20:25 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]...
Thu Jun 22 10:20:25 2017 daemon.info fastd[3060]: resolving host
`lk-vec01.sn.ffnw.de' for peer <mesh_vpn_backbone_peer_lk_vec01_10002>...
Thu Jun 22 10:20:25 2017 daemon.info fastd[3060]: resolved host
`lk-vec01.sn.ffnw.de' successfully
Thu Jun 22 10:20:25 2017 daemon.info fastd[3060]: received handshake
response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]
using fastd v18
Thu Jun 22 10:20:26 2017 daemon.info fastd[3060]: 5.9.56.23:10002
authorized as <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 10:20:26 2017 daemon.notice fastd[3060]: connection with
<mesh_vpn_backbone_peer_lk_vec01_10002> established.
Thu Jun 22 10:20:26 2017 daemon.info fastd[3060]: new session with
<mesh_vpn_backbone_peer_lk_vec01_10002> established using method
`salsa2012+umac'.
Thu Jun 22 10:20:29 2017 daemon.info dnsmasq[2423]: reading
/tmp/resolv.conf.auto
Thu Jun 22 10:20:29 2017 daemon.info dnsmasq[2423]: using local
addresses only for domain lan
Thu Jun 22 10:20:29 2017 daemon.info dnsmasq[2423]: using nameserver
2a03:b0c0:3:d0::bd6:b001#53
Thu Jun 22 10:20:29 2017 daemon.info dnsmasq[2423]: using nameserver
2001:67c:18e8:0:2::181#53
Thu Jun 22 10:20:30 2017 user.notice firewall: Reloading firewall due to
ifupdate of client (br-client)
Thu Jun 22 10:23:22 2017 kern.info kernel: [ 370.858520] br-client:
Multicast hash table chain limit reached: bat0
Thu Jun 22 10:23:22 2017 kern.warn kernel: [ 370.877971] br-client:
Cannot rehash multicast hash table, disabling snooping: bat0, 440, -22
Thu Jun 22 10:30:00 2017 user.notice root: netmon-node-client[3640]:
Netmon Node Client is disabled.
Thu Jun 22 10:40:00 2017 user.notice root: netmon-node-client[3988]:
Netmon Node Client is disabled.
Thu Jun 22 10:50:00 2017 user.notice root: netmon-node-client[4342]:
Netmon Node Client is disabled.
Thu Jun 22 11:00:00 2017 user.notice root: netmon-node-client[4690]:
Netmon Node Client is disabled.
Thu Jun 22 11:10:00 2017 user.notice root: netmon-node-client[5038]:
Netmon Node Client is disabled.
Thu Jun 22 11:10:51 2017 daemon.info fastd[3060]: refreshing session
with <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 11:10:51 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]...
Thu Jun 22 11:10:51 2017 daemon.info fastd[3060]: received handshake
response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]
using fastd v18
Thu Jun 22 11:10:51 2017 daemon.info fastd[3060]: 5.9.56.23:10002
authorized as <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 11:10:51 2017 daemon.info fastd[3060]: new session with
<mesh_vpn_backbone_peer_lk_vec01_10002> established using method
`salsa2012+umac'.
Thu Jun 22 11:20:00 2017 user.notice root: netmon-node-client[5393]:
Netmon Node Client is disabled.
Thu Jun 22 11:30:00 2017 user.notice root: netmon-node-client[5742]:
Netmon Node Client is disabled.
Thu Jun 22 11:40:00 2017 user.notice root: netmon-node-client[6092]:
Netmon Node Client is disabled.
Thu Jun 22 11:50:00 2017 user.notice root: netmon-node-client[6448]:
Netmon Node Client is disabled.
Thu Jun 22 12:00:00 2017 user.notice root: netmon-node-client[6801]:
Netmon Node Client is disabled.
Thu Jun 22 12:05:01 2017 daemon.info fastd[3060]: refreshing session
with <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 12:05:01 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]...
Thu Jun 22 12:05:02 2017 daemon.info fastd[3060]: received handshake
response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]
using fastd v18
Thu Jun 22 12:05:02 2017 daemon.info fastd[3060]: 5.9.56.23:10002
authorized as <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 12:05:02 2017 daemon.info fastd[3060]: new session with
<mesh_vpn_backbone_peer_lk_vec01_10002> established using method
`salsa2012+umac'.
Thu Jun 22 12:10:00 2017 user.notice root: netmon-node-client[7153]:
Netmon Node Client is disabled.
Thu Jun 22 12:20:00 2017 user.notice root: netmon-node-client[7497]:
Netmon Node Client is disabled.
Thu Jun 22 12:30:00 2017 user.notice root: netmon-node-client[7848]:
Netmon Node Client is disabled.
Thu Jun 22 12:40:00 2017 user.notice root: netmon-node-client[8202]:
Netmon Node Client is disabled.
Thu Jun 22 12:50:00 2017 user.notice root: netmon-node-client[8549]:
Netmon Node Client is disabled.
Thu Jun 22 12:59:25 2017 daemon.info fastd[3060]: refreshing session
with <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 12:59:25 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]...
Thu Jun 22 12:59:25 2017 daemon.info fastd[3060]: received handshake
response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]
using fastd v18
Thu Jun 22 12:59:25 2017 daemon.info fastd[3060]: 5.9.56.23:10002
authorized as <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 12:59:25 2017 daemon.info fastd[3060]: new session with
<mesh_vpn_backbone_peer_lk_vec01_10002> established using method
`salsa2012+umac'.
Thu Jun 22 13:00:00 2017 user.notice root: netmon-node-client[8898]:
Netmon Node Client is disabled.
Thu Jun 22 13:10:00 2017 user.notice root: netmon-node-client[9254]:
Netmon Node Client is disabled.
Thu Jun 22 13:20:00 2017 user.notice root: netmon-node-client[9617]:
Netmon Node Client is disabled.
Thu Jun 22 13:30:00 2017 user.notice root: netmon-node-client[9966]:
Netmon Node Client is disabled.
Thu Jun 22 13:40:00 2017 user.notice root: netmon-node-client[10314]:
Netmon Node Client is disabled.
Thu Jun 22 13:49:52 2017 daemon.info fastd[3060]: refreshing session
with <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 13:49:52 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]...
Thu Jun 22 13:49:52 2017 daemon.info fastd[3060]: received handshake
response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]
using fastd v18
Thu Jun 22 13:49:52 2017 daemon.info fastd[3060]: 5.9.56.23:10002
authorized as <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 13:49:52 2017 daemon.info fastd[3060]: new session with
<mesh_vpn_backbone_peer_lk_vec01_10002> established using method
`salsa2012+umac'.
Thu Jun 22 13:50:00 2017 user.notice root: netmon-node-client[10663]:
Netmon Node Client is disabled.
Thu Jun 22 14:00:01 2017 user.notice root: netmon-node-client[11008]:
Netmon Node Client is disabled.
Thu Jun 22 14:10:01 2017 user.notice root: netmon-node-client[11363]:
Netmon Node Client is disabled.
Thu Jun 22 14:20:00 2017 user.notice root: netmon-node-client[11712]:
Netmon Node Client is disabled.
Thu Jun 22 14:30:00 2017 user.notice root: netmon-node-client[12066]:
Netmon Node Client is disabled.
Thu Jun 22 14:40:01 2017 user.notice root: netmon-node-client[12417]:
Netmon Node Client is disabled.
Thu Jun 22 14:42:23 2017 daemon.info fastd[3060]: refreshing session
with <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 14:42:23 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]...
Thu Jun 22 14:42:23 2017 daemon.info fastd[3060]: received handshake
response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]
using fastd v18
Thu Jun 22 14:42:23 2017 daemon.info fastd[3060]: 5.9.56.23:10002
authorized as <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 14:42:23 2017 daemon.info fastd[3060]: new session with
<mesh_vpn_backbone_peer_lk_vec01_10002> established using method
`salsa2012+umac'.
Thu Jun 22 14:50:01 2017 user.notice root: netmon-node-client[12781]:
Netmon Node Client is disabled.
Thu Jun 22 15:00:01 2017 user.notice root: netmon-node-client[13137]:
Netmon Node Client is disabled.
Thu Jun 22 15:10:01 2017 user.notice root: netmon-node-client[13494]:
Netmon Node Client is disabled.
Thu Jun 22 15:20:01 2017 user.notice root: netmon-node-client[13851]:
Netmon Node Client is disabled.
Thu Jun 22 15:30:01 2017 user.notice root: netmon-node-client[14220]:
Netmon Node Client is disabled.
Thu Jun 22 15:32:57 2017 daemon.info fastd[3060]: refreshing session
with <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 15:32:57 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]...
Thu Jun 22 15:32:57 2017 daemon.info fastd[3060]: received handshake
response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]
using fastd v18
Thu Jun 22 15:32:57 2017 daemon.info fastd[3060]: 5.9.56.23:10002
authorized as <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 15:32:57 2017 daemon.info fastd[3060]: new session with
<mesh_vpn_backbone_peer_lk_vec01_10002> established using method
`salsa2012+umac'.
Thu Jun 22 15:40:01 2017 user.notice root: netmon-node-client[14582]:
Netmon Node Client is disabled.
Thu Jun 22 15:50:01 2017 user.notice root: netmon-node-client[14944]:
Netmon Node Client is disabled.
Thu Jun 22 16:00:01 2017 user.notice root: netmon-node-client[15306]:
Netmon Node Client is disabled.
Thu Jun 22 16:10:01 2017 user.notice root: netmon-node-client[15672]:
Netmon Node Client is disabled.
Thu Jun 22 16:20:01 2017 user.notice root: netmon-node-client[16033]:
Netmon Node Client is disabled.
Thu Jun 22 16:24:26 2017 daemon.info fastd[3060]: refreshing session
with <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 16:24:26 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]...
Thu Jun 22 16:24:26 2017 daemon.info fastd[3060]: received handshake
response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]
using fastd v18
Thu Jun 22 16:24:26 2017 daemon.info fastd[3060]: 5.9.56.23:10002
authorized as <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 16:24:26 2017 daemon.info fastd[3060]: new session with
<mesh_vpn_backbone_peer_lk_vec01_10002> established using method
`salsa2012+umac'.
Thu Jun 22 16:30:01 2017 user.notice root: netmon-node-client[16390]:
Netmon Node Client is disabled.
Thu Jun 22 16:40:01 2017 user.notice root: netmon-node-client[16750]:
Netmon Node Client is disabled.
Thu Jun 22 16:50:01 2017 user.notice root: netmon-node-client[17115]:
Netmon Node Client is disabled.
Thu Jun 22 17:00:01 2017 user.notice root: netmon-node-client[17475]:
Netmon Node Client is disabled.
Thu Jun 22 17:10:01 2017 user.notice root: netmon-node-client[17842]:
Netmon Node Client is disabled.
Thu Jun 22 17:15:39 2017 daemon.info fastd[3060]: refreshing session
with <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 17:15:39 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]...
Thu Jun 22 17:15:39 2017 daemon.info fastd[3060]: received handshake
response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]
using fastd v18
Thu Jun 22 17:15:39 2017 daemon.info fastd[3060]: 5.9.56.23:10002
authorized as <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 17:15:39 2017 daemon.info fastd[3060]: new session with
<mesh_vpn_backbone_peer_lk_vec01_10002> established using method
`salsa2012+umac'.
Thu Jun 22 17:20:01 2017 user.notice root: netmon-node-client[18202]:
Netmon Node Client is disabled.
Thu Jun 22 17:30:01 2017 user.notice root: netmon-node-client[18564]:
Netmon Node Client is disabled.
Thu Jun 22 17:40:01 2017 user.notice root: netmon-node-client[18925]:
Netmon Node Client is disabled.
Thu Jun 22 17:50:01 2017 user.notice root: netmon-node-client[19286]:
Netmon Node Client is disabled.
Thu Jun 22 18:00:01 2017 user.notice root: netmon-node-client[19649]:
Netmon Node Client is disabled.
Thu Jun 22 18:06:04 2017 daemon.info fastd[3060]: refreshing session
with <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 18:06:04 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]...
Thu Jun 22 18:06:04 2017 daemon.info fastd[3060]: received handshake
response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]
using fastd v18
Thu Jun 22 18:06:04 2017 daemon.info fastd[3060]: 5.9.56.23:10002
authorized as <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 18:06:04 2017 daemon.info fastd[3060]: new session with
<mesh_vpn_backbone_peer_lk_vec01_10002> established using method
`salsa2012+umac'.
Thu Jun 22 18:10:01 2017 user.notice root: netmon-node-client[20028]:
Netmon Node Client is disabled.
Thu Jun 22 18:20:01 2017 user.notice root: netmon-node-client[20378]:
Netmon Node Client is disabled.
Thu Jun 22 18:30:01 2017 user.notice root: netmon-node-client[20742]:
Netmon Node Client is disabled.
Thu Jun 22 18:40:01 2017 user.notice root: netmon-node-client[21104]:
Netmon Node Client is disabled.
Thu Jun 22 18:50:01 2017 user.notice root: netmon-node-client[21461]:
Netmon Node Client is disabled.
Thu Jun 22 19:00:01 2017 user.notice root: netmon-node-client[21815]:
Netmon Node Client is disabled.
Thu Jun 22 19:00:47 2017 daemon.info fastd[3060]: refreshing session
with <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 19:00:47 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]...
Thu Jun 22 19:00:47 2017 daemon.info fastd[3060]: received handshake
response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]
using fastd v18
Thu Jun 22 19:00:47 2017 daemon.info fastd[3060]: 5.9.56.23:10002
authorized as <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 19:00:47 2017 daemon.info fastd[3060]: new session with
<mesh_vpn_backbone_peer_lk_vec01_10002> established using method
`salsa2012+umac'.
Thu Jun 22 19:10:01 2017 user.notice root: netmon-node-client[22180]:
Netmon Node Client is disabled.
Thu Jun 22 19:20:01 2017 user.notice root: netmon-node-client[22550]:
Netmon Node Client is disabled.
Thu Jun 22 19:30:01 2017 user.notice root: netmon-node-client[22914]:
Netmon Node Client is disabled.
Thu Jun 22 19:40:01 2017 user.notice root: netmon-node-client[23270]:
Netmon Node Client is disabled.
Thu Jun 22 19:50:01 2017 user.notice root: netmon-node-client[23616]:
Netmon Node Client is disabled.
Thu Jun 22 19:53:22 2017 daemon.info fastd[3060]: refreshing session
with <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 19:53:22 2017 daemon.info fastd[3060]: sending handshake to
<mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]...
Thu Jun 22 19:53:22 2017 daemon.info fastd[3060]: received handshake
response from <mesh_vpn_backbone_peer_lk_vec01_10002>[5.9.56.23:10002]
using fastd v18
Thu Jun 22 19:53:22 2017 daemon.info fastd[3060]: 5.9.56.23:10002
authorized as <mesh_vpn_backbone_peer_lk_vec01_10002>
Thu Jun 22 19:53:22 2017 daemon.info fastd[3060]: new session with
<mesh_vpn_backbone_peer_lk_vec01_10002> established using method
`salsa2012+umac'.
Thu Jun 22 19:57:14 2017 authpriv.info dropbear[23884]: Child connection
from fd74:fdaa:9dc4:0:c66e:1fff:fe41:6727:41363
Thu Jun 22 19:57:20 2017 authpriv.notice dropbear[23884]: Password auth
succeeded for 'root' from fd74:fdaa:9dc4:0:c66e:1fff:fe41:6727:41363
Thu Jun 22 19:59:45 2017 authpriv.info dropbear[23884]: Exit (root):
Exited normally
Thu Jun 22 20:00:01 2017 user.notice root: netmon-node-client[23996]:
Netmon Node Client is disabled.
Thu Jun 22 20:05:16 2017 authpriv.info dropbear[24205]: Child connection
from fd74:fdaa:9dc4:0:c66e:1fff:fe41:6727:41368
Thu Jun 22 20:05:22 2017 authpriv.notice dropbear[24205]: Password auth
succeeded for 'root' from fd74:fdaa:9dc4:0:c66e:1fff:fe41:6727:41368
root@ffnw-muehlen-offloader01:~#
Wie kann ich von einem Router auf der Konsole am besten testen, wie gut
die Verbindung ins Internet ist? Kann ich sicher sein, das ich von der
Konsole per wget nicht über das lokale ipv4 Netz rausgehe, sondern über
das FF VPN.
Martin