On 28 Jan 2017, at 19:48, Gareth Phillips wrote:
Thanks Neil. Fortunately I still have access to this most recent
SonicWALL box remotely via the backup ADSL interface. I've attached a
.pcap trace file from the PPPoE WAN interface that connects to the OR
modem and I've also attached some PPPoE debug logs from the SonicWALL.
Please let me know if you have any trouble receiving them.
This happens with a whole range of different SonicWALL models, from
TZ100 / 200's to TZ105's and even the newest SOHO devices. Our LNS
that these sessions are hosted on is a Firebrick FB6202 Running FB6202
Nestor+ (V1.35.019 2015-02-11T17:21:55) firmware. The logs off of
that for this particular FTTC PPPoE session from this SonicWALL are as
follows. We have checked and double-checked our RADIUS servers and
the username / password combos are definitely correct, so there's no
issue there.
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
request lts001.hex NMCIHW eth 0/1/17:101@FTTC1264195
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
incoming NMCIHW eth 0/1/17:101@FTTC1264195
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Init Rx C021:LCP 01 01 000E ConfReq 01:MRU 04 1492 05:MAGIC 06
29:97:fe:3b [email protected]
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Last Rx C021:LCP 01 01 000E ConfReq 01:MRU 04 1492 05:MAGIC 06
29:97:fe:3b [email protected]
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Last Tx C021:LCP 01 01 000F ConfReq 03:AUTH 05 c2:23:05 05:MAGIC
06 0a:d4:9c:d4 [email protected]
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Auth name
6d:63:6d:66:6d:74:32:40:63:6f:6e:6e:65:63:74:2e:63:6c:65:61:72:73:74:72:65:61:6d:67:72:6f:75:70:2e:63:6f:2e:75:6b
[[email protected]]
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Auth chal 15 57:7d:f2:7f:ea:06:6c:ff:f8:a8:3c:7d:f9:6f:59:a6
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Auth response 8c:8c:b0:d3:76:4e:b4:5c:de:60:76:80:83:9c:78:cf
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
connect [email protected] 39956000/9999000bps mtu1492
28 Jan 2017 19:24:22 radius-rx T13092-51756-62.24.203.227 S17150-9461
PPP Tx C223:CHAP 03 15 0004 [email protected]
PPP Auth done.
The CPE log (unfortunately timestamps are not in synch) is a bit weird
with regards to the CHAP Success message.
28 Jan 2017 19:24:22 radius-rx T13092-51756-62.24.203.227 S17150-9461
PPP Tx C021:LCP 01 01 000E ConfReq 05:MAGIC 06 0a:d4:9c:d4 01:MRU 04
1472 [email protected]
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Rx FF03 8021:IPCP 01 01 0016 ConfReq 03:IP 06 0.0.0.0 81:DNS1 06
0.0.0.0 83:DNS2 06 0.0.0.0 [email protected]
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Tx 8021:IPCP 03 01 0016 ConfNak 03:IP 06 46.17.214.185 81:DNS1 06
185.23.52.131 83:DNS2 06 185.23.52.132 [email protected]
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Rx FF03 8057:IPV6CP 01 01 000E ConfReq 01:I/F 0A
c2:ea:e4:ff:fe:7a:16:e6 [email protected]
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Tx C021:LCP 08 01 0014 ProtoRej 8057 01 01 000E ConfReq 01:I/F 0A
c2:ea:e4:ff:fe:7a:16:e6 [email protected]
You reject IPV6CP. That’s fine. CPE stops on IPV6CP.
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Rx FF03 C021:LCP 01 02 000E ConfReq 01:MRU 04 1492 05:MAGIC 06
29:97:fe:3b [email protected]
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Tx C021:LCP 02 02 000E ConfAck 01:MRU 04 1492 05:MAGIC 06
29:97:fe:3b [email protected]
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Rx FF03 C021:LCP 02 01 000E ConfAck 05:MAGIC 06 0a:d4:9c:d4 01:MRU
04 1472 [email protected]
LCP seems done. Not seen any missing packets. CPE ACKs the last bit
from your early request, so CPE should be happy as well with LCP UP.
28 Jan 2017 19:24:22 l2tp-rx T13092-51756-62.24.203.227 S17150-9461
PPP Tx 8021:IPCP 01 00 000A ConfReq 03:IP 06 62.24.191.98
[email protected]
You tell CPE your IP address.
The pcap on the other end shows this being received way too often,
re-send once a second; this end doesn’t show this.
But the CPE never ACKs.
And the CPE also doesn’t send you a request for its local IP address
end.
Seems the state machine on the CPE side is stuck?
Also can you confirm that your LNS is actually re-sending the IPCP
packet <n> times every second?
28 Jan 2017 19:24:22 l2tp-rx T10838-3606-62.24.203.91 S24816-43992 PPP
Rx FF03 C021:LCP 08 B1 0040 ProtoRej AAAA 03 00 00 00 08 06 00 13 08
00 00 00 00 08 04 00 00 00 71 q 72 r 73 s 74 t FD 12 A5 AD BA 38 8 8E
BD FB 55 U 50 P 18 10 00 F8 E0 00 00 17 03 03 00 50 P D6 07 80 20 81
D2 6F o 57 W B8 CC 9C 2E . 0F
28 Jan 2017 19:24:22 l2tp-rx T10838-3606-62.24.203.91 S43511-28544 PPP
Rx FF03 C021:LCP 08 E9 001C ProtoRej AAAA 03 00 00 00 08 06 00 13 08
00 00 00 00 08 04 00 00 00 71 q 72 r 73 s 74 t
Whatever those are I am confused about; Someone cleverly prints the
ASCII parts along with the hex values it seems. If T/Sxxxx-xxxxx is
the tunnel/session ID from L2TP this is a different session anyway?
The CPE on the remote end at best logs Auth done (even though it is
seems grumpy about it), LCP up, but never logs anything about IPCP
(whatever they’d call it). Not sure if we see the same
“conversation” there though.
Did the CPEs get a software update lately?