Pppoe

Test to check PPPoE interface.

Test PAP Authentication

Description

Checks PPPoE interface with PAP authentication.

Scenario

Note

Configure PPPoE server with PAP authentication

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX19tDCxJyQZLfInubpzBjcgdhbF2NSqic2s=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
-------------------------------------------------------
 Name      IP Address     Admin  Oper  Vrf  Description
-------------------------------------------------------
pppoe0  192.168.100.2/32  up     up

Test CHAP Authentication

Description

Checks PPPoE interface with CHAP authentication.

Scenario

Note

Configure PPPoE server with CHAP authentication

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol chap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX19dGzQp2XhlBqUEPiDmcAazMxjUlT188Qc=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
-------------------------------------------------------
 Name      IP Address     Admin  Oper  Vrf  Description
-------------------------------------------------------
pppoe0  192.168.100.2/32  up     up

Test Local Address

Description

Checks PPPoE interface with a configured local IPv4 address.

Scenario

Note

Configure PPPoE server

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX19alQClWdSenQfGD4vJSWFDacYe3v1kdGI=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

set interfaces pppoe pppoe0 local-address 192.168.100.100

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

192.168.100.100
Show output
---------------------------------------------------------
 Name       IP Address      Admin  Oper  Vrf  Description
---------------------------------------------------------
pppoe0  192.168.100.100/32  up     up

Step 4: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
---------------------------------------------------------
 Name       IP Address      Admin  Oper  Vrf  Description
---------------------------------------------------------
pppoe0  192.168.100.100/32  up     up

Note

Connectivity verification is not performed as the interface lacks IPv4 addressing and the IPv6 address is only an identifier


Test Local Identifier

Description

Checks PPPoE interface with a configured local IPv6 identifier.

Scenario

Note

Configure PPPoE server

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18VivGvIHwP6HWYJeNBWycpn9J4JhSdK6M=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

set interfaces pppoe pppoe0 local-identifier '::100'

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

::100
Show output
-------------------------------------------------------
 Name      IP Address     Admin  Oper  Vrf  Description
-------------------------------------------------------
pppoe0  192.168.100.3/32  up     up
        fe80::100/128

Step 4: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
-------------------------------------------------------
 Name      IP Address     Admin  Oper  Vrf  Description
-------------------------------------------------------
pppoe0  192.168.100.3/32  up     up
        fe80::100/128

Test Ethernet VIF Interface

Description

Checks PPPoE interface with an Ethernet VIF interface as the base interface.

Scenario

Note

Configure PPPoE server with VLAN 100 support

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18hunhc9OrMAz60K5k2eQ/a7FnGKdQ9L6A=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vif 100
set interfaces pppoe pppoe0 base-interface ethernet eth0 vif 100

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
-------------------------------------------------------------------
 Name            IP Address           Admin  Oper  Vrf  Description
-------------------------------------------------------------------
pppoe0  192.168.100.2/32              up     up
        fe80::5bc:f44b:531d:dadc/128

Test Bridge Interface

Description

Checks PPPoE interface with a Bridge interface as the base interface.

Scenario

Note

Configure PPPoE server

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18LNHT7Ealj1OvWaUNfNplY7nimyYRH0+0=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

delete interfaces pppoe pppoe0 base-interface ethernet
set interfaces bridge br0
set interfaces ethernet eth1 bridge-group bridge br0
set interfaces pppoe pppoe0 base-interface bridge br0

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.3/32               up     up
        fe80::591b:7715:172c:7284/128

Test Bridge VIF Interface

Description

Checks PPPoE interface with a Bridge VIF interface as the base interface.

Scenario

Note

Configure PPPoE server with VLAN 100 support

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+UAAmzHWx7qNIJAmB6a3I0HJFaF/2uK1w=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

delete interfaces pppoe pppoe0 base-interface ethernet
set interfaces bridge br0 vif 100
set interfaces bridge br0 vlan 100
set interfaces ethernet eth1 bridge-group bridge br0
set interfaces ethernet eth1 bridge-group vlan 100
set interfaces pppoe pppoe0 base-interface bridge br0 vif 100

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.2/32               up     up
        fe80::500d:31bc:684f:dc14/128

Test Access Concentrator

Description

Checks PPPoE interface with an access concentrator. An access concentrator is a device that aggregates PPPoE sessions from multiple clients.

Scenario

Note

Configure PPPoE server with an access concentrator.

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX19PE7z1a4Gp/MhkX0BY6grg9n8L3LmOaik=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

set interfaces pppoe pppoe0 access-concentrator myac

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.3/32               up     up
        fe80::508d:c91c:68cf:ca38/128

Test PPPoE With Tunnel Interface

Description

Checks PPPoE interface with GRE tunnel configured over PPPoE. This test verifies that a GRE tunnel can be established using the PPPoE interface as the local interface.

Scenario

Note

Configure PPPoE server with PAP authentication

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18YlY3wp6cwJ2mJojJjZPb7XLaHIAw3P4A=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set interfaces tunnel tun0 address 10.10.10.200/24
set interfaces tunnel tun0 encapsulation gre
set interfaces tunnel tun0 ppp-interface pppoe0
set interfaces tunnel tun0 remote-address 192.168.100.1
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system offload disable

Step 2: Modify the following configuration lines in DUT0 :

set interfaces pppoe pppoe0 local-address 192.168.100.100

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.100/32             up     up
        fe80::a194:e841:e5b2:3fe4/128

Note

Verify tunnel interface configuration

Step 4: Run command interfaces tunnel tun0 show detailed at DUT0 and check if output contains the following tokens:

10.10.10.200
Show output
--------------------------------------------------------------------------------------------------------
Name  Idx        IP Address         Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type      Phys addr
--------------------------------------------------------------------------------------------------------
tun0  107  10.10.10.200/24          up     up    up    1468              pppoe0  tunnel  192.168.100.100
           fe80::5efe:c0a8:6464/64

Step 5: Run command interfaces tunnel tun0 show detailed at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------------------------------------------
Name  Idx        IP Address         Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type      Phys addr
--------------------------------------------------------------------------------------------------------
tun0  107  10.10.10.200/24          up     up    up    1468              pppoe0  tunnel  192.168.100.100
           fe80::5efe:c0a8:6464/64

Test PPPoE With DNS Forwarding

Description

Checks PPPoE interface with DNS forwarding service configured. This test verifies that DNS forwarding can be enabled on the PPPoE interface and properly resolves DNS queries.

Scenario

Note

Configure PPPoE server with PAP authentication and DNS server

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1/73N2EeFFzJsIXOq4vVGbI4YEWJV/kqEk=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set service dns forwarding ppp interface pppoe0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.3/32               up     up
        fe80::55e9:5576:6348:b05c/128

Note

Google IP is 8.8.8.8

Step 3: Ping IP address 8.8.8.8 from DUT0:

admin@DUT0$ ping 8.8.8.8 count 1 size 56 timeout 1
Show output
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=110 time=43.6 ms

--- 8.8.8.8 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 43.559/43.559/43.559/0.000 ms

Test Events

Description

Checks that PPPoE negotiation events are visible in the system journal when logging is enabled. This test verifies that PPPoE appear in the journal.

Scenario

Note

Configure PPPoE server with PAP authentication

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX19BbTccub78HOSL85J1WXkcZK93Rngrfyw=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set interfaces pppoe pppoe0 logging detailed
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.2/32               up     up
        fe80::1da4:40ab:b1b2:f7aa/128

Step 3: Run command system journal show | cat at DUT0 and check if output contains the following tokens:

pppd
Show output
Feb 19 08:44:42.347350 osdx systemd-journald[2186]: Runtime Journal (/run/log/journal/69bd8e6fd19244c08e519827aa7e309f) is 2.3M, max 17.2M, 14.9M free.
Feb 19 08:44:42.348758 osdx systemd-journald[2186]: Received client request to rotate journal, rotating.
Feb 19 08:44:42.348845 osdx systemd-journald[2186]: Vacuuming done, freed 0B of archived journals from /run/log/journal/69bd8e6fd19244c08e519827aa7e309f.
Feb 19 08:44:42.358832 osdx OSDxCLI[55075]: User 'admin' executed a new command: 'system journal clear'.
Feb 19 08:44:42.596211 osdx OSDxCLI[55075]: User 'admin' executed a new command: 'system coredump delete all'.
Feb 19 08:44:42.970369 osdx OSDxCLI[55075]: User 'admin' entered the configuration menu.
Feb 19 08:44:43.094137 osdx OSDxCLI[55075]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
Feb 19 08:44:43.164899 osdx OSDxCLI[55075]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'.
Feb 19 08:44:43.301499 osdx OSDxCLI[55075]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 base-interface ethernet eth0'.
Feb 19 08:44:43.396948 osdx OSDxCLI[55075]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 authentication protocol pap'.
Feb 19 08:44:43.564696 osdx OSDxCLI[55075]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 authentication user myuser password ******'.
Feb 19 08:44:43.617452 osdx OSDxCLI[55075]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 logging detailed'.
Feb 19 08:44:43.729276 osdx OSDxCLI[55075]: User 'admin' added a new cfg line: 'show working'.
Feb 19 08:44:43.828143 osdx ubnt-cfgd[94166]: inactive
Feb 19 08:44:43.853507 osdx INFO[94174]: FRR daemons did not change
Feb 19 08:44:43.888761 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0
Feb 19 08:44:43.945359 osdx WARNING[94243]: No supported link modes on interface eth0
Feb 19 08:44:43.947099 osdx modulelauncher[94243]: osdx.utils.xos cmd error: /sbin/ethtool -A eth0 autoneg on
Feb 19 08:44:43.947112 osdx modulelauncher[94243]: Command '/sbin/ethtool -A eth0 autoneg on' returned non-zero exit status 76.
Feb 19 08:44:43.948487 osdx modulelauncher[94243]: osdx.utils.xos cmd error: /sbin/ethtool -s eth0 autoneg on advertise Asym_Pause off Pause off --
Feb 19 08:44:43.948500 osdx modulelauncher[94243]: Command '/sbin/ethtool -s eth0 autoneg on advertise Asym_Pause off Pause off --' returned non-zero exit status 75.
Feb 19 08:44:43.977781 osdx pppd[94265]: Plugin rp-pppoe.so loaded.
Feb 19 08:44:44.021445 osdx pppd[94266]: pppd 2.4.9 started by root, uid 0
Feb 19 08:44:44.024796 osdx kernel: pppoe0: renamed from ppp0
Feb 19 08:44:44.036953 osdx pppd[94266]: Renamed interface ppp0 to pppoe0
Feb 19 08:44:44.036964 osdx pppd[94266]: Using interface pppoe0
Feb 19 08:44:44.040795 osdx (udev-worker)[94270]: Network interface NamePolicy= disabled on kernel command line.
Feb 19 08:44:44.048147 osdx cfgd[1859]: [55075]Completed change to active configuration
Feb 19 08:44:44.060380 osdx OSDxCLI[55075]: User 'admin' committed the configuration.
Feb 19 08:44:44.068847 osdx pppd[94266]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Feb 19 08:44:44.068856 osdx pppd[94266]:  dst ff:ff:ff:ff:ff:ff  src de:ad:be:ef:6c:00
Feb 19 08:44:44.068860 osdx pppd[94266]:  [service-name] [host-uniq  3a 70 01 00]
Feb 19 08:44:44.069132 osdx pppd[94266]: Recv PPPOE Discovery V1T1 PADO session 0x0 length 57
Feb 19 08:44:44.069141 osdx pppd[94266]:  dst de:ad:be:ef:6c:00  src fe:31:78:cf:ef:81
Feb 19 08:44:44.069145 osdx pppd[94266]:  [AC-name osdx-tests-prod-1] [service-name] [AC-cookie  1c 11 79 35 26 8f 28 e6 44 95 f7 0d cf 93 ce 48 37 25 00 00] [host-uniq  3a 70 01 00]
Feb 19 08:44:44.069150 osdx pppd[94266]: Send PPPOE Discovery V1T1 PADR session 0x0 length 36
Feb 19 08:44:44.069153 osdx pppd[94266]:  dst fe:31:78:cf:ef:81  src de:ad:be:ef:6c:00
Feb 19 08:44:44.069156 osdx pppd[94266]:  [service-name] [host-uniq  3a 70 01 00] [AC-cookie  1c 11 79 35 26 8f 28 e6 44 95 f7 0d cf 93 ce 48 37 25 00 00]
Feb 19 08:44:44.071969 osdx pppd[94266]: Recv PPPOE Discovery V1T1 PADS session 0x1 length 12
Feb 19 08:44:44.071976 osdx pppd[94266]:  dst de:ad:be:ef:6c:00  src fe:31:78:cf:ef:81
Feb 19 08:44:44.071981 osdx pppd[94266]:  [service-name] [host-uniq  3a 70 01 00]
Feb 19 08:44:44.071985 osdx pppd[94266]: PADS: Service-Name: ''
Feb 19 08:44:44.071988 osdx pppd[94266]: PPP session is 1
Feb 19 08:44:44.086014 osdx OSDxCLI[55075]: User 'admin' left the configuration menu.
Feb 19 08:44:44.092800 osdx pppd[94266]: Connected to fe:31:78:cf:ef:81 via interface eth0
Feb 19 08:44:44.092829 osdx pppd[94266]: using channel 17
Feb 19 08:44:44.092842 osdx pppd[94266]: Connect: pppoe0 <--> eth0
Feb 19 08:44:44.092849 osdx pppd[94266]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0x2000560e>]
Feb 19 08:44:44.242387 osdx OSDxCLI[55075]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'.
Feb 19 08:44:45.076844 osdx pppd[94266]: rcvd [LCP ConfReq id=0x1 <mru 1492> <auth pap> <magic 0xc1ed2fe7>]
Feb 19 08:44:45.076855 osdx pppd[94266]: sent [LCP ConfAck id=0x1 <mru 1492> <auth pap> <magic 0xc1ed2fe7>]
Feb 19 08:44:45.786654 osdx pppd[94266]: rcvd [LCP TermReq id=0x3 "User request"]
Feb 19 08:44:45.786663 osdx pppd[94266]: sent [LCP TermAck id=0x3]
Feb 19 08:44:46.348024 osdx OSDxCLI[55075]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'.
Feb 19 08:44:47.093801 osdx pppd[94266]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0x2000560e>]
Feb 19 08:44:47.093982 osdx pppd[94266]: rcvd [LCP ConfAck id=0x1 <mru 1492> <magic 0x2000560e>]
Feb 19 08:44:48.077628 osdx pppd[94266]: rcvd [LCP ConfReq id=0x1 <mru 1492> <auth pap> <magic 0xc1ed2fe7>]
Feb 19 08:44:48.077640 osdx pppd[94266]: sent [LCP ConfAck id=0x1 <mru 1492> <auth pap> <magic 0xc1ed2fe7>]
Feb 19 08:44:48.077711 osdx pppd[94266]: sent [LCP EchoReq id=0x0 magic=0x2000560e]
Feb 19 08:44:48.077733 osdx pppd[94266]: sent [PAP AuthReq id=0x1 user="myuser" password=<hidden>]
Feb 19 08:44:48.077840 osdx pppd[94266]: rcvd [LCP EchoReq id=0x0 magic=0xc1ed2fe7]
Feb 19 08:44:48.077844 osdx pppd[94266]: sent [LCP EchoRep id=0x0 magic=0x2000560e]
Feb 19 08:44:48.077859 osdx pppd[94266]: rcvd [LCP EchoRep id=0x0 magic=0xc1ed2fe7]
Feb 19 08:44:48.077948 osdx pppd[94266]: rcvd [PAP AuthAck id=0x1 "Login ok"]
Feb 19 08:44:48.077951 osdx pppd[94266]: Remote message: Login ok
Feb 19 08:44:48.077953 osdx pppd[94266]: PAP authentication succeeded
Feb 19 08:44:48.077956 osdx pppd[94266]: peer from calling number FE:31:78:CF:EF:81 authorized
Feb 19 08:44:48.077964 osdx pppd[94266]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0>]
Feb 19 08:44:48.077975 osdx pppd[94266]: sent [IPV6CP ConfReq id=0x1 <addr fe80::1da4:40ab:b1b2:f7aa>]
Feb 19 08:44:48.098275 osdx pppd[94266]: rcvd [CCP ConfReq id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>]
Feb 19 08:44:48.098283 osdx pppd[94266]: sent [CCP ConfReq id=0x1]
Feb 19 08:44:48.098295 osdx pppd[94266]: sent [CCP ConfRej id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>]
Feb 19 08:44:48.098308 osdx pppd[94266]: rcvd [IPCP ConfReq id=0x1 <compress VJ 0f 01> <addr 192.168.100.1>]
Feb 19 08:44:48.098312 osdx pppd[94266]: sent [IPCP ConfRej id=0x1 <compress VJ 0f 01>]
Feb 19 08:44:48.098321 osdx pppd[94266]: rcvd [IPV6CP ConfReq id=0x1 <addr fe80::805b:de6a:b286:ff9a>]
Feb 19 08:44:48.098325 osdx pppd[94266]: sent [IPV6CP ConfAck id=0x1 <addr fe80::805b:de6a:b286:ff9a>]
Feb 19 08:44:48.098336 osdx pppd[94266]: rcvd [IPCP ConfNak id=0x1 <addr 192.168.100.2>]
Feb 19 08:44:48.098340 osdx pppd[94266]: sent [IPCP ConfReq id=0x2 <addr 192.168.100.2>]
Feb 19 08:44:48.098351 osdx pppd[94266]: rcvd [IPV6CP ConfAck id=0x1 <addr fe80::1da4:40ab:b1b2:f7aa>]
Feb 19 08:44:48.098469 osdx pppd[94266]: local  LL address fe80::1da4:40ab:b1b2:f7aa
Feb 19 08:44:48.098472 osdx pppd[94266]: remote LL address fe80::805b:de6a:b286:ff9a
Feb 19 08:44:48.098784 osdx pppd[94266]: Script /etc/ppp/ipv6-up started (pid 94335)
Feb 19 08:44:48.098806 osdx pppd[94266]: rcvd [CCP ConfAck id=0x1]
Feb 19 08:44:48.098827 osdx pppd[94266]: rcvd [CCP ConfReq id=0x2]
Feb 19 08:44:48.098830 osdx pppd[94266]: sent [CCP ConfAck id=0x2]
Feb 19 08:44:48.098844 osdx pppd[94266]: rcvd [IPCP ConfReq id=0x2 <addr 192.168.100.1>]
Feb 19 08:44:48.098847 osdx pppd[94266]: sent [IPCP ConfAck id=0x2 <addr 192.168.100.1>]
Feb 19 08:44:48.098858 osdx pppd[94266]: rcvd [IPCP ConfAck id=0x2 <addr 192.168.100.2>]
Feb 19 08:44:48.099393 osdx pppd[94266]: Script /etc/ppp/ip-pre-up started (pid 94336)
Feb 19 08:44:48.101178 osdx pppd[94266]: Script /etc/ppp/ip-pre-up finished (pid 94336), status = 0x0
Feb 19 08:44:48.101199 osdx pppd[94266]: local  IP address 192.168.100.2
Feb 19 08:44:48.101202 osdx pppd[94266]: remote IP address 192.168.100.1
Feb 19 08:44:48.101369 osdx pppd[94266]: Script /etc/ppp/ip-up started (pid 94340)
Feb 19 08:44:48.101386 osdx pppd[94266]: Script /etc/ppp/ipv6-up finished (pid 94335), status = 0x0
Feb 19 08:44:48.176655 osdx pppd[94266]: Script /etc/ppp/ip-up finished (pid 94340), status = 0x0
Feb 19 08:44:48.415923 osdx OSDxCLI[55075]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'.