Pppoe

Test to check PPPoE interface.

Test PAP Authentication

Description

Checks PPPoE interface with PAP authentication.

Scenario

Note

Configure PPPoE server with PAP authentication

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+ZMBGGSL8+mKzMwuI9txnVrUNr7S7hEhM=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
-------------------------------------------------------
 Name      IP Address     Admin  Oper  Vrf  Description
-------------------------------------------------------
pppoe0  192.168.100.2/32  up     up

Test CHAP Authentication

Description

Checks PPPoE interface with CHAP authentication.

Scenario

Note

Configure PPPoE server with CHAP authentication

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol chap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+gK8xb0vh/FVcAyjAQUg0ZMYORrWV2SPo=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
-------------------------------------------------------
 Name      IP Address     Admin  Oper  Vrf  Description
-------------------------------------------------------
pppoe0  192.168.100.2/32  up     up

Test Local Address

Description

Checks PPPoE interface with a configured local IPv4 address.

Scenario

Note

Configure PPPoE server

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18YmPD94XAsN3QPsgp4Sqi9UShLfdMMnb4=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

set interfaces pppoe pppoe0 local-address 192.168.100.100

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

192.168.100.100
Show output
---------------------------------------------------------
 Name       IP Address      Admin  Oper  Vrf  Description
---------------------------------------------------------
pppoe0  192.168.100.100/32  up     up

Step 4: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
---------------------------------------------------------
 Name       IP Address      Admin  Oper  Vrf  Description
---------------------------------------------------------
pppoe0  192.168.100.100/32  up     up

Note

Connectivity verification is not performed as the interface lacks IPv4 addressing and the IPv6 address is only an identifier


Test Local Identifier

Description

Checks PPPoE interface with a configured local IPv6 identifier.

Scenario

Note

Configure PPPoE server

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX19uxb5+v/MCZ1LW9i/Z5CtcpiBr/e6JTUc=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

set interfaces pppoe pppoe0 local-identifier '::100'

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

::100
Show output
-------------------------------------------------------
 Name      IP Address     Admin  Oper  Vrf  Description
-------------------------------------------------------
pppoe0  192.168.100.3/32  up     up
        fe80::100/128

Step 4: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
-------------------------------------------------------
 Name      IP Address     Admin  Oper  Vrf  Description
-------------------------------------------------------
pppoe0  192.168.100.3/32  up     up
        fe80::100/128

Test Ethernet VIF Interface

Description

Checks PPPoE interface with an Ethernet VIF interface as the base interface.

Scenario

Note

Configure PPPoE server with VLAN 100 support

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18MftTSEDMNQjM8ygT4qyUIKlIGN3m25eg=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vif 100
set interfaces pppoe pppoe0 base-interface ethernet eth0 vif 100

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
------------------------------------------------------------------
 Name           IP Address           Admin  Oper  Vrf  Description
------------------------------------------------------------------
pppoe0  192.168.100.2/32             up     up
        fe80::433:2b0e:e6e1:752/128

Test Bridge Interface

Description

Checks PPPoE interface with a Bridge interface as the base interface.

Scenario

Note

Configure PPPoE server

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+pDqGTLSVNiDhl30UahFMzAwvZPMFRMi8=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

delete interfaces pppoe pppoe0 base-interface ethernet
set interfaces bridge br0
set interfaces ethernet eth1 bridge-group bridge br0
set interfaces pppoe pppoe0 base-interface bridge br0

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.3/32               up     up
        fe80::f91e:f944:5daa:b5e7/128

Test Bridge VIF Interface

Description

Checks PPPoE interface with a Bridge VIF interface as the base interface.

Scenario

Note

Configure PPPoE server with VLAN 100 support

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+2fA+RsJ7b24xOHUHmvWoZo69Nb+fW79I=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

delete interfaces pppoe pppoe0 base-interface ethernet
set interfaces bridge br0 vif 100
set interfaces bridge br0 vlan 100
set interfaces ethernet eth1 bridge-group bridge br0
set interfaces ethernet eth1 bridge-group vlan 100
set interfaces pppoe pppoe0 base-interface bridge br0 vif 100

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.2/32               up     up
        fe80::c934:43dd:c7a0:7388/128

Test Access Concentrator

Description

Checks PPPoE interface with an access concentrator. An access concentrator is a device that aggregates PPPoE sessions from multiple clients.

Scenario

Note

Configure PPPoE server with an access concentrator.

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1/mBcqpHzn/88dbd6E3YiaGi6lGmDG/LWY=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

set interfaces pppoe pppoe0 access-concentrator myac

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.3/32               up     up
        fe80::c875:4747:809a:e2cd/128

Test PPPoE With Tunnel Interface

Description

Checks PPPoE interface with GRE tunnel configured over PPPoE. This test verifies that a GRE tunnel can be established using the PPPoE interface as the local interface.

Scenario

Note

Configure PPPoE server with PAP authentication

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18/+i8wCeDNYX5m+CdEBjX1Q4ST5v6ILPs=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set interfaces tunnel tun0 address 10.10.10.200/24
set interfaces tunnel tun0 encapsulation gre
set interfaces tunnel tun0 ppp-interface pppoe0
set interfaces tunnel tun0 remote-address 192.168.100.1
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system offload disable

Step 2: Modify the following configuration lines in DUT0 :

set interfaces pppoe pppoe0 local-address 192.168.100.100

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.100/32             up     up
        fe80::c4be:b4d7:cc15:4d4c/128

Note

Verify tunnel interface configuration

Step 4: Run command interfaces tunnel tun0 show detailed at DUT0 and check if output contains the following tokens:

10.10.10.200
Show output
--------------------------------------------------------------------------------------------------------
Name  Idx        IP Address         Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type      Phys addr
--------------------------------------------------------------------------------------------------------
tun0  822  10.10.10.200/24          up     up    up    1468              pppoe0  tunnel  192.168.100.100
           fe80::5efe:c0a8:6464/64

Step 5: Run command interfaces tunnel tun0 show detailed at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------------------------------------------
Name  Idx        IP Address         Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type      Phys addr
--------------------------------------------------------------------------------------------------------
tun0  822  10.10.10.200/24          up     up    up    1468              pppoe0  tunnel  192.168.100.100
           fe80::5efe:c0a8:6464/64

Test PPPoE With DNS Forwarding

Description

Checks PPPoE interface with DNS forwarding service configured. This test verifies that DNS forwarding can be enabled on the PPPoE interface and properly resolves DNS queries.

Scenario

Note

Configure PPPoE server with PAP authentication and DNS server

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX19dy3900K7DVn1ZGSOzCM9oZlZ9U22NlkI=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set service dns forwarding ppp interface pppoe0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.3/32               up     up
        fe80::a5c2:2774:99e2:2df0/128

Note

Google IP is 8.8.8.8

Step 3: Ping IP address 8.8.8.8 from DUT0:

admin@DUT0$ ping 8.8.8.8 count 1 size 56 timeout 1
Show output
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=110 time=4.71 ms

--- 8.8.8.8 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 4.712/4.712/4.712/0.000 ms

Test Events

Description

Checks that PPPoE negotiation events are visible in the system journal when logging is enabled. This test verifies that PPPoE appear in the journal.

Scenario

Note

Configure PPPoE server with PAP authentication

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX19NYxwgm0+ORe1B8eRpt0I3WXHtL2QdEdc=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set interfaces pppoe pppoe0 logging detailed
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.2/32               up     up
        fe80::9cec:87e3:9e77:6161/128

Step 3: Run command system journal show | cat at DUT0 and check if output contains the following tokens:

pppd
Show output
Mar 05 18:15:40.270500 osdx systemd-journald[466780]: Runtime Journal (/run/log/journal/78445f9299f9414990e66dc8aa510838) is 1.8M, max 13.8M, 11.9M free.
Mar 05 18:15:40.270931 osdx systemd-journald[466780]: Received client request to rotate journal, rotating.
Mar 05 18:15:40.270959 osdx systemd-journald[466780]: Vacuuming done, freed 0B of archived journals from /run/log/journal/78445f9299f9414990e66dc8aa510838.
Mar 05 18:15:40.280533 osdx OSDxCLI[559085]: User 'admin' executed a new command: 'system journal clear'.
Mar 05 18:15:40.496436 osdx OSDxCLI[559085]: User 'admin' executed a new command: 'system coredump delete all'.
Mar 05 18:15:40.867526 osdx OSDxCLI[559085]: User 'admin' entered the configuration menu.
Mar 05 18:15:41.011269 osdx OSDxCLI[559085]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
Mar 05 18:15:41.067587 osdx OSDxCLI[559085]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'.
Mar 05 18:15:41.191869 osdx OSDxCLI[559085]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 base-interface ethernet eth0'.
Mar 05 18:15:41.304345 osdx OSDxCLI[559085]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 authentication protocol pap'.
Mar 05 18:15:41.454347 osdx OSDxCLI[559085]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 authentication user myuser password ******'.
Mar 05 18:15:41.506566 osdx OSDxCLI[559085]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 logging detailed'.
Mar 05 18:15:41.657236 osdx OSDxCLI[559085]: User 'admin' added a new cfg line: 'show working'.
Mar 05 18:15:41.722033 osdx ubnt-cfgd[576898]: inactive
Mar 05 18:15:41.745651 osdx INFO[576906]: FRR daemons did not change
Mar 05 18:15:41.778859 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0
Mar 05 18:15:41.824407 osdx WARNING[576975]: No supported link modes on interface eth0
Mar 05 18:15:41.825905 osdx modulelauncher[576975]: osdx.utils.xos cmd error: /sbin/ethtool -A eth0 autoneg on
Mar 05 18:15:41.825919 osdx modulelauncher[576975]: Command '/sbin/ethtool -A eth0 autoneg on' returned non-zero exit status 76.
Mar 05 18:15:41.827168 osdx modulelauncher[576975]: osdx.utils.xos cmd error: /sbin/ethtool -s eth0 autoneg on advertise Pause off Asym_Pause off --
Mar 05 18:15:41.827179 osdx modulelauncher[576975]: Command '/sbin/ethtool -s eth0 autoneg on advertise Pause off Asym_Pause off --' returned non-zero exit status 75.
Mar 05 18:15:41.859224 osdx pppd[576997]: Plugin rp-pppoe.so loaded.
Mar 05 18:15:41.907416 osdx pppd[576998]: pppd 2.4.9 started by root, uid 0
Mar 05 18:15:41.908883 osdx pppd[576998]: Renamed interface ppp0 to pppoe0
Mar 05 18:15:41.908893 osdx pppd[576998]: Using interface pppoe0
Mar 05 18:15:41.910835 osdx kernel: pppoe0: renamed from ppp0
Mar 05 18:15:41.912359 osdx (udev-worker)[577001]: Network interface NamePolicy= disabled on kernel command line.
Mar 05 18:15:41.922890 osdx pppd[576998]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Mar 05 18:15:41.922897 osdx pppd[576998]:  dst ff:ff:ff:ff:ff:ff  src de:ad:be:ef:6c:00
Mar 05 18:15:41.922899 osdx pppd[576998]:  [service-name] [host-uniq  e6 cd 08 00]
Mar 05 18:15:41.923090 osdx pppd[576998]: Recv PPPOE Discovery V1T1 PADO session 0x0 length 57
Mar 05 18:15:41.923095 osdx pppd[576998]:  dst de:ad:be:ef:6c:00  src fe:43:12:09:51:20
Mar 05 18:15:41.923098 osdx pppd[576998]:  [AC-name osdx-tests-prod-1] [service-name] [AC-cookie  81 4e 15 91 f3 5d 27 18 e1 e2 23 bb c9 ec 9f a9 28 85 00 00] [host-uniq  e6 cd 08 00]
Mar 05 18:15:41.923101 osdx pppd[576998]: Send PPPOE Discovery V1T1 PADR session 0x0 length 36
Mar 05 18:15:41.923104 osdx pppd[576998]:  dst fe:43:12:09:51:20  src de:ad:be:ef:6c:00
Mar 05 18:15:41.923106 osdx pppd[576998]:  [service-name] [host-uniq  e6 cd 08 00] [AC-cookie  81 4e 15 91 f3 5d 27 18 e1 e2 23 bb c9 ec 9f a9 28 85 00 00]
Mar 05 18:15:41.923300 osdx pppd[576998]: Recv PPPOE Discovery V1T1 PADS session 0x1 length 12
Mar 05 18:15:41.923306 osdx pppd[576998]:  dst de:ad:be:ef:6c:00  src fe:43:12:09:51:20
Mar 05 18:15:41.923308 osdx pppd[576998]:  [service-name] [host-uniq  e6 cd 08 00]
Mar 05 18:15:41.923311 osdx pppd[576998]: PADS: Service-Name: ''
Mar 05 18:15:41.923313 osdx pppd[576998]: PPP session is 1
Mar 05 18:15:41.934733 osdx cfgd[1863]: [559085]Completed change to active configuration
Mar 05 18:15:41.938874 osdx pppd[576998]: Connected to fe:43:12:09:51:20 via interface eth0
Mar 05 18:15:41.938899 osdx pppd[576998]: using channel 17
Mar 05 18:15:41.938914 osdx pppd[576998]: Connect: pppoe0 <--> eth0
Mar 05 18:15:41.938922 osdx pppd[576998]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0xf7cc83f3>]
Mar 05 18:15:41.949986 osdx OSDxCLI[559085]: User 'admin' committed the configuration.
Mar 05 18:15:41.971295 osdx OSDxCLI[559085]: User 'admin' left the configuration menu.
Mar 05 18:15:42.126350 osdx OSDxCLI[559085]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'.
Mar 05 18:15:42.926155 osdx pppd[576998]: rcvd [LCP ConfReq id=0x1 <mru 1492> <auth pap> <magic 0x30ff09af>]
Mar 05 18:15:42.926166 osdx pppd[576998]: sent [LCP ConfAck id=0x1 <mru 1492> <auth pap> <magic 0x30ff09af>]
Mar 05 18:15:43.643156 osdx pppd[576998]: rcvd [LCP TermReq id=0x3 "User request"]
Mar 05 18:15:43.643166 osdx pppd[576998]: sent [LCP TermAck id=0x3]
Mar 05 18:15:44.199776 osdx OSDxCLI[559085]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'.
Mar 05 18:15:44.939653 osdx pppd[576998]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0xf7cc83f3>]
Mar 05 18:15:44.939844 osdx pppd[576998]: rcvd [LCP ConfAck id=0x1 <mru 1492> <magic 0xf7cc83f3>]
Mar 05 18:15:45.926955 osdx pppd[576998]: rcvd [LCP ConfReq id=0x1 <mru 1492> <auth pap> <magic 0x30ff09af>]
Mar 05 18:15:45.926967 osdx pppd[576998]: sent [LCP ConfAck id=0x1 <mru 1492> <auth pap> <magic 0x30ff09af>]
Mar 05 18:15:45.927068 osdx pppd[576998]: sent [LCP EchoReq id=0x0 magic=0xf7cc83f3]
Mar 05 18:15:45.927080 osdx pppd[576998]: sent [PAP AuthReq id=0x1 user="myuser" password=<hidden>]
Mar 05 18:15:45.927131 osdx pppd[576998]: rcvd [LCP EchoReq id=0x0 magic=0x30ff09af]
Mar 05 18:15:45.927135 osdx pppd[576998]: sent [LCP EchoRep id=0x0 magic=0xf7cc83f3]
Mar 05 18:15:45.927240 osdx pppd[576998]: rcvd [LCP EchoRep id=0x0 magic=0x30ff09af]
Mar 05 18:15:45.927249 osdx pppd[576998]: rcvd [PAP AuthAck id=0x1 "Login ok"]
Mar 05 18:15:45.927252 osdx pppd[576998]: Remote message: Login ok
Mar 05 18:15:45.927254 osdx pppd[576998]: PAP authentication succeeded
Mar 05 18:15:45.927256 osdx pppd[576998]: peer from calling number FE:43:12:09:51:20 authorized
Mar 05 18:15:45.927266 osdx pppd[576998]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0>]
Mar 05 18:15:45.927279 osdx pppd[576998]: sent [IPV6CP ConfReq id=0x1 <addr fe80::9cec:87e3:9e77:6161>]
Mar 05 18:15:45.927554 osdx pppd[576998]: rcvd [CCP ConfReq id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>]
Mar 05 18:15:45.927560 osdx pppd[576998]: sent [CCP ConfReq id=0x1]
Mar 05 18:15:45.927567 osdx pppd[576998]: sent [CCP ConfRej id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>]
Mar 05 18:15:45.927580 osdx pppd[576998]: rcvd [IPCP ConfReq id=0x1 <compress VJ 0f 01> <addr 192.168.100.1>]
Mar 05 18:15:45.927583 osdx pppd[576998]: sent [IPCP ConfRej id=0x1 <compress VJ 0f 01>]
Mar 05 18:15:45.927599 osdx pppd[576998]: rcvd [IPV6CP ConfReq id=0x1 <addr fe80::a8c5:81f3:baa9:d326>]
Mar 05 18:15:45.927602 osdx pppd[576998]: sent [IPV6CP ConfAck id=0x1 <addr fe80::a8c5:81f3:baa9:d326>]
Mar 05 18:15:45.927613 osdx pppd[576998]: rcvd [IPCP ConfNak id=0x1 <addr 192.168.100.2>]
Mar 05 18:15:45.927617 osdx pppd[576998]: sent [IPCP ConfReq id=0x2 <addr 192.168.100.2>]
Mar 05 18:15:45.927627 osdx pppd[576998]: rcvd [IPV6CP ConfAck id=0x1 <addr fe80::9cec:87e3:9e77:6161>]
Mar 05 18:15:45.927817 osdx pppd[576998]: local  LL address fe80::9cec:87e3:9e77:6161
Mar 05 18:15:45.927821 osdx pppd[576998]: remote LL address fe80::a8c5:81f3:baa9:d326
Mar 05 18:15:45.928096 osdx pppd[576998]: Script /etc/ppp/ipv6-up started (pid 577067)
Mar 05 18:15:45.928120 osdx pppd[576998]: rcvd [CCP ConfAck id=0x1]
Mar 05 18:15:45.928130 osdx pppd[576998]: rcvd [CCP ConfReq id=0x2]
Mar 05 18:15:45.928133 osdx pppd[576998]: sent [CCP ConfAck id=0x2]
Mar 05 18:15:45.928149 osdx pppd[576998]: rcvd [IPCP ConfReq id=0x2 <addr 192.168.100.1>]
Mar 05 18:15:45.928152 osdx pppd[576998]: sent [IPCP ConfAck id=0x2 <addr 192.168.100.1>]
Mar 05 18:15:45.928162 osdx pppd[576998]: rcvd [IPCP ConfAck id=0x2 <addr 192.168.100.2>]
Mar 05 18:15:45.928630 osdx pppd[576998]: Script /etc/ppp/ip-pre-up started (pid 577068)
Mar 05 18:15:45.930790 osdx pppd[576998]: Script /etc/ppp/ip-pre-up finished (pid 577068), status = 0x0
Mar 05 18:15:45.930813 osdx pppd[576998]: local  IP address 192.168.100.2
Mar 05 18:15:45.930827 osdx pppd[576998]: remote IP address 192.168.100.1
Mar 05 18:15:45.931009 osdx pppd[576998]: Script /etc/ppp/ip-up started (pid 577072)
Mar 05 18:15:45.931027 osdx pppd[576998]: Script /etc/ppp/ipv6-up finished (pid 577067), status = 0x0
Mar 05 18:15:46.000246 osdx pppd[576998]: Script /etc/ppp/ip-up finished (pid 577072), status = 0x0
Mar 05 18:15:46.288520 osdx OSDxCLI[559085]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'.