Pppoe
Test to check PPPoE interface.
Test PAP Authentication
Description
Checks PPPoE interface with PAP authentication.
Scenario
Note
Configure PPPoE server with PAP authentication
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18Nygd0tjjIcDba+gjMbthuUf2oG5iV2YY= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------- pppoe0 192.168.100.2/32 up up
Test CHAP Authentication
Description
Checks PPPoE interface with CHAP authentication.
Scenario
Note
Configure PPPoE server with CHAP authentication
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol chap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX19sCaSBjAk8M//eRG/e2ApK7AtRRoxAQVs= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------- pppoe0 192.168.100.2/32 up up
Test Local Address
Description
Checks PPPoE interface with a configured local IPv4 address.
Scenario
Note
Configure PPPoE server
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1/CTWixOM1D0J/rNtulRtCCuptFYvpDgC0= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0 :
set interfaces pppoe pppoe0 local-address 192.168.100.100
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
192.168.100.100Show output
--------------------------------------------------------- Name IP Address Admin Oper Vrf Description --------------------------------------------------------- pppoe0 192.168.100.100/32 up up
Step 4: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
--------------------------------------------------------- Name IP Address Admin Oper Vrf Description --------------------------------------------------------- pppoe0 192.168.100.100/32 up up
Note
Connectivity verification is not performed as the interface lacks IPv4 addressing and the IPv6 address is only an identifier
Test Local Identifier
Description
Checks PPPoE interface with a configured local IPv6 identifier.
Scenario
Note
Configure PPPoE server
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18PtpAdbWHYwNOZv/jtH7jTuiOwO5CcdoY= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0 :
set interfaces pppoe pppoe0 local-identifier '::100'
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
::100Show output
------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------- pppoe0 192.168.100.3/32 up up fe80::100/128
Step 4: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------- pppoe0 192.168.100.3/32 up up fe80::100/128
Test Ethernet VIF Interface
Description
Checks PPPoE interface with an Ethernet VIF interface as the base interface.
Scenario
Note
Configure PPPoE server with VLAN 100 support
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+rPW84tCnjxG7gYrj5YMb4J2SFA1/Bzd8= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0 :
set interfaces ethernet eth0 vif 100 set interfaces pppoe pppoe0 base-interface ethernet eth0 vif 100
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
-------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description -------------------------------------------------------------------- pppoe0 192.168.100.2/32 up up fe80::f480:a2ab:3ce4:3fc9/128
Test Bridge Interface
Description
Checks PPPoE interface with a Bridge interface as the base interface.
Scenario
Note
Configure PPPoE server
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+DfqOj/eaQmH+vDZHDqNkeZdS8l1OV1f4= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0 :
delete interfaces pppoe pppoe0 base-interface ethernet set interfaces bridge br0 set interfaces ethernet eth1 bridge-group bridge br0 set interfaces pppoe pppoe0 base-interface bridge br0
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------------------- pppoe0 192.168.100.3/32 up up fe80::5980:7dfa:3d60:f25/128
Test Bridge VIF Interface
Description
Checks PPPoE interface with a Bridge VIF interface as the base interface.
Scenario
Note
Configure PPPoE server with VLAN 100 support
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1/zyFP7IeYATccW8+yRsxSmJJy5ReS5Sps= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0 :
delete interfaces pppoe pppoe0 base-interface ethernet set interfaces bridge br0 vif 100 set interfaces bridge br0 vlan 100 set interfaces ethernet eth1 bridge-group bridge br0 set interfaces ethernet eth1 bridge-group vlan 100 set interfaces pppoe pppoe0 base-interface bridge br0 vif 100
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------------------- pppoe0 192.168.100.2/32 up up fe80::a430:3f38:69f:e8c1/128
Test Access Concentrator
Description
Checks PPPoE interface with an access concentrator. An access concentrator is a device that aggregates PPPoE sessions from multiple clients.
Scenario
Note
Configure PPPoE server with an access concentrator.
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18CzoGGWpPHIXji4jMDS/vOCzf70Qor0hU= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0 :
set interfaces pppoe pppoe0 access-concentrator myac
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
-------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description -------------------------------------------------------------------- pppoe0 192.168.100.3/32 up up fe80::5d11:8125:cb83:678f/128
Test PPPoE With Tunnel Interface
Description
Checks PPPoE interface with GRE tunnel configured over PPPoE. This test verifies that a GRE tunnel can be established using the PPPoE interface as the local interface.
Scenario
Note
Configure PPPoE server with PAP authentication
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+gIz6SEBuo5FikdjZvZf52pSvNcbjQrxE= set interfaces pppoe pppoe0 base-interface ethernet eth0 set interfaces tunnel tun0 address 10.10.10.200/24 set interfaces tunnel tun0 encapsulation gre set interfaces tunnel tun0 ppp-interface pppoe0 set interfaces tunnel tun0 remote-address 192.168.100.1 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system offload disable
Step 2: Modify the following configuration lines in DUT0 :
set interfaces pppoe pppoe0 local-address 192.168.100.100
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------------------- pppoe0 192.168.100.100/32 up up fe80::d55c:4dc9:9a9:f7bd/128
Note
Verify tunnel interface configuration
Step 4: Run command interfaces tunnel tun0 show detailed at DUT0 and check if output contains the following tokens:
10.10.10.200Show output
-------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr -------------------------------------------------------------------------------------------------------- tun0 820 10.10.10.200/24 up up up 1468 pppoe0 tunnel 192.168.100.100 fe80::5efe:c0a8:6464/64
Step 5: Run command interfaces tunnel tun0 show detailed at DUT0 and check if output contains the following tokens:
upShow output
-------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr -------------------------------------------------------------------------------------------------------- tun0 820 10.10.10.200/24 up up up 1468 pppoe0 tunnel 192.168.100.100 fe80::5efe:c0a8:6464/64
Test PPPoE With DNS Forwarding
Description
Checks PPPoE interface with DNS forwarding service configured. This test verifies that DNS forwarding can be enabled on the PPPoE interface and properly resolves DNS queries.
Scenario
Note
Configure PPPoE server with PAP authentication and DNS server
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX188gKNctWMdXwjlxKzr7dLd775lVeaFUUk= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set service dns forwarding ppp interface pppoe0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
-------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description -------------------------------------------------------------------- pppoe0 192.168.100.3/32 up up fe80::e988:c48b:8d65:bf96/128
Note
Google IP is 8.8.8.8
Step 3: Ping IP address 8.8.8.8 from DUT0:
admin@DUT0$ ping 8.8.8.8 count 1 size 56 timeout 1Show output
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data. 64 bytes from 8.8.8.8: icmp_seq=1 ttl=110 time=4.92 ms --- 8.8.8.8 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 4.916/4.916/4.916/0.000 ms
Test Events
Description
Checks that PPPoE negotiation events are visible in the system journal when logging is enabled. This test verifies that PPPoE appear in the journal.
Scenario
Note
Configure PPPoE server with PAP authentication
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+yDC3nE+c/3DkjCLFDBoF8LhsYORySw6A= set interfaces pppoe pppoe0 base-interface ethernet eth0 set interfaces pppoe pppoe0 logging detailed set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
-------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description -------------------------------------------------------------------- pppoe0 192.168.100.2/32 up up fe80::8dd3:e953:6185:df56/128
Step 3: Run command system journal show | cat at DUT0 and check if output contains the following tokens:
pppdShow output
Mar 23 15:33:57.285054 osdx systemd-journald[2086]: Runtime Journal (/run/log/journal/6b3b4e4818aa404284bc644df40f6904) is 1.9M, max 13.8M, 11.8M free. Mar 23 15:33:57.286035 osdx systemd-journald[2086]: Received client request to rotate journal, rotating. Mar 23 15:33:57.286092 osdx systemd-journald[2086]: Vacuuming done, freed 0B of archived journals from /run/log/journal/6b3b4e4818aa404284bc644df40f6904. Mar 23 15:33:57.298063 osdx OSDxCLI[824268]: User 'admin' executed a new command: 'system journal clear'. Mar 23 15:33:57.563123 osdx OSDxCLI[824268]: User 'admin' executed a new command: 'system coredump delete all'. Mar 23 15:33:57.928574 osdx OSDxCLI[824268]: User 'admin' entered the configuration menu. Mar 23 15:33:58.050865 osdx OSDxCLI[824268]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'. Mar 23 15:33:58.114748 osdx OSDxCLI[824268]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Mar 23 15:33:58.217161 osdx OSDxCLI[824268]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 base-interface ethernet eth0'. Mar 23 15:33:58.275568 osdx OSDxCLI[824268]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 authentication protocol pap'. Mar 23 15:33:58.428056 osdx OSDxCLI[824268]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 authentication user myuser password ******'. Mar 23 15:33:58.526822 osdx OSDxCLI[824268]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 logging detailed'. Mar 23 15:33:58.626713 osdx OSDxCLI[824268]: User 'admin' added a new cfg line: 'show working'. Mar 23 15:33:58.759580 osdx ubnt-cfgd[884854]: inactive Mar 23 15:33:58.785715 osdx INFO[884862]: FRR daemons did not change Mar 23 15:33:58.818042 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Mar 23 15:33:58.864243 osdx WARNING[884931]: No supported link modes on interface eth0 Mar 23 15:33:58.865696 osdx modulelauncher[884931]: osdx.utils.xos cmd error: /sbin/ethtool -A eth0 autoneg on Mar 23 15:33:58.865711 osdx modulelauncher[884931]: Command '/sbin/ethtool -A eth0 autoneg on' returned non-zero exit status 76. Mar 23 15:33:58.866884 osdx modulelauncher[884931]: osdx.utils.xos cmd error: /sbin/ethtool -s eth0 autoneg on advertise Pause off Asym_Pause off -- Mar 23 15:33:58.866893 osdx modulelauncher[884931]: Command '/sbin/ethtool -s eth0 autoneg on advertise Pause off Asym_Pause off --' returned non-zero exit status 75. Mar 23 15:33:58.892643 osdx pppd[884953]: Plugin rp-pppoe.so loaded. Mar 23 15:33:58.962648 osdx pppd[884954]: pppd 2.4.9 started by root, uid 0 Mar 23 15:33:58.963019 osdx pppd[884954]: Renamed interface ppp0 to pppoe0 Mar 23 15:33:58.963023 osdx pppd[884954]: Using interface pppoe0 Mar 23 15:33:58.966066 osdx kernel: pppoe0: renamed from ppp0 Mar 23 15:33:58.969177 osdx (udev-worker)[884958]: Network interface NamePolicy= disabled on kernel command line. Mar 23 15:33:58.982074 osdx pppd[884954]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12 Mar 23 15:33:58.982088 osdx pppd[884954]: dst ff:ff:ff:ff:ff:ff src de:ad:be:ef:6c:00 Mar 23 15:33:58.982091 osdx pppd[884954]: [service-name] [host-uniq da 80 0d 00] Mar 23 15:33:58.982274 osdx pppd[884954]: Recv PPPOE Discovery V1T1 PADO session 0x0 length 57 Mar 23 15:33:58.982277 osdx pppd[884954]: dst de:ad:be:ef:6c:00 src fe:30:0c:d4:fe:10 Mar 23 15:33:58.982280 osdx pppd[884954]: [AC-name osdx-tests-prod-1] [service-name] [AC-cookie 5e cd db 27 47 f8 7a 54 c0 f4 a6 1f 76 a9 3c df f7 ee 00 00] [host-uniq da 80 0d 00] Mar 23 15:33:58.982284 osdx pppd[884954]: Send PPPOE Discovery V1T1 PADR session 0x0 length 36 Mar 23 15:33:58.982287 osdx pppd[884954]: dst fe:30:0c:d4:fe:10 src de:ad:be:ef:6c:00 Mar 23 15:33:58.982290 osdx pppd[884954]: [service-name] [host-uniq da 80 0d 00] [AC-cookie 5e cd db 27 47 f8 7a 54 c0 f4 a6 1f 76 a9 3c df f7 ee 00 00] Mar 23 15:33:58.982488 osdx pppd[884954]: Recv PPPOE Discovery V1T1 PADS session 0x1 length 12 Mar 23 15:33:58.982491 osdx pppd[884954]: dst de:ad:be:ef:6c:00 src fe:30:0c:d4:fe:10 Mar 23 15:33:58.982494 osdx pppd[884954]: [service-name] [host-uniq da 80 0d 00] Mar 23 15:33:58.982497 osdx pppd[884954]: PADS: Service-Name: '' Mar 23 15:33:58.982499 osdx pppd[884954]: PPP session is 1 Mar 23 15:33:58.992095 osdx cfgd[1828]: [824268]Completed change to active configuration Mar 23 15:33:59.005348 osdx OSDxCLI[824268]: User 'admin' committed the configuration. Mar 23 15:33:59.006058 osdx pppd[884954]: Connected to fe:30:0c:d4:fe:10 via interface eth0 Mar 23 15:33:59.006082 osdx pppd[884954]: using channel 17 Mar 23 15:33:59.006094 osdx pppd[884954]: Connect: pppoe0 <--> eth0 Mar 23 15:33:59.006100 osdx pppd[884954]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0xa7155d3e>] Mar 23 15:33:59.021466 osdx OSDxCLI[824268]: User 'admin' left the configuration menu. Mar 23 15:33:59.179968 osdx OSDxCLI[824268]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'. Mar 23 15:33:59.986275 osdx pppd[884954]: rcvd [LCP ConfReq id=0x1 <mru 1492> <auth pap> <magic 0x3b81630b>] Mar 23 15:33:59.986285 osdx pppd[884954]: sent [LCP ConfAck id=0x1 <mru 1492> <auth pap> <magic 0x3b81630b>] Mar 23 15:34:00.751061 osdx pppd[884954]: rcvd [LCP TermReq id=0x3 "User request"] Mar 23 15:34:00.751069 osdx pppd[884954]: sent [LCP TermAck id=0x3] Mar 23 15:34:01.260809 osdx OSDxCLI[824268]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'. Mar 23 15:34:02.007130 osdx pppd[884954]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0xa7155d3e>] Mar 23 15:34:02.007312 osdx pppd[884954]: rcvd [LCP ConfAck id=0x1 <mru 1492> <magic 0xa7155d3e>] Mar 23 15:34:02.987122 osdx pppd[884954]: rcvd [LCP ConfReq id=0x1 <mru 1492> <auth pap> <magic 0x3b81630b>] Mar 23 15:34:02.987133 osdx pppd[884954]: sent [LCP ConfAck id=0x1 <mru 1492> <auth pap> <magic 0x3b81630b>] Mar 23 15:34:02.987226 osdx pppd[884954]: sent [LCP EchoReq id=0x0 magic=0xa7155d3e] Mar 23 15:34:02.987239 osdx pppd[884954]: sent [PAP AuthReq id=0x1 user="myuser" password=<hidden>] Mar 23 15:34:02.987578 osdx pppd[884954]: rcvd [LCP EchoReq id=0x0 magic=0x3b81630b] Mar 23 15:34:02.987587 osdx pppd[884954]: sent [LCP EchoRep id=0x0 magic=0xa7155d3e] Mar 23 15:34:02.987605 osdx pppd[884954]: rcvd [LCP EchoRep id=0x0 magic=0x3b81630b] Mar 23 15:34:02.987612 osdx pppd[884954]: rcvd [PAP AuthAck id=0x1 "Login ok"] Mar 23 15:34:02.987615 osdx pppd[884954]: Remote message: Login ok Mar 23 15:34:02.987618 osdx pppd[884954]: PAP authentication succeeded Mar 23 15:34:02.987621 osdx pppd[884954]: peer from calling number FE:30:0C:D4:FE:10 authorized Mar 23 15:34:02.987633 osdx pppd[884954]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0>] Mar 23 15:34:02.987646 osdx pppd[884954]: sent [IPV6CP ConfReq id=0x1 <addr fe80::8dd3:e953:6185:df56>] Mar 23 15:34:02.987660 osdx pppd[884954]: rcvd [CCP ConfReq id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>] Mar 23 15:34:02.987664 osdx pppd[884954]: sent [CCP ConfReq id=0x1] Mar 23 15:34:02.987672 osdx pppd[884954]: sent [CCP ConfRej id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>] Mar 23 15:34:02.987683 osdx pppd[884954]: rcvd [IPCP ConfReq id=0x1 <compress VJ 0f 01> <addr 192.168.100.1>] Mar 23 15:34:02.987687 osdx pppd[884954]: sent [IPCP ConfRej id=0x1 <compress VJ 0f 01>] Mar 23 15:34:02.987698 osdx pppd[884954]: rcvd [IPV6CP ConfReq id=0x1 <addr fe80::d479:1ab2:76e8:47c0>] Mar 23 15:34:02.987703 osdx pppd[884954]: sent [IPV6CP ConfAck id=0x1 <addr fe80::d479:1ab2:76e8:47c0>] Mar 23 15:34:02.987759 osdx pppd[884954]: rcvd [IPCP ConfNak id=0x1 <addr 192.168.100.2>] Mar 23 15:34:02.987764 osdx pppd[884954]: sent [IPCP ConfReq id=0x2 <addr 192.168.100.2>] Mar 23 15:34:02.987777 osdx pppd[884954]: rcvd [IPV6CP ConfAck id=0x1 <addr fe80::8dd3:e953:6185:df56>] Mar 23 15:34:02.987953 osdx pppd[884954]: local LL address fe80::8dd3:e953:6185:df56 Mar 23 15:34:02.987957 osdx pppd[884954]: remote LL address fe80::d479:1ab2:76e8:47c0 Mar 23 15:34:02.988252 osdx pppd[884954]: Script /etc/ppp/ipv6-up started (pid 885026) Mar 23 15:34:02.988274 osdx pppd[884954]: rcvd [CCP ConfAck id=0x1] Mar 23 15:34:02.988286 osdx pppd[884954]: rcvd [CCP ConfReq id=0x2] Mar 23 15:34:02.988288 osdx pppd[884954]: sent [CCP ConfAck id=0x2] Mar 23 15:34:02.988304 osdx pppd[884954]: rcvd [IPCP ConfReq id=0x2 <addr 192.168.100.1>] Mar 23 15:34:02.988307 osdx pppd[884954]: sent [IPCP ConfAck id=0x2 <addr 192.168.100.1>] Mar 23 15:34:02.988316 osdx pppd[884954]: rcvd [IPCP ConfAck id=0x2 <addr 192.168.100.2>] Mar 23 15:34:02.988799 osdx pppd[884954]: Script /etc/ppp/ip-pre-up started (pid 885027) Mar 23 15:34:02.990993 osdx pppd[884954]: Script /etc/ppp/ip-pre-up finished (pid 885027), status = 0x0 Mar 23 15:34:02.991019 osdx pppd[884954]: local IP address 192.168.100.2 Mar 23 15:34:02.991022 osdx pppd[884954]: remote IP address 192.168.100.1 Mar 23 15:34:02.991209 osdx pppd[884954]: Script /etc/ppp/ip-up started (pid 885031) Mar 23 15:34:02.991230 osdx pppd[884954]: Script /etc/ppp/ipv6-up finished (pid 885026), status = 0x0 Mar 23 15:34:03.052685 osdx pppd[884954]: Script /etc/ppp/ip-up finished (pid 885031), status = 0x0 Mar 23 15:34:03.340603 osdx OSDxCLI[824268]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'.