Pppoe
Test to check PPPoE interface.
Test PAP Authentication
Description
Checks PPPoE interface with PAP authentication.
Scenario
Note
Configure PPPoE server with PAP authentication
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1/hPt9sal/Y/QS09uvTNwmNbgaYQhGuIdY= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------- pppoe0 192.168.100.2/32 up up
Test CHAP Authentication
Description
Checks PPPoE interface with CHAP authentication.
Scenario
Note
Configure PPPoE server with CHAP authentication
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol chap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18U6p2XyDApXGgvM/YXUFMjF/v9LelOI0U= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------- pppoe0 192.168.100.2/32 up up
Test Local Address
Description
Checks PPPoE interface with a configured local IPv4 address.
Scenario
Note
Configure PPPoE server
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18NUpRhGhjFE/0z9OJSAAnPGR/qRvJI080= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0 :
set interfaces pppoe pppoe0 local-address 192.168.100.100
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
192.168.100.100Show output
--------------------------------------------------------- Name IP Address Admin Oper Vrf Description --------------------------------------------------------- pppoe0 192.168.100.100/32 up up
Step 4: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
--------------------------------------------------------- Name IP Address Admin Oper Vrf Description --------------------------------------------------------- pppoe0 192.168.100.100/32 up up
Note
Connectivity verification is not performed as the interface lacks IPv4 addressing and the IPv6 address is only an identifier
Test Local Identifier
Description
Checks PPPoE interface with a configured local IPv6 identifier.
Scenario
Note
Configure PPPoE server
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18f9xyjqavwLvZT8fzalXpWt2KMcaBkAKE= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0 :
set interfaces pppoe pppoe0 local-identifier '::100'
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
::100Show output
------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------- pppoe0 192.168.100.3/32 up up fe80::100/128
Step 4: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------- pppoe0 192.168.100.3/32 up up fe80::100/128
Test Ethernet VIF Interface
Description
Checks PPPoE interface with an Ethernet VIF interface as the base interface.
Scenario
Note
Configure PPPoE server with VLAN 100 support
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18M8VgM1T/vqkYv2iakp4Xp4fOndC61bbo= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0 :
set interfaces ethernet eth0 vif 100 set interfaces pppoe pppoe0 base-interface ethernet eth0 vif 100
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
-------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description -------------------------------------------------------------------- pppoe0 192.168.100.2/32 up up fe80::d0b7:a628:e8e7:2428/128
Test Bridge Interface
Description
Checks PPPoE interface with a Bridge interface as the base interface.
Scenario
Note
Configure PPPoE server
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+hFJXcTcta8aQwTG87VsFy+xhtj8sXaWI= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0 :
delete interfaces pppoe pppoe0 base-interface ethernet set interfaces bridge br0 set interfaces ethernet eth1 bridge-group bridge br0 set interfaces pppoe pppoe0 base-interface bridge br0
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
-------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description -------------------------------------------------------------------- pppoe0 192.168.100.3/32 up up fe80::a17b:658d:bfda:d1f1/128
Test Bridge VIF Interface
Description
Checks PPPoE interface with a Bridge VIF interface as the base interface.
Scenario
Note
Configure PPPoE server with VLAN 100 support
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18mKoIgjTeugI/ZJ4NiYadVEgCmpq7TpP0= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0 :
delete interfaces pppoe pppoe0 base-interface ethernet set interfaces bridge br0 vif 100 set interfaces bridge br0 vlan 100 set interfaces ethernet eth1 bridge-group bridge br0 set interfaces ethernet eth1 bridge-group vlan 100 set interfaces pppoe pppoe0 base-interface bridge br0 vif 100
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
-------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description -------------------------------------------------------------------- pppoe0 192.168.100.2/32 up up fe80::6c54:2ee4:2e8b:403d/128
Test Access Concentrator
Description
Checks PPPoE interface with an access concentrator. An access concentrator is a device that aggregates PPPoE sessions from multiple clients.
Scenario
Note
Configure PPPoE server with an access concentrator.
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+moD1dlKE594lHMc9YOebCuwXjDnR99T8= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Modify the following configuration lines in DUT0 :
set interfaces pppoe pppoe0 access-concentrator myac
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------------------- pppoe0 192.168.100.3/32 up up fe80::4142:c47b:560:46b4/128
Test PPPoE With Tunnel Interface
Description
Checks PPPoE interface with GRE tunnel configured over PPPoE. This test verifies that a GRE tunnel can be established using the PPPoE interface as the local interface.
Scenario
Note
Configure PPPoE server with PAP authentication
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1/R7IVNG1QBElrnk1KaNsmN6XMsMEmSmoo= set interfaces pppoe pppoe0 base-interface ethernet eth0 set interfaces tunnel tun0 address 10.10.10.200/24 set interfaces tunnel tun0 encapsulation gre set interfaces tunnel tun0 ppp-interface pppoe0 set interfaces tunnel tun0 remote-address 192.168.100.1 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system offload disable
Step 2: Modify the following configuration lines in DUT0 :
set interfaces pppoe pppoe0 local-address 192.168.100.100
Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
-------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description -------------------------------------------------------------------- pppoe0 192.168.100.100/32 up up fe80::6d59:7155:9b92:3428/128
Note
Verify tunnel interface configuration
Step 4: Run command interfaces tunnel tun0 show detailed at DUT0 and check if output contains the following tokens:
10.10.10.200Show output
--------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr --------------------------------------------------------------------------------------------------------- tun0 1259 10.10.10.200/24 up up up 1468 pppoe0 tunnel 192.168.100.100 fe80::5efe:c0a8:6464/64
Step 5: Run command interfaces tunnel tun0 show detailed at DUT0 and check if output contains the following tokens:
upShow output
--------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr --------------------------------------------------------------------------------------------------------- tun0 1259 10.10.10.200/24 up up up 1468 pppoe0 tunnel 192.168.100.100 fe80::5efe:c0a8:6464/64
Test PPPoE With DNS Forwarding
Description
Checks PPPoE interface with DNS forwarding service configured. This test verifies that DNS forwarding can be enabled on the PPPoE interface and properly resolves DNS queries.
Scenario
Note
Configure PPPoE server with PAP authentication and DNS server
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX19jCCQrx+oMcxZne/UI+OXgz/aWqd7KUpE= set interfaces pppoe pppoe0 base-interface ethernet eth0 set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set service dns forwarding ppp interface pppoe0 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
-------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description -------------------------------------------------------------------- pppoe0 192.168.100.3/32 up up fe80::fde2:7e81:11b8:7506/128
Note
Google IP is 8.8.8.8
Step 3: Ping IP address 8.8.8.8 from DUT0:
admin@DUT0$ ping 8.8.8.8 count 1 size 56 timeout 1Show output
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data. 64 bytes from 8.8.8.8: icmp_seq=1 ttl=110 time=4.78 ms --- 8.8.8.8 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 4.776/4.776/4.776/0.000 ms
Test Events
Description
Checks that PPPoE negotiation events are visible in the system journal when logging is enabled. This test verifies that PPPoE appear in the journal.
Scenario
Note
Configure PPPoE server with PAP authentication
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set interfaces pppoe pppoe0 authentication protocol pap set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+7KNLfhPS0wqtjp2UswjEk/BeN8nx4iEg= set interfaces pppoe pppoe0 base-interface ethernet eth0 set interfaces pppoe pppoe0 logging detailed set protocols static route 0.0.0.0/0 next-hop 10.215.168.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:
upShow output
-------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description -------------------------------------------------------------------- pppoe0 192.168.100.2/32 up up fe80::3582:b8a2:e9d2:aa48/128
Step 3: Run command system journal show | cat at DUT0 and check if output contains the following tokens:
pppdShow output
Apr 17 00:22:40.407114 osdx systemd-journald[126917]: Runtime Journal (/run/log/journal/a3fecc5be5e949c7a083b0adeea4bb21) is 1.9M, max 13.8M, 11.8M free. Apr 17 00:22:40.410881 osdx systemd-journald[126917]: Received client request to rotate journal, rotating. Apr 17 00:22:40.410982 osdx systemd-journald[126917]: Vacuuming done, freed 0B of archived journals from /run/log/journal/a3fecc5be5e949c7a083b0adeea4bb21. Apr 17 00:22:40.420000 osdx OSDxCLI[1117731]: User 'admin' executed a new command: 'system journal clear'. Apr 17 00:22:40.666181 osdx OSDxCLI[1117731]: User 'admin' executed a new command: 'system coredump delete all'. Apr 17 00:22:41.030015 osdx OSDxCLI[1117731]: User 'admin' entered the configuration menu. Apr 17 00:22:41.184320 osdx OSDxCLI[1117731]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'. Apr 17 00:22:41.277385 osdx OSDxCLI[1117731]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'. Apr 17 00:22:41.343878 osdx OSDxCLI[1117731]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 base-interface ethernet eth0'. Apr 17 00:22:41.445436 osdx OSDxCLI[1117731]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 authentication protocol pap'. Apr 17 00:22:41.554946 osdx OSDxCLI[1117731]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 authentication user myuser password ******'. Apr 17 00:22:41.695580 osdx OSDxCLI[1117731]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 logging detailed'. Apr 17 00:22:41.768164 osdx OSDxCLI[1117731]: User 'admin' added a new cfg line: 'show working'. Apr 17 00:22:41.850748 osdx ubnt-cfgd[1139036]: inactive Apr 17 00:22:41.875496 osdx INFO[1139044]: FRR daemons did not change Apr 17 00:22:41.906865 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0 Apr 17 00:22:41.948851 osdx WARNING[1139113]: No supported link modes on interface eth0 Apr 17 00:22:41.950948 osdx modulelauncher[1139113]: osdx.utils.xos cmd error: /sbin/ethtool -A eth0 autoneg on Apr 17 00:22:41.950966 osdx modulelauncher[1139113]: Command '/sbin/ethtool -A eth0 autoneg on' returned non-zero exit status 76. Apr 17 00:22:41.952163 osdx modulelauncher[1139113]: osdx.utils.xos cmd error: /sbin/ethtool -s eth0 autoneg on advertise Pause off Asym_Pause off -- Apr 17 00:22:41.952172 osdx modulelauncher[1139113]: Command '/sbin/ethtool -s eth0 autoneg on advertise Pause off Asym_Pause off --' returned non-zero exit status 75. Apr 17 00:22:41.977910 osdx pppd[1139135]: Plugin rp-pppoe.so loaded. Apr 17 00:22:42.011386 osdx pppd[1139136]: pppd 2.4.9 started by root, uid 0 Apr 17 00:22:42.011809 osdx pppd[1139136]: Renamed interface ppp0 to pppoe0 Apr 17 00:22:42.011816 osdx pppd[1139136]: Using interface pppoe0 Apr 17 00:22:42.014877 osdx kernel: pppoe0: renamed from ppp0 Apr 17 00:22:42.018301 osdx (udev-worker)[1139139]: Network interface NamePolicy= disabled on kernel command line. Apr 17 00:22:42.042894 osdx pppd[1139136]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12 Apr 17 00:22:42.042899 osdx pppd[1139136]: dst ff:ff:ff:ff:ff:ff src de:ad:be:ef:6c:00 Apr 17 00:22:42.042902 osdx pppd[1139136]: [service-name] [host-uniq c0 61 11 00] Apr 17 00:22:42.043396 osdx pppd[1139136]: Recv PPPOE Discovery V1T1 PADO session 0x0 length 57 Apr 17 00:22:42.043400 osdx pppd[1139136]: dst de:ad:be:ef:6c:00 src fe:30:0e:bf:ec:84 Apr 17 00:22:42.043403 osdx pppd[1139136]: [AC-name osdx-tests-prod-1] [service-name] [AC-cookie bb 47 09 41 2c 6b 82 84 0e 85 8d 95 17 f9 27 fe 99 02 01 00] [host-uniq c0 61 11 00] Apr 17 00:22:42.043407 osdx pppd[1139136]: Send PPPOE Discovery V1T1 PADR session 0x0 length 36 Apr 17 00:22:42.043409 osdx pppd[1139136]: dst fe:30:0e:bf:ec:84 src de:ad:be:ef:6c:00 Apr 17 00:22:42.043412 osdx pppd[1139136]: [service-name] [host-uniq c0 61 11 00] [AC-cookie bb 47 09 41 2c 6b 82 84 0e 85 8d 95 17 f9 27 fe 99 02 01 00] Apr 17 00:22:42.043613 osdx pppd[1139136]: Recv PPPOE Discovery V1T1 PADS session 0x1 length 12 Apr 17 00:22:42.043616 osdx pppd[1139136]: dst de:ad:be:ef:6c:00 src fe:30:0e:bf:ec:84 Apr 17 00:22:42.043618 osdx pppd[1139136]: [service-name] [host-uniq c0 61 11 00] Apr 17 00:22:42.043621 osdx pppd[1139136]: PADS: Service-Name: '' Apr 17 00:22:42.043623 osdx pppd[1139136]: PPP session is 1 Apr 17 00:22:42.047221 osdx cfgd[1833]: [1117731]Completed change to active configuration Apr 17 00:22:42.060786 osdx OSDxCLI[1117731]: User 'admin' committed the configuration. Apr 17 00:22:42.062907 osdx pppd[1139136]: Connected to fe:30:0e:bf:ec:84 via interface eth0 Apr 17 00:22:42.062930 osdx pppd[1139136]: using channel 17 Apr 17 00:22:42.062941 osdx pppd[1139136]: Connect: pppoe0 <--> eth0 Apr 17 00:22:42.062948 osdx pppd[1139136]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0x4ccebd86>] Apr 17 00:22:42.095428 osdx OSDxCLI[1117731]: User 'admin' left the configuration menu. Apr 17 00:22:42.239816 osdx OSDxCLI[1117731]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'. Apr 17 00:22:43.047056 osdx pppd[1139136]: rcvd [LCP ConfReq id=0x1 <mru 1492> <auth pap> <magic 0xeb20c695>] Apr 17 00:22:43.047069 osdx pppd[1139136]: sent [LCP ConfAck id=0x1 <mru 1492> <auth pap> <magic 0xeb20c695>] Apr 17 00:22:43.857465 osdx pppd[1139136]: rcvd [LCP TermReq id=0x3 "User request"] Apr 17 00:22:43.857475 osdx pppd[1139136]: sent [LCP TermAck id=0x3] Apr 17 00:22:44.369447 osdx OSDxCLI[1117731]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'. Apr 17 00:22:45.064205 osdx pppd[1139136]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0x4ccebd86>] Apr 17 00:22:45.064410 osdx pppd[1139136]: rcvd [LCP ConfAck id=0x1 <mru 1492> <magic 0x4ccebd86>] Apr 17 00:22:46.047666 osdx pppd[1139136]: rcvd [LCP ConfReq id=0x1 <mru 1492> <auth pap> <magic 0xeb20c695>] Apr 17 00:22:46.047676 osdx pppd[1139136]: sent [LCP ConfAck id=0x1 <mru 1492> <auth pap> <magic 0xeb20c695>] Apr 17 00:22:46.047770 osdx pppd[1139136]: sent [LCP EchoReq id=0x0 magic=0x4ccebd86] Apr 17 00:22:46.047791 osdx pppd[1139136]: sent [PAP AuthReq id=0x1 user="myuser" password=<hidden>] Apr 17 00:22:46.047833 osdx pppd[1139136]: rcvd [LCP EchoReq id=0x0 magic=0xeb20c695] Apr 17 00:22:46.047836 osdx pppd[1139136]: sent [LCP EchoRep id=0x0 magic=0x4ccebd86] Apr 17 00:22:46.047849 osdx pppd[1139136]: rcvd [LCP EchoRep id=0x0 magic=0xeb20c695] Apr 17 00:22:46.047913 osdx pppd[1139136]: rcvd [PAP AuthAck id=0x1 "Login ok"] Apr 17 00:22:46.047916 osdx pppd[1139136]: Remote message: Login ok Apr 17 00:22:46.047918 osdx pppd[1139136]: PAP authentication succeeded Apr 17 00:22:46.047921 osdx pppd[1139136]: peer from calling number FE:30:0E:BF:EC:84 authorized Apr 17 00:22:46.047929 osdx pppd[1139136]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0>] Apr 17 00:22:46.047944 osdx pppd[1139136]: sent [IPV6CP ConfReq id=0x1 <addr fe80::3582:b8a2:e9d2:aa48>] Apr 17 00:22:46.048096 osdx pppd[1139136]: rcvd [CCP ConfReq id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>] Apr 17 00:22:46.048102 osdx pppd[1139136]: sent [CCP ConfReq id=0x1] Apr 17 00:22:46.048110 osdx pppd[1139136]: sent [CCP ConfRej id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>] Apr 17 00:22:46.048120 osdx pppd[1139136]: rcvd [IPCP ConfReq id=0x1 <compress VJ 0f 01> <addr 192.168.100.1>] Apr 17 00:22:46.048124 osdx pppd[1139136]: sent [IPCP ConfRej id=0x1 <compress VJ 0f 01>] Apr 17 00:22:46.048140 osdx pppd[1139136]: rcvd [IPV6CP ConfReq id=0x1 <addr fe80::98d7:9d1b:1020:4b5e>] Apr 17 00:22:46.048144 osdx pppd[1139136]: sent [IPV6CP ConfAck id=0x1 <addr fe80::98d7:9d1b:1020:4b5e>] Apr 17 00:22:46.048157 osdx pppd[1139136]: rcvd [IPCP ConfNak id=0x1 <addr 192.168.100.2>] Apr 17 00:22:46.048162 osdx pppd[1139136]: sent [IPCP ConfReq id=0x2 <addr 192.168.100.2>] Apr 17 00:22:46.048170 osdx pppd[1139136]: rcvd [IPV6CP ConfAck id=0x1 <addr fe80::3582:b8a2:e9d2:aa48>] Apr 17 00:22:46.048348 osdx pppd[1139136]: local LL address fe80::3582:b8a2:e9d2:aa48 Apr 17 00:22:46.048355 osdx pppd[1139136]: remote LL address fe80::98d7:9d1b:1020:4b5e Apr 17 00:22:46.048674 osdx pppd[1139136]: Script /etc/ppp/ipv6-up started (pid 1139206) Apr 17 00:22:46.048698 osdx pppd[1139136]: rcvd [CCP ConfAck id=0x1] Apr 17 00:22:46.048708 osdx pppd[1139136]: rcvd [CCP ConfReq id=0x2] Apr 17 00:22:46.048711 osdx pppd[1139136]: sent [CCP ConfAck id=0x2] Apr 17 00:22:46.048730 osdx pppd[1139136]: rcvd [IPCP ConfReq id=0x2 <addr 192.168.100.1>] Apr 17 00:22:46.048733 osdx pppd[1139136]: sent [IPCP ConfAck id=0x2 <addr 192.168.100.1>] Apr 17 00:22:46.048744 osdx pppd[1139136]: rcvd [IPCP ConfAck id=0x2 <addr 192.168.100.2>] Apr 17 00:22:46.049489 osdx pppd[1139136]: Script /etc/ppp/ip-pre-up started (pid 1139207) Apr 17 00:22:46.051829 osdx pppd[1139136]: Script /etc/ppp/ip-pre-up finished (pid 1139207), status = 0x0 Apr 17 00:22:46.051865 osdx pppd[1139136]: local IP address 192.168.100.2 Apr 17 00:22:46.051868 osdx pppd[1139136]: remote IP address 192.168.100.1 Apr 17 00:22:46.052162 osdx pppd[1139136]: Script /etc/ppp/ip-up started (pid 1139211) Apr 17 00:22:46.052186 osdx pppd[1139136]: Script /etc/ppp/ipv6-up finished (pid 1139206), status = 0x0 Apr 17 00:22:46.122152 osdx pppd[1139136]: Script /etc/ppp/ip-up finished (pid 1139211), status = 0x0 Apr 17 00:22:46.490832 osdx OSDxCLI[1117731]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'.