Pppoe

Test to check PPPoE interface.

Test PAP Authentication

Description

Checks PPPoE interface with PAP authentication.

Scenario

Note

Configure PPPoE server with PAP authentication

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18QtanB/4RwGnMIL1TxXDsEipWR8sdOrqg=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
-------------------------------------------------------
 Name      IP Address     Admin  Oper  Vrf  Description
-------------------------------------------------------
pppoe0  192.168.100.2/32  up     up

Test CHAP Authentication

Description

Checks PPPoE interface with CHAP authentication.

Scenario

Note

Configure PPPoE server with CHAP authentication

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol chap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18yVGyGlfoneDy/RVif9dD4b/I+66lcfbU=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
-------------------------------------------------------
 Name      IP Address     Admin  Oper  Vrf  Description
-------------------------------------------------------
pppoe0  192.168.100.2/32  up     up

Test Local Address

Description

Checks PPPoE interface with a configured local IPv4 address.

Scenario

Note

Configure PPPoE server

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+O75ARiaBx9cWMFRFqn2n5HdTI4B0A3uI=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

set interfaces pppoe pppoe0 local-address 192.168.100.100

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

192.168.100.100
Show output
---------------------------------------------------------
 Name       IP Address      Admin  Oper  Vrf  Description
---------------------------------------------------------
pppoe0  192.168.100.100/32  up     up

Step 4: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
---------------------------------------------------------
 Name       IP Address      Admin  Oper  Vrf  Description
---------------------------------------------------------
pppoe0  192.168.100.100/32  up     up

Note

Connectivity verification is not performed as the interface lacks IPv4 addressing and the IPv6 address is only an identifier


Test Local Identifier

Description

Checks PPPoE interface with a configured local IPv6 identifier.

Scenario

Note

Configure PPPoE server

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18MIDQmDIa/3bRsQfDqO+K5p3Vj+OvA6jU=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

set interfaces pppoe pppoe0 local-identifier '::100'

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

::100
Show output
-------------------------------------------------------
 Name      IP Address     Admin  Oper  Vrf  Description
-------------------------------------------------------
pppoe0  192.168.100.3/32  up     up
        fe80::100/128

Step 4: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
-------------------------------------------------------
 Name      IP Address     Admin  Oper  Vrf  Description
-------------------------------------------------------
pppoe0  192.168.100.3/32  up     up
        fe80::100/128

Test Ethernet VIF Interface

Description

Checks PPPoE interface with an Ethernet VIF interface as the base interface.

Scenario

Note

Configure PPPoE server with VLAN 100 support

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18poAWdDZ6GGgITFRhR1n9QjYsRavEn3p4=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vif 100
set interfaces pppoe pppoe0 base-interface ethernet eth0 vif 100

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.2/32               up     up
        fe80::40f0:8d06:725c:6645/128

Test Bridge Interface

Description

Checks PPPoE interface with a Bridge interface as the base interface.

Scenario

Note

Configure PPPoE server

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+xFeOwdI/yaogSm7PyUH3WXtPKQGwL8cQ=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

delete interfaces pppoe pppoe0 base-interface ethernet
set interfaces bridge br0
set interfaces ethernet eth1 bridge-group bridge br0
set interfaces pppoe pppoe0 base-interface bridge br0

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.3/32               up     up
        fe80::f831:cf3d:caa7:da92/128

Test Bridge VIF Interface

Description

Checks PPPoE interface with a Bridge VIF interface as the base interface.

Scenario

Note

Configure PPPoE server with VLAN 100 support

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18xCQHlOip1fJMO5NKQXB5NdCPm3KVus2Y=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

delete interfaces pppoe pppoe0 base-interface ethernet
set interfaces bridge br0 vif 100
set interfaces bridge br0 vlan 100
set interfaces ethernet eth1 bridge-group bridge br0
set interfaces ethernet eth1 bridge-group vlan 100
set interfaces pppoe pppoe0 base-interface bridge br0 vif 100

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.2/32               up     up
        fe80::c4e7:2a85:a657:4cda/128

Test Access Concentrator

Description

Checks PPPoE interface with an access concentrator. An access concentrator is a device that aggregates PPPoE sessions from multiple clients.

Scenario

Note

Configure PPPoE server with an access concentrator.

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX18FAmveJaWxY2dGhzHvasJNlCdv9F1fV2Q=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Modify the following configuration lines in DUT0 :

set interfaces pppoe pppoe0 access-concentrator myac

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.3/32               up     up
        fe80::bd29:552b:d157:4293/128

Test PPPoE With Tunnel Interface

Description

Checks PPPoE interface with GRE tunnel configured over PPPoE. This test verifies that a GRE tunnel can be established using the PPPoE interface as the local interface.

Scenario

Note

Configure PPPoE server with PAP authentication

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1+C16jFTEchFMcLDmxZ50xa6v0L0yp7OYg=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set interfaces tunnel tun0 address 10.10.10.200/24
set interfaces tunnel tun0 encapsulation gre
set interfaces tunnel tun0 ppp-interface pppoe0
set interfaces tunnel tun0 remote-address 192.168.100.1
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system offload disable

Step 2: Modify the following configuration lines in DUT0 :

set interfaces pppoe pppoe0 local-address 192.168.100.100

Step 3: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.100/32             up     up
        fe80::b197:353d:b560:8ac7/128

Note

Verify tunnel interface configuration

Step 4: Run command interfaces tunnel tun0 show detailed at DUT0 and check if output contains the following tokens:

10.10.10.200
Show output
--------------------------------------------------------------------------------------------------------
Name  Idx        IP Address         Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type      Phys addr
--------------------------------------------------------------------------------------------------------
tun0  39   10.10.10.200/24          up     up    up    1468              pppoe0  tunnel  192.168.100.100
           fe80::5efe:c0a8:6464/64

Step 5: Run command interfaces tunnel tun0 show detailed at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------------------------------------------
Name  Idx        IP Address         Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type      Phys addr
--------------------------------------------------------------------------------------------------------
tun0  39   10.10.10.200/24          up     up    up    1468              pppoe0  tunnel  192.168.100.100
           fe80::5efe:c0a8:6464/64

Test PPPoE With DNS Forwarding

Description

Checks PPPoE interface with DNS forwarding service configured. This test verifies that DNS forwarding can be enabled on the PPPoE interface and properly resolves DNS queries.

Scenario

Note

Configure PPPoE server with PAP authentication and DNS server

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX1/55O50RPsLPBwPcQyu4jSkFlCEkHlnmmU=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set service dns forwarding ppp interface pppoe0
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
--------------------------------------------------------------------
 Name            IP Address            Admin  Oper  Vrf  Description
--------------------------------------------------------------------
pppoe0  192.168.100.3/32               up     up
        fe80::91d3:e8a1:151f:2622/128

Note

Google IP is 8.8.8.8

Step 3: Ping IP address 8.8.8.8 from DUT0:

admin@DUT0$ ping 8.8.8.8 count 1 size 56 timeout 1
Show output
PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data.
64 bytes from 8.8.8.8: icmp_seq=1 ttl=109 time=5.66 ms

--- 8.8.8.8 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 5.663/5.663/5.663/0.000 ms

Test Events

Description

Checks that PPPoE negotiation events are visible in the system journal when logging is enabled. This test verifies that PPPoE appear in the journal.

Scenario

Note

Configure PPPoE server with PAP authentication

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 10.215.168.64/24
set interfaces pppoe pppoe0 authentication protocol pap
set interfaces pppoe pppoe0 authentication user myuser encrypted-password U2FsdGVkX19Bex9qxxAZOLgsmiUskD7vpSaHZXVhJu0=
set interfaces pppoe pppoe0 base-interface ethernet eth0
set interfaces pppoe pppoe0 logging detailed
set protocols static route 0.0.0.0/0 next-hop 10.215.168.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces pppoe pppoe0 show at DUT0 and check if output contains the following tokens:

up
Show output
-------------------------------------------------------------------
 Name            IP Address           Admin  Oper  Vrf  Description
-------------------------------------------------------------------
pppoe0  192.168.100.2/32              up     up
        fe80::dec:7bf1:bbc0:f003/128

Step 3: Run command system journal show | cat at DUT0 and check if output contains the following tokens:

pppd
Show output
May 04 17:51:34.302144 osdx systemd-journald[2014]: Runtime Journal (/run/log/journal/1e8013e85e2d44479555967b2b8c1b49) is 1.9M, max 13.8M, 11.8M free.
May 04 17:51:34.302995 osdx systemd-journald[2014]: Received client request to rotate journal, rotating.
May 04 17:51:34.303045 osdx systemd-journald[2014]: Vacuuming done, freed 0B of archived journals from /run/log/journal/1e8013e85e2d44479555967b2b8c1b49.
May 04 17:51:34.312367 osdx OSDxCLI[4873]: User 'admin' executed a new command: 'system journal clear'.
May 04 17:51:34.516960 osdx OSDxCLI[4873]: User 'admin' executed a new command: 'system coredump delete all'.
May 04 17:51:34.827010 osdx OSDxCLI[4873]: User 'admin' entered the configuration menu.
May 04 17:51:34.908258 osdx OSDxCLI[4873]: User 'admin' added a new cfg line: 'set interfaces ethernet eth0 address 10.215.168.64/24'.
May 04 17:51:34.981767 osdx OSDxCLI[4873]: User 'admin' added a new cfg line: 'set protocols static route 0.0.0.0/0 next-hop 10.215.168.1'.
May 04 17:51:35.038846 osdx OSDxCLI[4873]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 base-interface ethernet eth0'.
May 04 17:51:35.131813 osdx OSDxCLI[4873]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 authentication protocol pap'.
May 04 17:51:35.197718 osdx OSDxCLI[4873]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 authentication user myuser password ******'.
May 04 17:51:35.279316 osdx OSDxCLI[4873]: User 'admin' added a new cfg line: 'set interfaces pppoe pppoe0 logging detailed'.
May 04 17:51:35.350099 osdx OSDxCLI[4873]: User 'admin' added a new cfg line: 'show working'.
May 04 17:51:35.445553 osdx ubnt-cfgd[12831]: inactive
May 04 17:51:35.476257 osdx INFO[12839]: FRR daemons did not change
May 04 17:51:35.507021 osdx kernel: 8021q: adding VLAN 0 to HW filter on device eth0
May 04 17:51:35.553242 osdx WARNING[12908]: No supported link modes on interface eth0
May 04 17:51:35.554608 osdx modulelauncher[12908]: osdx.utils.xos cmd error: /sbin/ethtool -A eth0 autoneg on
May 04 17:51:35.554619 osdx modulelauncher[12908]: Command '/sbin/ethtool -A eth0 autoneg on' returned non-zero exit status 76.
May 04 17:51:35.555710 osdx modulelauncher[12908]: osdx.utils.xos cmd error: /sbin/ethtool -s eth0 autoneg on advertise Pause off Asym_Pause off --
May 04 17:51:35.555719 osdx modulelauncher[12908]: Command '/sbin/ethtool -s eth0 autoneg on advertise Pause off Asym_Pause off --' returned non-zero exit status 75.
May 04 17:51:35.580996 osdx pppd[12930]: Plugin rp-pppoe.so loaded.
May 04 17:51:35.627528 osdx pppd[12931]: pppd 2.4.9 started by root, uid 0
May 04 17:51:35.629228 osdx pppd[12931]: Renamed interface ppp0 to pppoe0
May 04 17:51:35.629242 osdx pppd[12931]: Using interface pppoe0
May 04 17:51:35.631019 osdx kernel: pppoe0: renamed from ppp0
May 04 17:51:35.637099 osdx (udev-worker)[12935]: Network interface NamePolicy= disabled on kernel command line.
May 04 17:51:35.647033 osdx pppd[12931]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
May 04 17:51:35.647038 osdx pppd[12931]:  dst ff:ff:ff:ff:ff:ff  src de:ad:be:ef:6c:00
May 04 17:51:35.647040 osdx pppd[12931]:  [service-name] [host-uniq  83 32 00 00]
May 04 17:51:35.647219 osdx pppd[12931]: Recv PPPOE Discovery V1T1 PADO session 0x0 length 57
May 04 17:51:35.647222 osdx pppd[12931]:  dst de:ad:be:ef:6c:00  src fe:04:aa:25:a3:32
May 04 17:51:35.647225 osdx pppd[12931]:  [AC-name osdx-tests-prod-1] [service-name] [AC-cookie  e3 5d 7e e1 87 e9 ef 6c 63 c0 5d 32 8b 66 66 76 72 0d 00 00] [host-uniq  83 32 00 00]
May 04 17:51:35.647228 osdx pppd[12931]: Send PPPOE Discovery V1T1 PADR session 0x0 length 36
May 04 17:51:35.647231 osdx pppd[12931]:  dst fe:04:aa:25:a3:32  src de:ad:be:ef:6c:00
May 04 17:51:35.647233 osdx pppd[12931]:  [service-name] [host-uniq  83 32 00 00] [AC-cookie  e3 5d 7e e1 87 e9 ef 6c 63 c0 5d 32 8b 66 66 76 72 0d 00 00]
May 04 17:51:35.647411 osdx pppd[12931]: Recv PPPOE Discovery V1T1 PADS session 0x1 length 12
May 04 17:51:35.647414 osdx pppd[12931]:  dst de:ad:be:ef:6c:00  src fe:04:aa:25:a3:32
May 04 17:51:35.647416 osdx pppd[12931]:  [service-name] [host-uniq  83 32 00 00]
May 04 17:51:35.647418 osdx pppd[12931]: PADS: Service-Name: ''
May 04 17:51:35.647421 osdx pppd[12931]: PPP session is 1
May 04 17:51:35.659229 osdx cfgd[1648]: [4873]Completed change to active configuration
May 04 17:51:35.670230 osdx OSDxCLI[4873]: User 'admin' committed the configuration.
May 04 17:51:35.675035 osdx pppd[12931]: Connected to fe:04:aa:25:a3:32 via interface eth0
May 04 17:51:35.675058 osdx pppd[12931]: using channel 17
May 04 17:51:35.675070 osdx pppd[12931]: Connect: pppoe0 <--> eth0
May 04 17:51:35.675076 osdx pppd[12931]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0x4ea0ae88>]
May 04 17:51:35.685974 osdx OSDxCLI[4873]: User 'admin' left the configuration menu.
May 04 17:51:35.807279 osdx OSDxCLI[4873]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'.
May 04 17:51:36.651360 osdx pppd[12931]: rcvd [LCP ConfReq id=0x1 <mru 1492> <auth pap> <magic 0x5e6ae919>]
May 04 17:51:36.651370 osdx pppd[12931]: sent [LCP ConfAck id=0x1 <mru 1492> <auth pap> <magic 0x5e6ae919>]
May 04 17:51:37.660489 osdx pppd[12931]: rcvd [LCP TermReq id=0x3 "User request"]
May 04 17:51:37.660498 osdx pppd[12931]: sent [LCP TermAck id=0x3]
May 04 17:51:37.882803 osdx OSDxCLI[4873]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'.
May 04 17:51:38.675345 osdx pppd[12931]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0x4ea0ae88>]
May 04 17:51:38.675535 osdx pppd[12931]: rcvd [LCP ConfAck id=0x1 <mru 1492> <magic 0x4ea0ae88>]
May 04 17:51:39.652121 osdx pppd[12931]: rcvd [LCP ConfReq id=0x1 <mru 1492> <auth pap> <magic 0x5e6ae919>]
May 04 17:51:39.652130 osdx pppd[12931]: sent [LCP ConfAck id=0x1 <mru 1492> <auth pap> <magic 0x5e6ae919>]
May 04 17:51:39.652180 osdx pppd[12931]: sent [LCP EchoReq id=0x0 magic=0x4ea0ae88]
May 04 17:51:39.652193 osdx pppd[12931]: sent [PAP AuthReq id=0x1 user="myuser" password=<hidden>]
May 04 17:51:39.652424 osdx pppd[12931]: rcvd [LCP EchoReq id=0x0 magic=0x5e6ae919]
May 04 17:51:39.652430 osdx pppd[12931]: sent [LCP EchoRep id=0x0 magic=0x4ea0ae88]
May 04 17:51:39.652440 osdx pppd[12931]: rcvd [LCP EchoRep id=0x0 magic=0x5e6ae919]
May 04 17:51:39.652445 osdx pppd[12931]: rcvd [PAP AuthAck id=0x1 "Login ok"]
May 04 17:51:39.652447 osdx pppd[12931]: Remote message: Login ok
May 04 17:51:39.652451 osdx pppd[12931]: PAP authentication succeeded
May 04 17:51:39.652454 osdx pppd[12931]: peer from calling number FE:04:AA:25:A3:32 authorized
May 04 17:51:39.652465 osdx pppd[12931]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0>]
May 04 17:51:39.652475 osdx pppd[12931]: sent [IPV6CP ConfReq id=0x1 <addr fe80::0dec:7bf1:bbc0:f003>]
May 04 17:51:39.652486 osdx pppd[12931]: rcvd [CCP ConfReq id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>]
May 04 17:51:39.652489 osdx pppd[12931]: sent [CCP ConfReq id=0x1]
May 04 17:51:39.652499 osdx pppd[12931]: sent [CCP ConfRej id=0x1 <deflate 15> <deflate(old#) 15> <bsd v1 15>]
May 04 17:51:39.652510 osdx pppd[12931]: rcvd [IPCP ConfReq id=0x1 <compress VJ 0f 01> <addr 192.168.100.1>]
May 04 17:51:39.652513 osdx pppd[12931]: sent [IPCP ConfRej id=0x1 <compress VJ 0f 01>]
May 04 17:51:39.652523 osdx pppd[12931]: rcvd [IPV6CP ConfReq id=0x1 <addr fe80::cc21:e116:3470:8c4e>]
May 04 17:51:39.652527 osdx pppd[12931]: sent [IPV6CP ConfAck id=0x1 <addr fe80::cc21:e116:3470:8c4e>]
May 04 17:51:39.652567 osdx pppd[12931]: rcvd [IPCP ConfNak id=0x1 <addr 192.168.100.2>]
May 04 17:51:39.652570 osdx pppd[12931]: sent [IPCP ConfReq id=0x2 <addr 192.168.100.2>]
May 04 17:51:39.652580 osdx pppd[12931]: rcvd [IPV6CP ConfAck id=0x1 <addr fe80::0dec:7bf1:bbc0:f003>]
May 04 17:51:39.652706 osdx pppd[12931]: local  LL address fe80::0dec:7bf1:bbc0:f003
May 04 17:51:39.652709 osdx pppd[12931]: remote LL address fe80::cc21:e116:3470:8c4e
May 04 17:51:39.652834 osdx staticd[1594]: [G308J-GJ9KQ][EC 100663301] interface pppoe0 address fe80::dec:7bf1:bbc0:f003/128 with peer flag set, but no peer address!
May 04 17:51:39.652953 osdx pppd[12931]: Script /etc/ppp/ipv6-up started (pid 13001)
May 04 17:51:39.652970 osdx pppd[12931]: rcvd [CCP ConfAck id=0x1]
May 04 17:51:39.652979 osdx pppd[12931]: rcvd [CCP ConfReq id=0x2]
May 04 17:51:39.652981 osdx pppd[12931]: sent [CCP ConfAck id=0x2]
May 04 17:51:39.652994 osdx pppd[12931]: rcvd [IPCP ConfReq id=0x2 <addr 192.168.100.1>]
May 04 17:51:39.652997 osdx pppd[12931]: sent [IPCP ConfAck id=0x2 <addr 192.168.100.1>]
May 04 17:51:39.653046 osdx pppd[12931]: rcvd [IPCP ConfAck id=0x2 <addr 192.168.100.2>]
May 04 17:51:39.653429 osdx pppd[12931]: Script /etc/ppp/ip-pre-up started (pid 13002)
May 04 17:51:39.655185 osdx pppd[12931]: Script /etc/ppp/ip-pre-up finished (pid 13002), status = 0x0
May 04 17:51:39.655206 osdx pppd[12931]: local  IP address 192.168.100.2
May 04 17:51:39.655208 osdx pppd[12931]: remote IP address 192.168.100.1
May 04 17:51:39.655365 osdx pppd[12931]: Script /etc/ppp/ip-up started (pid 13006)
May 04 17:51:39.655383 osdx pppd[12931]: Script /etc/ppp/ipv6-up finished (pid 13001), status = 0x0
May 04 17:51:39.714908 osdx pppd[12931]: Script /etc/ppp/ip-up finished (pid 13006), status = 0x0
May 04 17:51:39.971245 osdx OSDxCLI[4873]: User 'admin' executed a new command: 'interfaces pppoe pppoe0 show'.