Hi,
As mentioned in subject, I have a PPPoE connection over GPON, and it is not getting the DNS servers, even though it received the IP just fine.
Config:
firewall { all-ping enable broadcast-ping disable ipv6-receive-redirects disable ipv6-src-route disable ip-src-route disable log-martians enable name LAN_IN { default-action accept description "LAN to internal" rule 10 { action reject-tcp application { category P2P } description "Send TCP RST for P2P" protocol tcp } rule 20 { action reject application { category P2P } description "Send ICMP unreachable for P2P" } } name WAN_IN { default-action drop description "WAN to internal" rule 1 { action reject-tcp application { category TopSites-Adult } description "Reject adult websites" protocol tcp } rule 2 { action reject-tcp application { category P2P } description "Reject P2P" protocol tcp } rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 30 { action accept description "Allow icmp" log disable protocol icmp } } name WAN_LOCAL { default-action drop description "WAN to router" rule 10 { action accept description "Allow established/related" state { established enable related enable } } rule 20 { action drop description "Drop invalid state" state { invalid enable } } rule 30 { action accept description "Allow WAN access" destination { port 443 } log disable protocol tcp } rule 40 { action accept description "Allow icmp" protocol icmp } } name WAN_OUT { default-action accept description "internal to WAN" rule 10 { action reject-tcp application { category P2P } description "Send TCP RST for P2P" protocol tcp } rule 20 { action reject application { category P2P } description "Send ICMP unreachable for P2P" log disable } } options { mss-clamp { interface-type all mss 1412 } mss-clamp6 { interface-type all mss 1412 } } receive-redirects disable send-redirects enable source-validation disable syn-cookies enable } interfaces { ethernet eth0 { address 192.168.171.1/24 description "LAN 1" duplex auto firewall { in { name LAN_IN } } speed auto } ethernet eth1 { address 192.168.172.1/24 description "LAN 2" duplex auto firewall { in { name LAN_IN } } speed auto } ethernet eth2 { description Internet duplex auto pppoe 0 { default-route auto firewall { in { name WAN_IN } local { name WAN_LOCAL } out { name WAN_OUT } } mtu 1492 name-server auto password ****** user-id ******@******.com.sg } speed auto } loopback lo { } } port-forward { auto-firewall enable hairpin-nat enable lan-interface eth0 lan-interface eth1 rule 1 { description UniFi forward-to { address 192.168.171.3 port 8443 } original-port 18443 protocol tcp } rule 2 { description "Cloud Key" forward-to { address 192.168.171.3 port 443 } original-port **** protocol tcp } rule 3 { description "Managed Switch" forward-to { address 192.168.171.2 port 80 } original-port **** protocol tcp } rule 4 { description Xerox forward-to { address 192.168.171.10 port 80 } original-port **** protocol tcp } rule 5 { description CCTV forward-to { address 192.168.171.20 port 80 } original-port **** protocol tcp_udp } rule 6 { description CCTV2 forward-to { address 192.168.171.20 port **** } original-port **** protocol tcp_udp } wan-interface pppoe0 } service { dhcp-server { disabled false hostfile-update disable shared-network-name LAN1 { authoritative enable subnet 192.168.171.0/24 { default-router 192.168.171.1 dns-server 192.168.171.1 dns-server 8.8.8.8 lease 86400 start 192.168.171.50 { stop 192.168.171.199 } unifi-controller 192.168.171.3 } } shared-network-name LAN2 { authoritative enable subnet 192.168.172.0/24 { default-router 192.168.172.1 dns-server 192.168.172.1 dns-server 8.8.8.8 lease 86400 start 192.168.172.50 { stop 192.168.172.199 } unifi-controller 192.168.171.3 } } } dns { dynamic { interface pppoe0 { service dyndns { host-name ****.dyndns.org login **** password **** } } } forwarding { cache-size 150 listen-on eth0 listen-on eth1 } } gui { http-port 80 https-port 443 older-ciphers enable } nat { rule 5010 { description "masquerade for WAN" log disable outbound-interface pppoe0 protocol all type masquerade } } ssh { port 22 protocol-version v2 } } system { host-name **** login { user **** { authentication { encrypted-password **** } level admin } } name-server 203.116.0.36 name-server 203.116.1.78 name-server 8.8.8.8 name-server 8.8.4.4 ntp { server 0.ubnt.pool.ntp.org { } server 1.ubnt.pool.ntp.org { } server 2.ubnt.pool.ntp.org { } server 3.ubnt.pool.ntp.org { } } offload { hwnat disable ipv4 { forwarding enable pppoe enable } } syslog { global { facility all { level notice } facility protocols { level debug } } } time-zone Asia/Singapore traffic-analysis { dpi enable export enable } } /* Warning: Do not remove the following line. */ /* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */ /* Release version: v1.8.5.4884695.160608.1057 */
Running "show log all" gets this:
Jun 18 23:37:16 ****** pppd[1724]: pppd 2.4.4 started by root, uid 0 Jun 18 23:37:16 ****** pppd[1724]: Connected to 2c:54:**:**:**:** via interface eth2 Jun 18 23:37:16 ****** pppd[1724]: Connect: ppp0 <--> eth2 Jun 18 23:37:16 ****** pppd[1724]: PAP authentication succeeded Jun 18 23:37:16 ****** pppd[1724]: peer from calling number 2C:54:**:**:**:** authorized Jun 18 23:37:16 ****** pppd[1724]: Unsupported protocol 'IPv6 Control Protovol' (0x8057) received Jun 18 23:37:16 ****** pppd[1724]: local IP address 122.*.*.* Jun 18 23:37:16 ****** pppd[1724]: remote IP address 27.*.*.*
And /var/log/vyatta/ppp_pppoe0.log gets me this:
Sun Jun 19 01:20:20 SGT 2016: Starting PPP daemon for pppoe0 Connected to 2c:54:**:**:**:** via interface eth2 using channel 2 Starting negotiation on eth2 ioctl(SIOCSIFMTU): No such device sent [LCP ConfReq id=0x1 <mru 1492> <magic 0x25696421> <mrru 1492> <endpoint [MAC:04:18:**:**:**:**]>] rcvd [LCP ConfReq id=0x1 <mru 1492> <auth pap> <magic 0x58b724c3>] lcp_reqci: returning CONFACK. sent [LCP ConfAck id=0x1 <mru 1492> <auth pap> <magic 0x58b724c3>] rcvd [LCP ConfRej id=0x1 <mrru 1492>] sent [LCP ConfReq id=0x2 <mru 1492> <magic 0x25696421> <endpoint [MAC:04:18:**:**:**:**]>] rcvd [LCP ConfAck id=0x2 <mru 1492> <magic 0x25696421> <endpoint [MAC:04:18:**:**:**:**]>] ioctl(SIOCSIFMTU): No such device Couldn't get PPP statistics: No such device sent [LCP EchoReq id=0x0 magic=0x25696421] sent [PAP AuthReq id=0x1 user="****@****.com.sg" password=<hidden>] rcvd [LCP EchoRep id=0x0 magic=0x58b724c3] rcvd [PAP AuthAck id=0x1 ""] PAP authentication succeeded peer from calling number 2C:54:**:**:**:** authorized Using interface ppp0 sent [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns3 0.0.0.0>] rcvd [IPCP ConfReq id=0x1 <addr 27.*.*.*>] ipcp: returning Configure-ACK sent [IPCP ConfAck id=0x1 <addr 27.*.*.*>] rcvd [IPV6CP ConfReq id=0x1 <addr fe80::2e54:2dff:fe8c:4000>] Unsupported protocol 'IPv6 Control Protovol' (0x8057) received sent [LCP ProtRej id=0x3 80 57 01 01 00 0e 01 0a 2e 54 2d ff fe 8c 40 00] rcvd [IPCP ConfRej id=0x1 <ms-dns1 0.0.0.0> <ms-dns3 0.0.0.0>] sent [IPCP ConfReq id=0x2 <addr 0.0.0.0>] rcvd [IPCP ConfNak id=0x2 <addr 203.*.*.*>] sent [IPCP ConfReq id=0x3 <addr 203.*.*.*>] rcvd [IPCP ConfAck id=0x3 <addr 203.*.*.*>] ipcp: up Script /etc/ppp/ip-pre-up started (pid 7926) Script /etc/ppp/ip-pre-up finished (pid 7926), status = 0x0 local IP address 203.117.121.107 remote IP address 27.54.54.0 Script /etc/ppp/ip-up started (pid 7977) Script /etc/ppp/ip-up finished (pid 7977), status = 0x0
For now, I had to set a static DNS system wide for it to work.
When using a vanilla DLink DIR-868L I can receive the DNS server IPs with no issues. Is there some compatibility flags or something that I might have missed?
Any ideas?