Symbianize Forum

Most of our features and services are available only to members, so we encourage you to login or register a new account. Registration is free, fast and simple. You only need to provide a valid email. Being a member you'll gain access to all member forums and features, post a message to ask question or provide answer, and share or find resources related to mobile phones, tablets, computers, game consoles, and multimedia.

All that and more, so what are you waiting for, click the register button and join us now! Ito ang website na ginawa ng pinoy para sa pinoy!

Trams Base Station Banning Smart DV 235t

simple lng ang solusyon sa inyong mga problema.. fried and toasted ko na to..

1. change mac pem2 at key
2. change serial.

done!

sana gumana din sa inyo yan..

pag ayaw pa din..

ireprogram mo DV mo. i mean ndi spreader gagamitin mo.
Telnet codes ang gagamitin

boss pano yang reprogram via telnet codes na yan? salamat in advance sayo!
 
tignan nyo po yung logs. dun mo po makikita kung anong problem ng dv nyo.



Boss eto yung naobserve ko sa log na bago: loading secrets from "/etc/conf/ipsec.secrets"

Eto yung ipsec.secrets based sa mga website na to:
http://www.faqs.org/docs/securing/chap25sec204.html
https://wiki.strongswan.org/projects/strongswan/wiki/IpsecSecrets
http://linux.die.net/man/5/ipsec.secrets

D ko sure kung tama to, baka dyan naka lagay ung authencation between base station at mga units natin. Baka siguro ung iba wala ng pem at key yan na ang security na ginagamit. Base din dito:

http://security.stackexchange.com/questions/46340/how-does-ipsec-protect-against-ip-spoofing

Kahit ma spoof natin ung ip ng legit pero sabi "IPSec connection requires mutual authentication, which is a way to prove the identity of the entity behind the IP address" parang bali wala din kasi i-rereject sya ng BS kasi d sya legit.


Observe ko lng din sa log ay every minute naglalog ng ganito:
"Sending ACK to 10.5......" Parang laging nyang chinicheck ng base station ung unit natin at baka pag may di sya mahanap ng mga nakalagay authentication tulad ng sa legit ididisconnect nya ung unit na yun.


Baka di pa implemented sa lahat ng area kaya ung iba ok pa connection, pero ung sa iba connect-disconnect na ang problema.

Sana matulunagang mo kami Boss. Thanks
 
Last edited:
up natin to, marami ng basestation na ganito nangyayari, baka need na ng v8 firmware
 
ganitong ganito nararanasan ko 56 dbi ung signal biglang mag 100 tpos ma DDC

tpos coconnect sa frequency na mas malayo pero stable 80dbi

parang na banned yata ung dv ko sa specific frequency
 
gumana ba yan sayo bro? as in before talagang wala ung frequency then after mo ginawa ung config nka-scan na ulit ng nawalang frequency? TIA!

nung una humina ng humina rin yung signal na nasasagap ng dv ko hanggang sa nawala... sinubukan kong magpalit ng mac pem at key so balik -60 ulit signal nasa terrace na yung dv ko nyan... tapos after lunch nasa -68 na siya... so triny ko na magconfigure kasi nakita ko sa log na binabato pala ni dv yung mac(dv) plus mac(device) bale isang mahabang MAC tapos binabato rin yung DHCP IP ng device(192.168.15.2) as well as yung DNS (8.8.8.8) nito. kaya nag experiment ako sa 3 info na binabato ng dv sa basestation... nasa log lang mga kasagutan boss...
 
nung una humina ng humina rin yung signal na nasasagap ng dv ko hanggang sa nawala... sinubukan kong magpalit ng mac pem at key so balik -60 ulit signal nasa terrace na yung dv ko nyan... tapos after lunch nasa -68 na siya... so triny ko na magconfigure kasi nakita ko sa log na binabato pala ni dv yung mac(dv) plus mac(device) bale isang mahabang MAC tapos binabato rin yung DHCP IP ng device(192.168.15.2) as well as yung DNS (8.8.8.8) nito. kaya nag experiment ako sa 3 info na binabato ng dv sa basestation... nasa log lang mga kasagutan boss...

ah ganun ba.. lagi ko chinecheck ung logs pero wala naman akong nakikitang kaduda-duda.. ang laging error lng is "error 400 no channel available" hmmm.. ano kaya possible issue? tower kaya? sa ibang kakilala ko wala din mscan na frequency dito sa area namin, mapa legit or clone..
 
iloilo area mag 1omth na sabi daw ng engenier smart taas upgrade daw sila panay lte smart bat morethan 1months na iloilo desconnected but hindi lahat area iloilo

- - - Updated - - -

iloilo area mag 1omth na sabi daw ng engenier smart taas upgrade daw sila panay lte smart bat morethan 1months na iloilo desconnected but hindi lahat area iloilo

ito shar ko nakita ko logs ko pag reconnect ko ng dv235t smart
View attachment 183146View attachment 183147View attachment 183146

- - - Updated - - -

na kikita ko try ako ng isang dv reconnect ko smart tagal ng blink 1 signal bago connected, at saka logs miron na iba smart parang miron silang dinag dag or incode , ilang seconds lang ako connected at saka biglang nawala internet, but miron signal connected no browsing siya. ito logs ko




Aug 30 22:07:02 mt71x9 user.warn kernel: Must catchup 90 miliseconds.^M
Aug 30 22:07:02 mt71x9 daemon.info [WMXD]: WiMAX MAC Re-Init Reason Code = 202, Reason = "DREG_CMD air message"
Aug 30 22:07:03 mt71x9 daemon.info [WMXD]: WiMAX device state transition from READY to UNINITIALIZED
Aug 30 22:07:03 mt71x9 daemon.info [WMXD]: WiMAX device state transition from UNINITIALIZED to READY
Aug 30 22:07:03 mt71x9 daemon.info [WMXD]: WiMAX device state transition from READY to SCANNING
Aug 30 22:07:07 mt71x9 daemon.info [WMXD]: WiMAX device state transition from SCANNING to READY
Aug 30 22:07:08 mt71x9 daemon.info [WMXD]: WiMAX WAN is down, auto-reconnect WiMAX !!
Aug 30 22:07:10 mt71x9 daemon.info [WMXD]: WiMAX device state transition from READY to CONNECTING
Aug 30 22:07:15 mt71x9 daemon.info [WMXD]: WiMAX device state transition from CONNECTING to CONNECTED
Aug 30 22:07:16 mt71x9 local0.info udhcpc[4096]: udhcpc (v1.6.1) started
Aug 30 22:07:16 mt71x9 local0.info udhcpc[4096]: Sending discover...
Aug 30 22:07:16 mt71x9 local0.info udhcpc[4096]: Sending select for 10.11.5.158...
Aug 30 22:07:16 mt71x9 local0.info udhcpc[4096]: Lease of 10.11.5.158 obtained, lease time 86400
Aug 30 22:07:16 mt71x9 daemon.warn zebra[1297]: warning: interface wmx0 broadcast addr 10.11.63.255/8 != calculated 10.255.255.255, routing protocols may malfunction
Aug 30 22:07:18 mt71x9 user.info kernel: arp_tables: (C) 2002 David S. Miller
Aug 30 22:07:22 mt71x9 user.warn kernel: enable coexist
Aug 30 22:54:44 mt71x9 local0.info udhcpd[1264]: Received a SIGTERM
Aug 30 22:54:46 mt71x9 local0.info udhcpd[4394]: udhcpd (v1.6.1) started
Aug 30 22:54:46 mt71x9 local0.err udhcpd[4394]: max_leases value (254) not sane, setting to 253 instead
Aug 30 22:54:46 mt71x9 daemon.notice zebra[1297]: Terminating on signal
Aug 30 22:54:48 mt71x9 daemon.notice zebra[4409]: Zebra 0.98.6 starting: vty@2601
Aug 30 22:54:49 mt71x9 authpriv.warn ipsec_starter[4441]: Starting strongSwan 4.1.9 IPsec [starter]...
Aug 30 22:54:49 mt71x9 user.info kernel: NET: Registered protocol family 15
Aug 30 22:54:51 mt71x9 user.info kernel: Initializing XFRM netlink socket
Aug 30 22:54:53 mt71x9 authpriv.warn ipsec_starter[4493]: pluto too long to start... - kill kill
Aug 30 22:54:53 mt71x9 authpriv.warn ipsec_starter[4493]: pluto has died -- restart scheduled (5sec)
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: Starting Pluto (strongSwan Version 4.1.9 THREADS VENDORID)
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: including NAT-Traversal patch (Version 0.6c)
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: ike_alg: Activating OAKLEY_AES_CBC encryption: Ok
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: ike_alg: Activating OAKLEY_BLOWFISH_CBC encryption: Ok
ito na pansin ko deconnect ako ilang seconds lang
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: ike_alg: Activating OAKLEY_SERPENT_CBC encryption: Ok
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: ike_alg: Activating OAKLEY_SHA2_256 hash: Ok
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: ike_alg: Activating OAKLEY_SHA2_384 hash: Ok
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: ike_alg: Activating OAKLEY_SHA2_512 hash: Ok
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: ike_alg: Activating OAKLEY_TWOFISH_CBC encryption: Ok
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: ike_alg: Activating OAKLEY_TWOFISH_CBC_SSH encryption: Ok
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: Testing registered IKE encryption algorithms:
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_DES_CBC self-test not available
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_BLOWFISH_CBC self-test not available
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_3DES_CBC self-test not available
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_AES_CBC self-test not available
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_SERPENT_CBC self-test not available
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_TWOFISH_CBC self-test not available
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_TWOFISH_CBC_SSH self-test not available
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: Testing registered IKE hash algorithms:
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_MD5 hash self-test passed
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_MD5 hmac self-test passed
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_SHA hash self-test passed
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_SHA hmac self-test passed
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_SHA2_256 hash self-test passed
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_SHA2_256 hmac self-test passed
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_SHA2_384 hash self-test passed
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_SHA2_384 hmac self-test passed
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_SHA2_512 hash self-test passed
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: OAKLEY_SHA2_512 hmac self-test passed
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: All crypto self-tests passed
Aug 30 22:54:58 mt71x9 authpriv.warn pluto[4573]: Using Linux 2.6 IPsec interface code
Aug 30 22:55:06 mt71x9 user.info kernel: warning: `pluto' uses 32-bit capabilities (legacy support in use)
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: Could not change to directory '/etc/conf/ipsec.d/cacerts'
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: Could not change to directory '/etc/conf/ipsec.d/aacerts'
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: Could not change to directory '/etc/conf/ipsec.d/ocspcerts'
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: Could not change to directory '/etc/conf/ipsec.d/crls'
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: listening for IKE messages
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: adding interface br0/br0 192.168.15.1:500
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: adding interface br0/br0 192.168.15.1:4500
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: adding interface wmx0/wmx0 10.11.5.158:500
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: adding interface wmx0/wmx0 10.11.5.158:4500
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: adding interface vth0/vth0 169.254.71.9:500
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: adding interface vth0/vth0 169.254.71.9:4500
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: adding interface lo/lo 127.0.0.1:500
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: adding interface lo/lo 127.0.0.1:4500
Aug 30 22:55:06 mt71x9 authpriv.warn pluto[4573]: loading secrets from "/etc/conf/ipsec.secrets"
Aug 30 22:55:17 mt71x9 cron.notice crond[1769]: USER root pid 4810 cmd /etc/init.d/sp autoconnect
Aug 30 22:55:17 mt71x9 cron.notice crond[1769]: USER root pid 4812 cmd /sbin/sncfg set SW_RTC_TIMESTAMP `date -u +%m%d%H%M%Y.%S` ; /sbin/sncfg commit
Aug 30 22:55:17 mt71x9 daemon.info [CFGD]: /etc/sncfg/cwmp.cfg provisioned and translates to settings
Aug 30 22:55:17 mt71x9 daemon.info [CFGD]: /etc/sncfg/oma_dm.cfg provisioned and translates to settings
Aug 30 22:55:18 mt71x9 daemon.info [CFGD]: /etc/sncfg/swrtc.cfg provisioned and translates to settings
Aug 30 22:55:43 mt71x9 local0.info udhcpd[4394]: Sending OFFER of 192.168.15.2
Aug 30 22:55:43 mt71x9 local0.info udhcpd[4394]: Sending ACK to 192.168.15.2
Aug 30 22:55:43 mt71x9 user.alert kernel: UDP_flood_from_lan:IN=br0 OUT=br0 PHYSIN=eth0 PHYSOUT=wlan0 SRC=192.168.15.2 DST=192.168.15.255 LEN=96 TOS=0x00 PREC=0x00 TTL=128 ID=23042 PROTO=UDP SPT=137 DPT=137 LEN=76
Aug 30 22:55:44 mt71x9 user.alert kernel: UDP_flood_from_lan:IN=br0 OUT=br0 PHYSIN=eth0 PHYSOUT=wlan0 SRC=192.168.15.2 DST=192.168.15.255 LEN=96 TOS=0x00 PREC=0x00 TTL=128 ID=23068 PROTO=UDP SPT=137 DPT=137 LEN=76
Aug 30 22:55:45 mt71x9 user.alert kernel: UDP_flood_from_lan:IN=br0 OUT=br0 PHYSIN=eth0 PHYSOUT=wlan0 SRC=192.168.15.2 DST=192.168.15.255 LEN=96 TOS=0x00 PREC=0x00 TTL=128 ID=23087 PROTO=UDP SPT=137 DPT=137 LEN=76
Aug 30 22:55:45 mt71x9 user.alert kernel: UDP_flood_from_lan:IN=br0 OUT=br0 PHYSIN=eth0 PHYSOUT=wlan0 SRC=192.168.15.2 DST=192.168.15.255 LEN=96 TOS=0x00 PREC=0x00 TTL=128 ID=23102 PROTO=UDP SPT=137 DPT=137 LEN=76
Aug 30 22:56:01 mt71x9 cron.notice crond[1769]: USER root pid 4877 cmd /etc/init.d/sp autoconnect
Aug 30 22:56:05 mt71x9 user.alert kernel: UDP_flood_from_lan:IN=br0 OUT=br0 PHYSIN=eth0 PHYSOUT=wlan0 SRC=192.168.15.2 DST=192.168.15.255 LEN=236 TOS=0x00 PREC=0x00 TTL=128 ID=23469 PROTO=UDP SPT=138 DPT=138 LEN=216
Aug 30 22:57:01 mt71x9 cron.notice crond[1769]: USER root pid 5023 cmd /etc/init.d/sp autoconnect
Aug 30 22:58:01 mt71x9 cron.notice crond[1769]: USER root pid 5176 cmd /etc/init.d/sp autoconnect
Aug 30 22:59:00 mt71x9 user.alert kernel: SYN_flood_from_lan:IN=br0 OUT=wmx0 PHYSIN=eth0 SRC=192.168.15.2 DST=58.71.107.74 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=2046 DF PROTO=TCP SPT=62088 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Aug 30 22:59:00 mt71x9 user.alert kernel: SYN_flood_from_lan:IN=br0 OUT=wmx0 PHYSIN=eth0 SRC=192.168.15.2 DST=58.71.107.16 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=2049 DF PROTO=TCP SPT=62091 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Aug 30 22:59:00 mt71x9 user.alert kernel: SYN_flood_from_lan:IN=br0 OUT=wmx0 PHYSIN=eth0 SRC=192.168.15.2 DST=58.71.107.17 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=2052 DF PROTO=TCP SPT=62094 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Aug 30 22:59:00 mt71x9 user.alert kernel: SYN_flood_from_lan:IN=br0 OUT=wmx0 PHYSIN=eth0 SRC=192.168.15.2 DST=58.71.107.75 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=2054 DF PROTO=TCP SPT=62096 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Aug 30 22:59:00 mt71x9 user.alert kernel: SYN_flood_from_lan:IN=br0 OUT=wmx0 PHYSIN=eth0 SRC=192.168.15.2 DST=210.5.102.106 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=2057 DF PROTO=TCP SPT=62099 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Aug 30 22:59:00 mt71x9 user.warn kernel: __ratelimit: 3 messages suppressed
Aug 30 22:59:00 mt71x9 user.warn kernel: Must catchup 80 miliseconds.^M
Aug 30 22:59:00 mt71x9 user.warn kernel: Must catchup 80 miliseconds.^M
Aug 30 22:59:00 mt71x9 user.warn kernel: Must catchup 70 miliseconds.^M
Aug 30 22:59:00 mt71x9 user.warn kernel: Must catchup 60 miliseconds.^M
Aug 30 22:59:00 mt71x9 user.warn kernel: Must catchup 60 miliseconds.^M
Aug 30 22:59:01 mt71x9 cron.notice crond[1769]: USER root pid 5324 cmd /etc/init.d/sp autoconnect
Aug 30 23:00:02 mt71x9 cron.notice crond[1769]: USER root pid 5477 cmd /etc/init.d/sp autoconnect
Aug 30 23:00:55 mt71x9 user.alert kernel: SYN_flood_from_lan:IN=br0 OUT=wmx0 PHYSIN=eth0 SRC=192.168.15.2 DST=23.2.16.51 LEN=48 TOS=0x00 PREC=0x00 TTL=127 ID=9994 DF PROTO=TCP SPT=62282 DPT=443 WINDOW=8192 RES=0x00 SYN URGP=0
Aug 30 23:01:01 mt71x9 cron.notice crond[1769]: USER root pid 5616 cmd /etc/init.d/sp autoconnect
Aug 30 23:02:01 mt71x9 cron.notice crond[1769]: USER root pid 5749 cmd /etc/init.d/sp autoconnect
Aug 30 23:03:01 mt71x9 cron.notice crond[1769]: USER root pid 5902 cmd /etc/init.d/sp autoconnect
Aug 30 23:04:01 mt71x9 cron.notice crond[1769]: USER root pid 6048 cmd /etc/init.d/sp autoconnect
Refresh
 

Attachments

  • Untitled.jpg
    Untitled.jpg
    221.2 KB · Views: 34
  • Untitled.jpg
    Untitled.jpg
    221.2 KB · Views: 16
Last edited:
hanggang ngaun wla parin ung ibang frequency ko na malakas,patay parin
 
GAnito din nangyari sa DV ko hindi na makasagap ng frequency ng SMART tapos walang BSID, connecting lang. Nag try ako mag palit ng MAC,PEM,KEY ganun pa din. Nag try ako ng Globe MAC, nakakasagap naman ng globe frequency,... Block na ba sa SMART pag ganito? Sana may makatulong sa problema natin
 
ask lang... bakit sa bahay ayaw mgconnect ng dv at ox samin.... nung dinanala ko ang units sa town proper kng saan ako ngtatrabaho my connection ang 2 unit.... bakit ganun? nasa tower ba ang problema? sana my sasagot, papm n rin kng bakit...ito ay naobserbahan ko sa lugar namin.
 
Ganito din ang problema ko.. base sa mga nabasa ko cguro yung dv ang may problema kc globe yung mac na gamet ko.. sa experience ko kc biglang nawala yung malakas na frequency na pinag coconekan ko kaya gnawa ko sa ibang freq ako kumonek ang problema tumaas rssi from -52 naging -76 resulta bagal ng net pero connected.. globe mac gamet ko ha..
 
AREA kau ng AREA, malay ba namin kung saan AREA nyo, kung sabhin nyo kaya SPECIFIC AREA NYO san disconnected
 
Last edited:
mga boss kahit legit same lang.,,kahapon nagkuha ako ng bagong brand new n dv235t eh aun same problem.,sabi ng installer balikan nlang nila at monitor ko nalng daw muna kong may progress kasi sabi nung it nila may problema daw tlga sa smart ngaun.,so ewan lang sa main branch kong pakana nila yan at yan nmn bagong update nila agains sa mga clonner.
 
up na po ang smart.... 2weeks walang masagap na frequency visayas area pero ngayon ok na. sa smart lang pala baka major maintenance sila..

View attachment 185932
 

Attachments

  • 123456.gif
    123456.gif
    16.1 KB · Views: 5
Back
Top Bottom