Журнал сообщений системы

Ведение журнала упрощает диагностику неполадок. Для сохранения журнала на компьютер обратитесь к странице системных файлов.

Jul 02 21:09:55ndhcps
_WEBADMIN: sending ACK of 192.168.1.8 to e0:66:78:1d:61:1f.
Jul 02 21:12:49ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.33 from a0:f4:50:7e:3f:e6.
Jul 02 21:12:49ndhcps
_WEBADMIN: sending ACK of 192.168.1.33 to a0:f4:50:7e:3f:e6.
Jul 02 21:12:49ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.33 from a0:f4:50:7e:3f:e6.
Jul 02 21:12:49ndhcps
_WEBADMIN: sending ACK of 192.168.1.33 to a0:f4:50:7e:3f:e6.
Jul 02 21:13:41wmond
WifiMaster0/AccessPoint0: (RT2860) STA(a0:f4:50:7e:3f:e6) had associated successfully.
Jul 02 21:13:41wmond
WifiMaster0/AccessPoint0: (RT2860) STA(a0:f4:50:7e:3f:e6) set key done in WPA2/WPA2PSK.
Jul 02 21:13:42ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.33 from a0:f4:50:7e:3f:e6.
Jul 02 21:13:42ndhcps
_WEBADMIN: sending ACK of 192.168.1.33 to a0:f4:50:7e:3f:e6.
Jul 02 21:13:42ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.33 from a0:f4:50:7e:3f:e6.
Jul 02 21:13:42ndhcps
_WEBADMIN: sending ACK of 192.168.1.33 to a0:f4:50:7e:3f:e6.
Jul 02 21:13:42ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.33 from a0:f4:50:7e:3f:e6.
Jul 02 21:13:42ndhcps
_WEBADMIN: sending ACK of 192.168.1.33 to a0:f4:50:7e:3f:e6.
Jul 02 21:15:55ndm
Network::Interface::IP: "YotaOne0": IP address cleared.
Jul 02 21:15:55ndm
Network::Interface::IP: "YotaOne0": IP address is 10.0.0.20/24.
Jul 02 21:15:56ndm
Core::Session: client disconnected.
Jul 02 21:16:03ndm
Core::Server: started Session 127.0.0.1:0.
Jul 02 21:16:03miniupnpd
HTTP listening on port 41518
Jul 02 21:16:03miniupnpd
listening for NAT-PMP traffic on port 5351
Jul 02 21:29:24ndm
Network::Interface::IP: "YotaOne0": IP address cleared.
Jul 02 21:29:24ndm
Network::Interface::IP: "YotaOne0": IP address is 10.0.0.20/24.
Jul 02 21:29:25ndm
Core::Session: client disconnected.
Jul 02 21:29:32miniupnpd
HTTP listening on port 39158
Jul 02 21:29:32ndm
Core::Server: started Session 127.0.0.1:0.
Jul 02 21:29:32miniupnpd
listening for NAT-PMP traffic on port 5351
Jul 02 21:35:30wmond
WifiMaster0/AccessPoint0: (RT2860) STA(58:12:43:ee:2d:00) had associated successfully.
Jul 02 21:35:30wmond
WifiMaster0/AccessPoint0: (RT2860) STA(58:12:43:ee:2d:00) set key done in WPA2/WPA2PSK.
Jul 02 21:35:31ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.3 from 58:12:43:ee:2d:00.
Jul 02 21:35:31ndhcps
_WEBADMIN: sending ACK of 192.168.1.3 to 58:12:43:ee:2d:00.
Jul 02 21:36:34wmond
WifiMaster0/AccessPoint0: (RT2860) STA(58:12:43:ee:2d:00) had associated successfully.
Jul 02 21:36:34wmond
WifiMaster0/AccessPoint0: (RT2860) STA(58:12:43:ee:2d:00) set key done in WPA2/WPA2PSK.
Jul 02 21:36:35ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.3 from 58:12:43:ee:2d:00.
Jul 02 21:36:35ndhcps
_WEBADMIN: sending ACK of 192.168.1.3 to 58:12:43:ee:2d:00.
Jul 02 21:36:57wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had deauthenticated.
Jul 02 21:37:40wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 21:37:40wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) set key done in WPA2/WPA2PSK.
Jul 02 21:37:40ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.5 from 84:7a:88:9b:ca:4f.
Jul 02 21:37:40ndhcps
_WEBADMIN: sending ACK of 192.168.1.5 to 84:7a:88:9b:ca:4f.
Jul 02 21:49:06wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 21:49:07wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) set key done in WPA2/WPA2PSK.
Jul 02 21:49:07ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.5 from 84:7a:88:9b:ca:4f.
Jul 02 21:49:07ndhcps
_WEBADMIN: sending ACK of 192.168.1.5 to 84:7a:88:9b:ca:4f.
Jul 02 21:59:45wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 21:59:50wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) occurred replay counter different in Key Handshaking.
Jul 02 21:59:50wmond
Syslog: last message repeated 2 times.
Jul 02 21:59:51wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) Pairwise Key Handshaking timeout.
Jul 02 21:59:51wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had deauthenticated.
Jul 02 22:01:21wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 22:01:22wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) set key done in WPA2/WPA2PSK.
Jul 02 22:01:22ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.5 from 84:7a:88:9b:ca:4f.
Jul 02 22:01:22ndhcps
_WEBADMIN: sending ACK of 192.168.1.5 to 84:7a:88:9b:ca:4f.
Jul 02 22:18:02wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 22:18:03wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) set key done in WPA2/WPA2PSK.
Jul 02 22:18:04ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.5 from 84:7a:88:9b:ca:4f.
Jul 02 22:18:04ndhcps
_WEBADMIN: sending ACK of 192.168.1.5 to 84:7a:88:9b:ca:4f.
Jul 02 22:18:07ndm
Network::Interface::Switch: switch link up at port 1 (Switch0).
Jul 02 22:18:16ndhcps
_WEBADMIN: DHCPDISCOVER received from 00:1d:60:db:c6:e3.
Jul 02 22:18:16ndhcps
_WEBADMIN: making OFFER of 192.168.1.2 to 00:1d:60:db:c6:e3.
Jul 02 22:18:21ndhcps
_WEBADMIN: DHCPDISCOVER received from 00:1d:60:db:c6:e3.
Jul 02 22:18:21ndhcps
_WEBADMIN: making OFFER of 192.168.1.2 to 00:1d:60:db:c6:e3.
Jul 02 22:18:23ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.2 from 00:1d:60:db:c6:e3.
Jul 02 22:18:23ndhcps
_WEBADMIN: sending ACK of 192.168.1.2 to 00:1d:60:db:c6:e3.
Jul 02 22:23:13ndm
UPnP::Manager: redirect rule added: udp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 02 22:23:13ndm
UPnP::Manager: forward rule added: udp YotaOne0 -> 192.168.1.2:35430.
Jul 02 22:23:13ndm
UPnP::Manager: redirect rule added: tcp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 02 22:23:13ndm
UPnP::Manager: forward rule added: tcp YotaOne0 -> 192.168.1.2:35430.
Jul 02 22:23:46wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 22:23:46wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) set key done in WPA2/WPA2PSK.
Jul 02 22:23:46ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.5 from 84:7a:88:9b:ca:4f.
Jul 02 22:23:46ndhcps
_WEBADMIN: sending ACK of 192.168.1.5 to 84:7a:88:9b:ca:4f.
Jul 02 22:25:55wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 22:26:02wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) Pairwise Key Handshaking timeout.
Jul 02 22:26:02wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had deauthenticated.
Jul 02 22:26:14wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 22:26:20wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) Pairwise Key Handshaking timeout.
Jul 02 22:26:20wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had deauthenticated.
Jul 02 22:27:51wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 22:27:53wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) set key done in WPA2/WPA2PSK.
Jul 02 22:27:53ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.5 from 84:7a:88:9b:ca:4f.
Jul 02 22:27:53ndhcps
_WEBADMIN: sending ACK of 192.168.1.5 to 84:7a:88:9b:ca:4f.
Jul 02 22:32:22ndm
Core::Authenticator: user "admin" optional tags deleted.
Jul 02 22:32:22ndm
Core::Authenticator: generating.
Jul 02 22:32:23ndm
Core::Authenticator: password set has been changed for user "admin".
Jul 02 22:32:23ndm
Core::Authenticator: user "admin" tagged with "cli".
Jul 02 22:32:23ndm
Core::Authenticator: user "admin" tagged with "http".
Jul 02 22:32:23ndm
Core::ConfigurationSaver: saving configuration...
Jul 02 22:32:38ndm
Core::ConfigurationSaver: configuration saved.
Jul 02 22:32:43wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had disassociated.
Jul 02 22:32:43wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 22:32:44wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) set key done in WPA2/WPA2PSK.
Jul 02 22:32:44ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.5 from 84:7a:88:9b:ca:4f.
Jul 02 22:32:44ndhcps
_WEBADMIN: sending ACK of 192.168.1.5 to 84:7a:88:9b:ca:4f.
Jul 02 22:37:58ndm
Network::Interface::IP: "YotaOne0": IP address cleared.
Jul 02 22:37:58ndm
Network::Interface::IP: "YotaOne0": IP address is 10.0.0.20/24.
Jul 02 22:37:59ndm
Core::Session: client disconnected.
Jul 02 22:38:06ndm
Core::Server: started Session 127.0.0.1:0.
Jul 02 22:38:06miniupnpd
HTTP listening on port 34085
Jul 02 22:38:06miniupnpd
listening for NAT-PMP traffic on port 5351
Jul 02 22:41:20ndm
Core::Authenticator: user "odmeh" has been added.
Jul 02 22:41:20ndm
Core::Authenticator: user "odmeh" tags deleted.
Jul 02 22:41:20ndm
Core::Authenticator: user "odmeh" tagged with "cli".
Jul 02 22:41:20ndm
Core::Authenticator: user "odmeh" tagged with "readonly".
Jul 02 22:41:20ndm
Core::Authenticator: user "odmeh" tagged with "http".
Jul 02 22:41:20ndm
Core::ConfigurationSaver: saving configuration...
Jul 02 22:41:32ndm
Core::ConfigurationSaver: configuration saved.
Jul 02 22:41:36ndm
Core::Authenticator: user "admin" optional tags deleted.
Jul 02 22:41:36ndm
Core::Authenticator: generating.
Jul 02 22:41:36ndm
Core::Authenticator: password set has been changed for user "admin".
Jul 02 22:41:36ndm
Core::Authenticator: user "admin" tagged with "cli".
Jul 02 22:41:36ndm
Core::Authenticator: user "admin" tagged with "http".
Jul 02 22:41:36ndm
Core::ConfigurationSaver: saving configuration...
Jul 02 22:41:48ndm
Core::ConfigurationSaver: configuration saved.
Jul 02 22:41:49ndm
Core::Authenticator: user "odmeh" tags deleted.
Jul 02 22:41:49ndm
Core::Authenticator: user "odmeh" tagged with "cli".
Jul 02 22:41:49ndm
Core::Authenticator: user "odmeh" tagged with "readonly".
Jul 02 22:41:49ndm
Core::Authenticator: user "odmeh" tagged with "http".
Jul 02 22:41:49ndm
Core::ConfigurationSaver: saving configuration...
Jul 02 22:42:01ndm
Core::ConfigurationSaver: configuration saved.
Jul 02 22:43:03ndm
Core::Authenticator: user "odmeh" tags deleted.
Jul 02 22:43:03ndm
Core::Authenticator: generating.
Jul 02 22:43:03ndm
Core::Authenticator: password set has been changed for user "odmeh".
Jul 02 22:43:03ndm
Core::Authenticator: user "odmeh" tagged with "cli".
Jul 02 22:43:03ndm
Core::Authenticator: user "odmeh" tagged with "readonly".
Jul 02 22:43:03ndm
Core::Authenticator: user "odmeh" tagged with "http".
Jul 02 22:43:03ndm
Core::ConfigurationSaver: saving configuration...
Jul 02 22:43:15ndm
Core::ConfigurationSaver: configuration saved.
Jul 02 22:53:13ndm
UPnP::Manager: redirect rule added: udp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 02 22:53:13ndm
UPnP::Manager: forward rule added: udp YotaOne0 -> 192.168.1.2:35430.
Jul 02 22:53:13ndm
UPnP::Manager: redirect rule added: tcp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 02 22:53:13ndm
UPnP::Manager: forward rule added: tcp YotaOne0 -> 192.168.1.2:35430.
Jul 02 23:03:39wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had disassociated.
Jul 02 23:03:39wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 23:03:40wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) set key done in WPA2/WPA2PSK.
Jul 02 23:03:40ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.5 from 84:7a:88:9b:ca:4f.
Jul 02 23:03:40ndhcps
_WEBADMIN: sending ACK of 192.168.1.5 to 84:7a:88:9b:ca:4f.
Jul 02 23:07:11ndm
Core::Configurator: interface: execute denied[http/ci //tabler.connections[row_click]/former.editor[load]].
Jul 02 23:09:54wmond
WifiMaster0/AccessPoint0: (RT2860) STA(20:82:c0:dd:ac:b7) had associated successfully.
Jul 02 23:09:55wmond
WifiMaster0/AccessPoint0: (RT2860) STA(20:82:c0:dd:ac:b7) set key done in WPA2/WPA2PSK.
Jul 02 23:09:55ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.35 from 20:82:c0:dd:ac:b7.
Jul 02 23:09:55ndhcps
_WEBADMIN: sending ACK of 192.168.1.35 to 20:82:c0:dd:ac:b7.
Jul 02 23:22:12ndm
Network::Interface::IP: "YotaOne0": IP address cleared.
Jul 02 23:22:12ndm
Network::Interface::IP: "YotaOne0": IP address is 10.0.0.20/24.
Jul 02 23:22:12ndm
Core::Session: client disconnected.
Jul 02 23:22:25ndm
Core::Server: started Session 127.0.0.1:0.
Jul 02 23:22:25miniupnpd
HTTP listening on port 41441
Jul 02 23:22:25miniupnpd
listening for NAT-PMP traffic on port 5351
Jul 02 23:23:13ndm
UPnP::Manager: redirect rule added: udp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 02 23:23:13ndm
UPnP::Manager: forward rule added: udp YotaOne0 -> 192.168.1.2:35430.
Jul 02 23:23:13ndm
UPnP::Manager: redirect rule added: tcp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 02 23:23:13ndm
UPnP::Manager: forward rule added: tcp YotaOne0 -> 192.168.1.2:35430.
Jul 02 23:33:22wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 23:33:25wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) occurred replay counter different in Key Handshaking.
Jul 02 23:33:28wmond
Syslog: last message repeated 2 times.
Jul 02 23:33:29wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) Pairwise Key Handshaking timeout.
Jul 02 23:33:29wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had deauthenticated.
Jul 02 23:33:43wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 23:33:47wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 23:33:50wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) occurred replay counter different in Key Handshaking.
Jul 02 23:33:51wmond
Syslog: last message repeated 2 times.
Jul 02 23:33:52wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) occurred MIC different in Key Handshaking.
Jul 02 23:33:52wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) occurred replay counter different in Key Handshaking.
Jul 02 23:33:52wmond
Syslog: last message repeated 2 times.
Jul 02 23:33:52wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had disassociated.
Jul 02 23:33:53wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 02 23:33:55wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) set key done in WPA2/WPA2PSK.
Jul 02 23:33:56ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.5 from 84:7a:88:9b:ca:4f.
Jul 02 23:33:56ndhcps
_WEBADMIN: sending ACK of 192.168.1.5 to 84:7a:88:9b:ca:4f.
Jul 02 23:48:00ndm
Network::Interface::IP: "YotaOne0": IP address cleared.
Jul 02 23:48:00ndm
Network::Interface::IP: "YotaOne0": IP address is 10.0.0.20/24.
Jul 02 23:48:00ndm
Core::Session: client disconnected.
Jul 02 23:48:52miniupnpd
HTTP listening on port 60393
Jul 02 23:48:52ndm
Core::Server: started Session 127.0.0.1:0.
Jul 02 23:48:52miniupnpd
listening for NAT-PMP traffic on port 5351
Jul 02 23:49:23wmond
WifiMaster0/AccessPoint0: (RT2860) STA(00:83:9a:14:7c:27) had associated successfully.
Jul 02 23:49:24wmond
WifiMaster0/AccessPoint0: (RT2860) STA(00:83:9a:14:7c:27) set key done in WPA2/WPA2PSK.
Jul 02 23:49:24ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.71 from 00:83:9a:14:7c:27.
Jul 02 23:49:24ndhcps
_WEBADMIN: sending NAK to 00:83:9a:14:7c:27.
Jul 02 23:49:25ndhcps
_WEBADMIN: DHCPDISCOVER received from 00:83:9a:14:7c:27.
Jul 02 23:49:25ndhcps
_WEBADMIN: making OFFER of 192.168.1.7 to 00:83:9a:14:7c:27.
Jul 02 23:49:26ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.7 from 00:83:9a:14:7c:27.
Jul 02 23:49:26ndhcps
_WEBADMIN: sending ACK of 192.168.1.7 to 00:83:9a:14:7c:27.
Jul 02 23:53:14ndm
UPnP::Manager: redirect rule added: udp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 02 23:53:14ndm
UPnP::Manager: forward rule added: udp YotaOne0 -> 192.168.1.2:35430.
Jul 02 23:53:14ndm
UPnP::Manager: redirect rule added: tcp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 02 23:53:14ndm
UPnP::Manager: forward rule added: tcp YotaOne0 -> 192.168.1.2:35430.
Jul 03 00:12:06wmond
WifiMaster0/AccessPoint0: (RT2860) STA(58:12:43:ee:2d:00) had associated successfully.
Jul 03 00:12:07wmond
WifiMaster0/AccessPoint0: (RT2860) STA(58:12:43:ee:2d:00) set key done in WPA2/WPA2PSK.
Jul 03 00:12:07ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.3 from 58:12:43:ee:2d:00.
Jul 03 00:12:07ndhcps
_WEBADMIN: sending ACK of 192.168.1.3 to 58:12:43:ee:2d:00.
Jul 03 00:12:50wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 03 00:12:56wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) Pairwise Key Handshaking timeout.
Jul 03 00:12:56wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had deauthenticated.
Jul 03 00:13:22wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 03 00:13:28wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) Pairwise Key Handshaking timeout.
Jul 03 00:13:28wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had deauthenticated.
Jul 03 00:13:34wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 03 00:13:37wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) occurred replay counter different in Key Handshaking.
Jul 03 00:13:40wmond
Syslog: last message repeated 2 times.
Jul 03 00:13:41wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) occurred MIC different in Key Handshaking.
Jul 03 00:13:41wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) Pairwise Key Handshaking timeout.
Jul 03 00:13:41wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had deauthenticated.
Jul 03 00:13:45wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 03 00:13:52wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) Pairwise Key Handshaking timeout.
Jul 03 00:13:52wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had deauthenticated.
Jul 03 00:16:02wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 03 00:16:05wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) occurred replay counter different in Key Handshaking.
Jul 03 00:16:06wmond
Syslog: last message repeated 2 times.
Jul 03 00:16:09wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) Pairwise Key Handshaking timeout.
Jul 03 00:16:09wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had deauthenticated.
Jul 03 00:23:14ndm
UPnP::Manager: redirect and forward rules deleted: udp 35430.
Jul 03 00:23:14ndm
UPnP::Manager: redirect rule added: udp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 03 00:23:14ndm
UPnP::Manager: forward rule added: udp YotaOne0 -> 192.168.1.2:35430.
Jul 03 00:23:14ndm
UPnP::Manager: redirect and forward rules deleted: tcp 35430.
Jul 03 00:23:14ndm
UPnP::Manager: redirect rule added: tcp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 03 00:23:14ndm
UPnP::Manager: forward rule added: tcp YotaOne0 -> 192.168.1.2:35430.
Jul 03 00:29:48ndm
Core::Configurator: interface: execute denied[http/ci //tabler.connections[row_click]/former.editor[load]].
Jul 03 00:35:20ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.33 from a0:f4:50:7e:3f:e6.
Jul 03 00:35:20ndhcps
_WEBADMIN: sending ACK of 192.168.1.33 to a0:f4:50:7e:3f:e6.
Jul 03 00:35:56ndm
Core::Configurator: interface: execute denied[http/ci //tabler.connections[row_click]/former.editor[load]].
Jul 03 00:38:21ndm
Network::Interface::IP: "YotaOne0": IP address cleared.
Jul 03 00:38:21ndm
Network::Interface::IP: "YotaOne0": IP address is 10.0.0.20/24.
Jul 03 00:38:22ndm
Core::Session: client disconnected.
Jul 03 00:39:19miniupnpd
HTTP listening on port 36446
Jul 03 00:39:19ndm
Core::Server: started Session 127.0.0.1:0.
Jul 03 00:39:19miniupnpd
listening for NAT-PMP traffic on port 5351
Jul 03 00:44:38ndm
Network::Interface::IP: "YotaOne0": IP address cleared.
Jul 03 00:44:38ndm
Network::Interface::IP: "YotaOne0": IP address is 10.0.0.20/24.
Jul 03 00:44:38ndm
Core::Session: client disconnected.
Jul 03 00:45:31ndm
Core::Server: started Session 127.0.0.1:0.
Jul 03 00:45:31miniupnpd
HTTP listening on port 51677
Jul 03 00:45:31miniupnpd
listening for NAT-PMP traffic on port 5351
Jul 03 00:46:33ndm
Core::Configurator: interface: execute denied[http/ci //tabler.connections[row_click]/former.editor[load]].
Jul 03 00:50:35wmond
WifiMaster0/AccessPoint0: (RT2860) STA(58:12:43:ee:2d:00) had associated successfully.
Jul 03 00:50:36wmond
WifiMaster0/AccessPoint0: (RT2860) STA(58:12:43:ee:2d:00) set key done in WPA2/WPA2PSK.
Jul 03 00:50:36ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.3 from 58:12:43:ee:2d:00.
Jul 03 00:50:36ndhcps
_WEBADMIN: sending ACK of 192.168.1.3 to 58:12:43:ee:2d:00.
Jul 03 00:53:14ndm
UPnP::Manager: redirect rule added: udp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 03 00:53:14ndm
UPnP::Manager: forward rule added: udp YotaOne0 -> 192.168.1.2:35430.
Jul 03 00:53:14ndm
UPnP::Manager: redirect rule added: tcp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 03 00:53:14ndm
UPnP::Manager: forward rule added: tcp YotaOne0 -> 192.168.1.2:35430.
Jul 03 01:04:44ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.33 from a0:f4:50:7e:3f:e6.
Jul 03 01:04:44ndhcps
_WEBADMIN: sending ACK of 192.168.1.33 to a0:f4:50:7e:3f:e6.
Jul 03 01:04:44ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.33 from a0:f4:50:7e:3f:e6.
Jul 03 01:04:44ndhcps
_WEBADMIN: sending ACK of 192.168.1.33 to a0:f4:50:7e:3f:e6.
Jul 03 01:16:46ndm
Core::Configurator: interface: execute denied[http/ci //tabler.connections[row_click]/former.editor[load]].
Jul 03 01:17:31ndm
Core::Configurator: interface: execute denied[http/ci //tabler.connections[row_click]/former.editor[load]].
Jul 03 01:19:41wmond
WifiMaster0/AccessPoint0: (RT2860) STA(00:83:9a:14:7c:27) had deauthenticated.
Jul 03 01:23:15ndm
UPnP::Manager: redirect and forward rules deleted: udp 35430.
Jul 03 01:23:15ndm
UPnP::Manager: redirect rule added: udp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 03 01:23:15ndm
UPnP::Manager: forward rule added: udp YotaOne0 -> 192.168.1.2:35430.
Jul 03 01:23:15ndm
UPnP::Manager: redirect and forward rules deleted: tcp 35430.
Jul 03 01:23:15ndm
UPnP::Manager: redirect rule added: tcp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 03 01:23:15ndm
UPnP::Manager: forward rule added: tcp YotaOne0 -> 192.168.1.2:35430.
Jul 03 01:48:24ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.2 from 00:1d:60:db:c6:e3.
Jul 03 01:48:24ndhcps
_WEBADMIN: sending ACK of 192.168.1.2 to 00:1d:60:db:c6:e3.
Jul 03 01:53:15ndm
UPnP::Manager: redirect and forward rules deleted: udp 35430.
Jul 03 01:53:15ndm
UPnP::Manager: redirect rule added: udp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 03 01:53:15ndm
UPnP::Manager: forward rule added: udp YotaOne0 -> 192.168.1.2:35430.
Jul 03 01:53:15ndm
UPnP::Manager: redirect and forward rules deleted: tcp 35430.
Jul 03 01:53:15ndm
UPnP::Manager: redirect rule added: tcp YotaOne0:35430 -> 192.168.1.2:35430.
Jul 03 01:53:15ndm
UPnP::Manager: forward rule added: tcp YotaOne0 -> 192.168.1.2:35430.
Jul 03 01:56:28wmond
WifiMaster0/AccessPoint0: (RT2860) STA(2c:8a:72:ca:a6:32) had associated successfully.
Jul 03 01:56:29wmond
WifiMaster0/AccessPoint0: (RT2860) STA(2c:8a:72:ca:a6:32) set key done in WPA2/WPA2PSK.
Jul 03 01:56:29ndhcps
_WEBADMIN: DHCPDISCOVER received from 2c:8a:72:ca:a6:32.
Jul 03 01:56:29ndhcps
_WEBADMIN: making OFFER of 192.168.1.4 to 2c:8a:72:ca:a6:32.
Jul 03 01:56:29ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_SELECTING) for 192.168.1.4 from 2c:8a:72:ca:a6:32.
Jul 03 01:56:29ndhcps
_WEBADMIN: sending ACK of 192.168.1.4 to 2c:8a:72:ca:a6:32.
Jul 03 02:04:02ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.8 from e0:66:78:1d:61:1f.
Jul 03 02:04:02ndhcps
_WEBADMIN: sending ACK of 192.168.1.8 to e0:66:78:1d:61:1f.
Jul 03 02:07:14wmond
WifiMaster0/AccessPoint0: (RT2860) STA(58:12:43:ee:2d:00) had associated successfully.
Jul 03 02:07:15wmond
WifiMaster0/AccessPoint0: (RT2860) STA(58:12:43:ee:2d:00) set key done in WPA2/WPA2PSK.
Jul 03 02:07:15ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.3 from 58:12:43:ee:2d:00.
Jul 03 02:07:15ndhcps
_WEBADMIN: sending ACK of 192.168.1.3 to 58:12:43:ee:2d:00.
Jul 03 02:26:36ndm
Network::Interface::IP: "YotaOne0": IP address cleared.
Jul 03 02:26:36ndm
Network::Interface::IP: "YotaOne0": IP address is 10.0.0.20/24.
Jul 03 02:26:36ndm
Core::Session: client disconnected.
Jul 03 02:26:44ndm
Core::Server: started Session 127.0.0.1:0.
Jul 03 02:26:44miniupnpd
HTTP listening on port 43381
Jul 03 02:26:44miniupnpd
listening for NAT-PMP traffic on port 5351
Jul 03 02:26:52ndm
Network::Interface::IP: "YotaOne0": IP address cleared.
Jul 03 02:26:53ndm
Network::Interface::IP: "YotaOne0": IP address is 10.0.0.20/24.
Jul 03 02:26:53ndm
Core::Session: client disconnected.
Jul 03 02:27:00ndm
Core::Server: started Session 127.0.0.1:0.
Jul 03 02:27:00miniupnpd
HTTP listening on port 41964
Jul 03 02:27:00miniupnpd
listening for NAT-PMP traffic on port 5351
Jul 03 02:30:21wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 03 02:30:22wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) set key done in WPA2/WPA2PSK.
Jul 03 02:30:23ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.5 from 84:7a:88:9b:ca:4f.
Jul 03 02:30:23ndhcps
_WEBADMIN: sending ACK of 192.168.1.5 to 84:7a:88:9b:ca:4f.
Jul 03 02:31:31ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_RENEWING) for 192.168.1.35 from 20:82:c0:dd:ac:b7.
Jul 03 02:31:31ndhcps
_WEBADMIN: sending ACK of 192.168.1.35 to 20:82:c0:dd:ac:b7.
Jul 03 02:41:07wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 03 02:41:13wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) Pairwise Key Handshaking timeout.
Jul 03 02:41:13wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had deauthenticated.
Jul 03 02:41:25wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) had associated successfully.
Jul 03 02:41:26wmond
WifiMaster0/AccessPoint0: (RT2860) STA(84:7a:88:9b:ca:4f) set key done in WPA2/WPA2PSK.
Jul 03 02:41:26ndhcps
_WEBADMIN: DHCPREQUEST received (STATE_INIT) for 192.168.1.5 from 84:7a:88:9b:ca:4f.
Jul 03 02:41:26ndhcps
_WEBADMIN: sending ACK of 192.168.1.5 to 84:7a:88:9b:ca:4f.
Jul 03 03:04:25ndm
Core::Configurator: skydns check-availability: execute denied[http/ci //former.settings[ready]/former.settings[load]/NdmRequestPack[response]].
Jul 03 03:05:59ndm
Core::Configurator: yandexdns check-availability: execute denied[http/ci //former.settings[ready]/former.settings[load]/NdmRequestPack[response]].