Advertisement
Guest User

Untitled

a guest
Sep 20th, 2014
297
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.13 KB | None | 0 0
  1.  
  2. Sep 20 22:24:02 pi kernel: [ 104.802124] tun: Universal TUN/TAP device driver, 1.6
  3. Sep 20 22:24:02 pi kernel: [ 104.802161] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
  4. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: ifplugd 0.28 initializing.
  5. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Using interface tap_soft/00:AC:D1:F2:1E:57 with driver <tun> (version: 1.6)
  6. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Using detection mode: SIOCETHTOOL
  7. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Initialization complete, link beat detected.
  8. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Executing '/etc/ifplugd/ifplugd.action tap_soft up'.
  9. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: client: Ignoring unknown interface tap_soft=tap_soft.
  10. Sep 20 22:24:02 pi ifplugd(tap_soft)[2188]: Program executed successfully.
  11. Sep 20 22:24:12 pi kernel: [ 115.108443] NET: Registered protocol family 10
  12. Sep 20 22:24:12 pi kernel: [ 115.142833] Bridge firewalling registered
  13. Sep 20 22:24:12 pi kernel: [ 115.212481] device eth0 entered promiscuous mode
  14. Sep 20 22:24:12 pi kernel: [ 115.258175] device tap_soft entered promiscuous mode
  15. Sep 20 22:24:12 pi kernel: [ 115.338280] vpn: port 2(tap_soft) entered forwarding state
  16. Sep 20 22:24:12 pi kernel: [ 115.338392] vpn: port 2(tap_soft) entered forwarding state
  17. Sep 20 22:24:12 pi kernel: [ 115.338437] vpn: port 1(eth0) entered forwarding state
  18. Sep 20 22:24:12 pi kernel: [ 115.338471] vpn: port 1(eth0) entered forwarding state
  19. Sep 20 22:24:12 pi ifplugd(vpn)[2240]: ifplugd 0.28 initializing.
  20. Sep 20 22:24:12 pi ifplugd(vpn)[2240]: Using interface vpn/00:AC:D1:F2:1E:57 with driver <bridge> (version: 2.3)
  21. Sep 20 22:24:12 pi ifplugd(vpn)[2240]: Using detection mode: SIOCETHTOOL
  22. Sep 20 22:24:12 pi ifplugd(vpn)[2240]: Initialization complete, link beat detected.
  23. Sep 20 22:24:12 pi ifplugd(vpn)[2240]: Executing '/etc/ifplugd/ifplugd.action vpn up'.
  24. Sep 20 22:24:12 pi ifplugd(vpn)[2240]: client: /sbin/ifup: interface vpn already configured
  25. Sep 20 22:24:13 pi ifplugd(vpn)[2240]: Program executed successfully.
  26. Sep 20 22:24:18 pi kernel: [ 121.349874] vpn: port 2(tap_soft) entered forwarding state
  27. Sep 20 22:24:18 pi kernel: [ 121.349957] vpn: port 1(eth0) entered forwarding state
  28. Sep 20 22:29:02 pi kernel: [ 404.852027] vpn: port 2(tap_soft) entered disabled state
  29. Sep 20 22:29:02 pi kernel: [ 404.852575] device tap_soft left promiscuous mode
  30. Sep 20 22:29:02 pi kernel: [ 404.852608] vpn: port 2(tap_soft) entered disabled state
  31. Sep 20 22:29:02 pi ifplugd(tap_soft)[2188]: Exiting.
  32. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: ifplugd 0.28 initializing.
  33. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Using interface tap_soft/00:AC:D1:F2:1E:57 with driver <tun> (version: 1.6)
  34. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Using detection mode: SIOCETHTOOL
  35. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Initialization complete, link beat detected.
  36. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Executing '/etc/ifplugd/ifplugd.action tap_soft up'.
  37. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: client: Ignoring unknown interface tap_soft=tap_soft.
  38. Sep 20 22:29:02 pi ifplugd(tap_soft)[2357]: Program executed successfully.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement