[SOLUCIONADO] PfSense e Imagenio
-
No dije nada, ya carga la guia. Supongo que habrá que esperar. Lo dejé asi sin cargar la guia y despues de unos minutos veo que la guia la carga.
Lo que no puedo ver son las series o peliculas del yomvi, se queda cargando el anuncio previo antes de ver del capitulo o pelicula.
-
Otra vez se ha modificado la ruta, esta vez estaba viendo la tele cuando paso, estoy mirando los logs y veo que a las 22:00 se inicio un proceso de renovación de DHCP en el interfaz de VOIP.
Esto es lo que he sacado de log pero no se interpretarlo, he resaltado una linea que me llama la atención sobre el interfaz de TV (ImagenioWAN en mi config).
Por el momento he añadido una ruta estatica para 172.26.23.3 y espero que no se modifique, pero me gustaría saber que esta pasando.Nov 15 22:00:19 firewall dhclient: EXPIRE
Nov 15 22:00:19 firewall dhclient: Deleting old routes
Nov 15 22:00:19 firewall dhclient: PREINIT
Nov 15 22:00:19 firewall dhclient: ARPSEND
Nov 15 22:00:19 firewall kernel: arpresolve: can't allocate llinfo for 10.26.x.x on em0_vlan3
Nov 15 22:00:21 firewall dhclient: ARPCHECK
Nov 15 22:00:21 firewall dhclient: BOUND
Nov 15 22:00:21 firewall kernel: arpresolve: can't allocate llinfo for 10.26.x.x on em0_vlan3
Nov 15 22:00:21 firewall dhclient: Starting add_new_address()
Nov 15 22:00:21 firewall dhclient: ifconfig em0_vlan3 inet 10.26.x.x netmask 255.255.224.0 broadcast 10.26.31.255
Nov 15 22:00:21 firewall dhclient: New IP Address (em0_vlan3): 10.26.x.x
Nov 15 22:00:21 firewall dhclient: New Subnet Mask (em0_vlan3): 255.255.224.0
Nov 15 22:00:21 firewall dhclient: New Broadcast Address (em0_vlan3): 10.26.31.255
Nov 15 22:00:21 firewall dhclient: New Routers (em0_vlan3): 10.26.x.x
Nov 15 22:00:21 firewall dhclient: Adding new routes to interface: em0_vlan3
Nov 15 22:00:21 firewall dhclient: Creating resolv.conf
Nov 15 22:00:21 firewall check_reload_status: rc.newwanip starting em0_vlan3
Nov 15 22:00:22 firewall php-fpm[6377]: /rc.newwanip: rc.newwanip: Info: starting on em0_vlan3.
Nov 15 22:00:22 firewall php-fpm[6377]: /rc.newwanip: rc.newwanip: on (IP address: 10.26.x.x) (interface: VOIPWAN[opt3]) (real interface: em0_vlan3).
Nov 15 22:00:23 firewall xinetd[25854]: Starting reconfiguration
Nov 15 22:00:23 firewall xinetd[25854]: Swapping defaults
Nov 15 22:00:23 firewall xinetd[25854]: readjusting service 6969-udp
Nov 15 22:00:23 firewall xinetd[25854]: Reconfigured: new=0 old=1 dropped=0 (services)
Nov 15 22:00:26 firewall dpinger: send_interval 500ms loss_interval 2000ms time_period 60000ms report_interval 0ms data_len 0 alert_interval 1000ms latency_alarm 500ms loss_alarm 20% dest_addr 10.64.y.y bind_addr
10.64.e.e identifier "ImagenioGW "
Nov 15 22:00:26 firewall dpinger: send_interval 500ms loss_interval 2000ms time_period 60000ms report_interval 0ms data_len 0 alert_interval 1000ms latency_alarm 500ms loss_alarm 20% dest_addr 192.168.144.1 bind_
addr 80.39.51.77 identifier "WAN_PPPOE "
Nov 15 22:00:26 firewall dpinger: send_interval 500ms loss_interval 2000ms time_period 60000ms report_interval 0ms data_len 0 alert_interval 1000ms latency_alarm 500ms loss_alarm 20% dest_addr 10.26.x.x bind_addr
10.26.8.44 identifier "VOIPWAN_DHCP "
Nov 15 22:00:27 firewall dhcpd: Internet Systems Consortium DHCP Server 4.3.4
Nov 15 22:00:27 firewall dhcpd: Copyright 2004-2016 Internet Systems Consortium.
Nov 15 22:00:27 firewall dhcpd: All rights reserved.
Nov 15 22:00:27 firewall dhcpd: For info, please visit https://www.isc.org/software/dhcp/
Nov 15 22:00:27 firewall dhcpd: Config file: /etc/dhcpd.conf
Nov 15 22:00:27 firewall dhcpd: Database file: /var/db/dhcpd.leases
Nov 15 22:00:27 firewall dhcpd: Internet Systems Consortium DHCP Server 4.3.4
Nov 15 22:00:27 firewall dhcpd: PID file: /var/run/dhcpd.pid
Nov 15 22:00:27 firewall dhcpd: Copyright 2004-2016 Internet Systems Consortium.
Nov 15 22:00:27 firewall dhcpd: All rights reserved.
Nov 15 22:00:27 firewall dhcpd: For info, please visit https://www.isc.org/software/dhcp/
Nov 15 22:00:27 firewall dhcpd: Wrote 0 deleted host decls to leases file.
Nov 15 22:00:27 firewall dhcpd: Wrote 0 new dynamic host decls to leases file.
Nov 15 22:00:27 firewall dhcpd: Wrote 64 leases to leases file.
Nov 15 22:00:27 firewall dhcpd: Listening on BPF/re1_vlan104/
Nov 15 22:00:27 firewall dhcpd: Sending on BPF/re1_vlan104/
Nov 15 22:00:27 firewall dhcpd: Listening on BPF/re0/
Nov 15 22:00:27 firewall dhcpd: Sending on BPF/re0/
Nov 15 22:00:27 firewall dhcpd: Listening on BPF/em1/
Nov 15 22:00:27 firewall dhcpd: Sending on BPF/em1/
Nov 15 22:00:27 firewall dhcpd: Sending on Socket/fallback/fallback-net
Nov 15 22:00:27 firewall dhcpd: Server starting service.
Nov 15 22:00:28 firewall php-fpm[6377]: /rc.newwanip: Resyncing OpenVPN instances for interface VOIPWAN.
Nov 15 22:00:28 firewall php-fpm[6377]: /rc.newwanip: Creating rrd update script
Nov 15 22:00:28 firewall igmpproxy[46120]: select() failure; Errno(4): Interrupted system call
Nov 15 22:00:28 firewall php-fpm[6377]: /rc.newwanip: Started IGMP proxy service.
Nov 15 22:00:29 firewall dpinger: ImagenioGW 10.64.0.1: Alarm latency 0us stddev 0us loss 100%
Nov 15 22:00:29 firewall check_reload_status: updating dyndns ImagenioGW
Nov 15 22:00:29 firewall check_reload_status: Restarting ipsec tunnels
Nov 15 22:00:29 firewall check_reload_status: Restarting OpenVPN tunnels/interfaces
Nov 15 22:00:29 firewall check_reload_status: Reloading filter
Nov 15 22:00:29 firewall dpinger: VOIPWAN_DHCP 10.26.x.x: Alarm latency 0us stddev 0us loss 100%
Nov 15 22:00:29 firewall dpinger: WAN_PPPOE 192.168.144.1: Alarm latency 0us stddev 0us loss 100%
Nov 15 22:00:29 firewall check_reload_status: updating dyndns WAN_PPPOE
Nov 15 22:00:29 firewall check_reload_status: Restarting ipsec tunnels
Nov 15 22:00:29 firewall check_reload_status: Restarting OpenVPN tunnels/interfaces
Nov 15 22:00:29 firewall check_reload_status: Reloading filter
Nov 15 22:00:30 firewall php-fpm[23634]: /rc.openvpn: OpenVPN: One or more OpenVPN tunnel endpoints may have changed its IP. Reloading endpoints that may use ImagenioGW.
Nov 15 22:00:30 firewall xinetd[25854]: Starting reconfiguration
Nov 15 22:00:30 firewall xinetd[25854]: Swapping defaults
Nov 15 22:00:30 firewall xinetd[25854]: readjusting service 6969-udp
Nov 15 22:00:30 firewall xinetd[25854]: Reconfigured: new=0 old=1 dropped=0 (services)
Nov 15 22:00:30 firewall php-fpm[6377]: /rc.newwanip: pfSense package system has detected an IP change or dynamic WAN reconnection - 10.26.y.y -> 10.26.y.y - Restarting packages.
Nov 15 22:00:30 firewall check_reload_status: Starting packages
Nov 15 22:00:30 firewall php-fpm[6377]: /rc.dyndns.update: phpDynDNS (asterix.mydomain.net): No change in my IP address and/or 25 days has not passed. Not updating dynamic DNS entry.
Nov 15 22:00:30 firewall snmpd[10820]: disk_OS_get_disks: adding device 'ada0' to device list
Nov 15 22:00:31 firewall php-fpm[12394]: /rc.openvpn: OpenVPN: One or more OpenVPN tunnel endpoints may have changed its IP. Reloading endpoints that may use WAN_PPPOE.
Nov 15 22:00:34 firewall xinetd[25854]: Starting reconfiguration
Nov 15 22:00:34 firewall xinetd[25854]: Swapping defaults
Nov 15 22:00:34 firewall xinetd[25854]: readjusting service 6969-udp
Nov 15 22:00:34 firewall xinetd[25854]: Reconfigured: new=0 old=1 dropped=0 (services)
Nov 15 22:00:35 firewall php-fpm[12461]: [pfBlockerNG] Starting cron process.esto es mi crontab:
minute hour mday month wday who command Add
1,31 0-5 * * * root /usr/bin/nice -n20 adjkerntz -a
1 3 1 * * root /usr/bin/nice -n20 /etc/rc.update_bogons.sh
*/60 * * * * root /usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 sshlockout
*/60 * * * * root /usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 webConfiguratorlockout
1 1 * * * root /usr/bin/nice -n20 /etc/rc.dyndns.update
*/60 * * * * root /usr/bin/nice -n20 /usr/local/sbin/expiretable -v -t 3600 virusprot
30 12 * * * root /usr/bin/nice -n20 /etc/rc.update_urltables
*/5 * * * * root /usr/bin/nice -n20 /usr/local/bin/php -f /usr/local/pkg/snort/snort_check_cron_misc.inc
*/5 * * * * root /usr/bin/nice -n20 /sbin/pfctl -q -t snort2c -T expire 3600
39 0,12 * * * root /usr/bin/nice -n20 /usr/local/bin/php -f /usr/local/pkg/snort/snort_check_for_rule_updates.php
15 0 * * * root /usr/local/pkg/swapstate_check.php
0 * * * * root /usr/local/bin/php /usr/local/www/pfblockerng/pfblockerng.php cron >> /var/log/pfblockerng/pfblockerng.log 2>&1
0 8 1-7 * * root /usr/local/bin/php /usr/local/www/pfblockerng/pfblockerng.php dcc >> /var/log/pfblockerng/extras.log 2>&1 -
Mediante DHCP se puede poner una ruta estatica con la opcion 121. ¿Que mediante el interface de voip te este forzando la ruta? Es posible pero me aprece muy heavy. Mete un wireshak hay filtrando los paquetes dhcp a ver que encuntras. No conozco a nadie que le pase esto pero todo es posible.
Si tu pones una ruta estatica manual en principio tiene preferencia sobre las otras. Pero desconozco si las staticas tienen preferencia sobrea las de la opcion 121. Prueba lode wireshark a ver si localizas algo y salimos de dudas
-
vuelvo a tener problemas con la guia. Salen todos los canales "Sin información" pero todas la funciones de MovistarTV estan disponobles, puedo ver mis grabaciones, series, etc.
La tabla de rutas esta bien.¿Alguna sugerencia?
-
Buenas tardes :
Después de leer el hilo varias veces durante varios días, no soy capaz de hacer funcionar IPTV de movistar a través de mi pfSense. La conexión WAN me funciona sin problemas, la VOIP no la he probado todavía, pero el IPTV no hay manera.
Tengo configurado el RIP (en los interfaces de VOIP y IPTV).
También tengo configurado el udpxy:
Server Process ID Accepting clients on Multicast address Active clients
25352 192.168.20.1:4000 10.64.122.110 0Os pego a continuación información de mi config :
*** Welcome to pfSense 2.3.2-RELEASE-p1 (amd64 full-install) on pfSense ***
WAN (wan) -> pppoe0 -> v4/PPPoE: 80.xx.xx.xx/32
LAN (lan) -> vtnet0 -> v4: 192.168.20.1/24
VOIP (opt1) -> vtnet1_vlan3 -> v4/DHCP4: 10.26.167.138/19
IPTV (opt2) -> vtnet1_vlan2 -> v4: 10.64.122.110/10–-- IPv4 Routes ----
Destination Gateway Flags Use Mtu Netif Expire
default 80.xx.xx.xx UGS 1703314 1492 pppoe0
10.0.10.1 link#11 UH 0 1500 ovpnc1
10.0.10.2 127.0.0.1 UH 0 16384 lo0
10.26.160.0/19 link#8 U 66031 1500 vtnet1_vlan3
10.26.167.138 link#8 UHS 0 16384 lo0
10.64.0.0/10 link#9 U 66031 1500 vtnet1_vlan2
10.64.122.110 link#9 UHS 0 16384 lo0
80.xx.xx.xx 127.0.0.1 UH 0 16384 lo0
80.xx.xx.xx 80.xx.xx.xx UGHS 6556 1492 pppoe0
80.xx.xx.xx 80.xx.xx.xx UGHS 6578 1492 pppoe0
80.xx.xx.xx link#10 UH 66024 1492 pppoe0
127.0.0.1 link#6 UH 2572 16384 lo0
172.26.22.0/26 10.64.0.1 UG 0 1500 vtnet1_vlan2
172.26.22.56/29 10.64.0.1 UG 0 1500 vtnet1_vlan2
172.26.23.0/27 10.64.0.1 UG 4 1500 vtnet1_vlan2
172.26.23.4 10.64.0.1 UGH 0 1500 vtnet1_vlan2
172.26.23.5 10.64.0.1 UGH 0 1500 vtnet1_vlan2
172.26.23.23 10.64.0.1 UGH 0 1500 vtnet1_vlan2
172.26.23.24 10.64.0.1 UGH 0 1500 vtnet1_vlan2
172.26.23.30 10.64.0.1 UGH 0 1500 vtnet1_vlan2
172.26.80.0/21 10.64.0.1 UG 0 1500 vtnet1_vlan2
192.168.0.0/24 192.168.20.2 UGS 15 1500 vtnet0
192.168.1.0/24 10.0.10.1 UGS 1695835 1500 ovpnc1
192.168.20.0/24 link#1 U 4481213 1500 vtnet0
192.168.20.1 link#1 UHS 0 16384 lo0---- IGMP Proxy
Name Type Values Description
IPTV upstream 172.26.0.0/16, 239.0.0.0/8, 10.0.0.0/8, 239.0.0.0/16, 172.0.0.0/8, 192.168.20.0/24, 224.0.0.0/4 Multicast IMAGENIO
LAN downstream 192.168.20.0/24 Multicast TVTengo una única LAN (192.168.20.0/24) donde están los PC's, el Deco de Movistar y una RPI con KODI y el addon de movistar. Con el router de movistar me funciona todo (RPI/KODI y Deco), Con el pfSense no me funciona ninguna de las dos opciones de TV. Internet va de lujo con 300/300 y la VOIP no la he probado aún.
Alguna pista por donde pueda empezar a buscar ? estoy un poco desesperado, he probado también con el pfSense 2.2 y tengo los mismos síntomas.
Muchas gracias !!
-
Has configurado las reglas avanzadas del firewall?
-
Hola donizt, gracias por contestar.
Si, las reglas las tengo configuradas según el PDF de ayuda. Desconozco si hay alguna versión actualizada del PDF para la pfSense 2.3, aunque lo más seguro es que estoy haciendo algo mal…
Te adjunto pantallazos de las configuraciónes de las reglas de firewall para los interfaces LAN y IPTV.
Gracias y saludos.
-
No parece que tengas trafico de video por la inerface iptv… a ver si haviendo algunas pruebas nos da mas pistas de pasa:
Ejecuta en igmprocy en modo debug en consola e intenta ver video, deberias ver como los join del igmp de lan pasan a iptv o incluso ver si en al propia ejecucion del servicio ves algo raro
Ttambien en paralelo haz un tcpdump del interface iptv a ver que trafico tenemos por alli.
Por otro lado revisa primero si tienes un switch de capa2 que no este bloqueado el trafico igmp que algunos lo tienen bloqueados de fabrica
-
Hola Donitz :
Te pego info del tcpdump :
[2.3.2-RELEASE][root@pfSense.localdomain]/root: tcpdump -i vtnet1_vlan2 udp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vtnet1_vlan2, link-type EN10MB (Ethernet), capture size 65535 bytes
17:49:50.597525 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:50:19.637006 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:50:45.634217 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:51:14.631415 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:51:49.619338 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:52:14.587789 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:52:39.625520 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:53:11.604725 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:53:42.621564 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:54:17.629887 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:54:45.630872 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:55:15.614802 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:55:43.612760 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:56:12.621687 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:56:40.600827 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:57:06.619058 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:57:33.578170 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:58:06.636669 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
17:58:39.631676 IP 10.64.0.1.router > rip2-routers.mcast.net.router: RIPv2, Response, length: 184
^C
19 packets captured
1181 packets received by filter
0 packets dropped by kernelAqui la información del igmpproxy
[2.3.2-RELEASE][root@pfSense.localdomain]/root: igmpproxy -d -vv /tmp/igmpproxy.conf
Searching for config file at '/tmp/igmpproxy.conf'
Config: Quick leave mode enabled.
Config: Got a phyint token.
Config: IF: Config for interface vtnet1_vlan2.
Config: IF: Got upstream token.
Config: IF: Got ratelimit token '0'.
Config: IF: Got threshold token '1'.
Config: IF: Got altnet token 172.26.0.0/16.
Config: IF: Altnet: Parsed altnet to 172.26/16.
Config: IF: Got altnet token 239.0.0.0/8.
Config: IF: Altnet: Parsed altnet to 239/8.
Config: IF: Got altnet token 10.0.0.0/8.
Config: IF: Altnet: Parsed altnet to 10/8.
Config: IF: Got altnet token 239.0.0.0/16.
Config: IF: Altnet: Parsed altnet to 239.0/16.
Config: IF: Got altnet token 172.0.0.0/8.
Config: IF: Altnet: Parsed altnet to 172/8.
Config: IF: Got altnet token 192.168.20.0/24.
Config: IF: Altnet: Parsed altnet to 192.168.20/24.
Config: IF: Got altnet token 224.0.0.0/4.
Config: IF: Altnet: Parsed altnet to 224/4.
IF name : vtnet1_vlan2
Next ptr : 0
Ratelimit : 0
Threshold : 1
State : 1
Allowednet ptr : 1017050
Config: Got a phyint token.
Config: IF: Config for interface vtnet0.
Config: IF: Got downstream token.
Config: IF: Got ratelimit token '0'.
Config: IF: Got threshold token '1'.
Config: IF: Got altnet token 192.168.20.0/24.
Config: IF: Altnet: Parsed altnet to 192.168.20/24.
IF name : vtnet0
Next ptr : 0
Ratelimit : 0
Threshold : 1
State : 2
Allowednet ptr : 10170c0
Config: Got a phyint token.
Config: IF: Config for interface pppoe0.
Config: IF: Got disabled token.
IF name : pppoe0
Next ptr : 0
Ratelimit : 0
Threshold : 1
State : 0
Allowednet ptr : 0
Config: Got a phyint token.
Config: IF: Config for interface vtnet1_vlan3.
Config: IF: Got disabled token.
IF name : vtnet1_vlan3
Next ptr : 0
Ratelimit : 0
Threshold : 1
State : 0
Allowednet ptr : 0
buildIfVc: Interface vtnet0 Addr: 192.168.20.1, Flags: 0xffff8843, Network: 192.168.20/24
buildIfVc: Interface lo0 Addr: 127.0.0.1, Flags: 0xffff8049, Network: 127/8
buildIfVc: Interface vtnet1_vlan3 Addr: 10.26.167.138, Flags: 0xffff8843, Network: 10.26.160/19
buildIfVc: Interface vtnet1_vlan2 Addr: 10.64.122.110, Flags: 0xffff8843, Network: 10.64/10
buildIfVc: Interface pppoe0 Addr: 80.xx.xx.xx, Flags: 0xffff88d1, Network: 80.xx.xx.xx/32
Found config for vtnet0
Found config for vtnet1_vlan3
Found config for vtnet1_vlan2
Found config for pppoe0
adding VIF, Ix 0 Fl 0x0 IP 0x0114a8c0 vtnet0, Threshold: 1, Ratelimit: 0
Network for [vtnet0] : 192.168.20/24
Network for [vtnet0] : 192.168.20/24
adding VIF, Ix 1 Fl 0x0 IP 0x8aa71a0a vtnet1_vlan3, Threshold: 1, Ratelimit: 0
Network for [vtnet1_vlan3] : 10.26.160/19
adding VIF, Ix 2 Fl 0x0 IP 0x6e7a400a vtnet1_vlan2, Threshold: 1, Ratelimit: 0
Network for [vtnet1_vlan2] : 10.64/10
Network for [vtnet1_vlan2] : 172.26/16
Network for [vtnet1_vlan2] : 239/8
Network for [vtnet1_vlan2] : 10/8
Network for [vtnet1_vlan2] : 239.0/16
Network for [vtnet1_vlan2] : 172/8
Network for [vtnet1_vlan2] : 192.168.20/24
Network for [vtnet1_vlan2] : 224/4
adding VIF, Ix 3 Fl 0x0 IP 0xaefc1c50 pppoe0, Threshold: 1, Ratelimit: 0
Network for [pppoe0] : 80.xx.xx.xx/32
Got 262144 byte buffer size in 0 iterations
Joining all-routers group 224.0.0.2 on vif 192.168.20.1
joinMcGroup: 224.0.0.2 on vtnet0
SENT Membership query from 192.168.20.1 to 224.0.0.1
Sent membership query from 192.168.20.1 to 224.0.0.1. Delay: 10
Created timeout 1 (#0) - delay 10 secs
(Id:1, Time:10)
Created timeout 2 (#1) - delay 21 secs
(Id:1, Time:10)
(Id:2, Time:21)
RECV Membership query from 192.168.20.1 to 224.0.0.1
Route activate request from 192.168.20.3 to 239.255.255.250
No table entry for 239.255.255.250 [From: 192.168.20.3]. Inserting route.
No existing route for 239.255.255.250. Create new.
No routes in table. Insert at beginning.
Inserted route table entry for 239.255.255.250 on VIF #-1
No downstream listeners for group 239.255.255.250. No join sent.Current routing table (Insert Route):
–---------------------------------------------------
#0: Src: 0.0.0.0, Dst: 239.255.255.250, Age:2, St: I, OutVifs: 0x00000000Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
About to call timeout 1 (#0)
Aging routes in table.Current routing table (Age active routes):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
About to call timeout 2 (#0)
SENT Membership query from 192.168.20.1 to 224.0.0.1
Sent membership query from 192.168.20.1 to 224.0.0.1. Delay: 10
Created timeout 3 (#0) - delay 10 secs
(Id:3, Time:10)
Created timeout 4 (#1) - delay 21 secs
(Id:3, Time:10)
(Id:4, Time:21)
RECV Membership query from 192.168.20.1 to 224.0.0.1
About to call timeout 3 (#0)
Aging routes in table.
Removing group 239.255.255.250. Died of old age.
Removed route entry for 239.255.255.250 from table.
Vif bits : 0x00000000
Removing MFC: 192.168.20.3 -> 239.255.255.250, InpVIf: 2
MRT_DEL_MFC; Errno(49): Can't assign requested addressCurrent routing table (Remove route):
No routes in table...
Current routing table (Age active routes):
No routes in table...
Route activate request from 192.168.20.3 to 239.255.255.250
No table entry for 239.255.255.250 [From: 192.168.20.3]. Inserting route.
No existing route for 239.255.255.250. Create new.
No routes in table. Insert at beginning.
Inserted route table entry for 239.255.255.250 on VIF #-1
No downstream listeners for group 239.255.255.250. No join sent.Current routing table (Insert Route):
–---------------------------------------------------
#0: Src: 0.0.0.0, Dst: 239.255.255.250, Age:2, St: I, OutVifs: 0x00000000Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
About to call timeout 4 (#0)
SENT Membership query from 192.168.20.1 to 224.0.0.1
Sent membership query from 192.168.20.1 to 224.0.0.1. Delay: 10
Created timeout 5 (#0) - delay 10 secs
(Id:5, Time:10)
Created timeout 6 (#1) - delay 115 secs
(Id:5, Time:10)
(Id:6, Time:115)
RECV Membership query from 192.168.20.1 to 224.0.0.1
Route activate request from 192.168.20.3 to 239.255.255.250Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
About to call timeout 5 (#0)
Aging routes in table.Current routing table (Age active routes):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
About to call timeout 6 (#0)
SENT Membership query from 192.168.20.1 to 224.0.0.1
Sent membership query from 192.168.20.1 to 224.0.0.1. Delay: 10
Created timeout 7 (#0) - delay 10 secs
(Id:7, Time:10)
Created timeout 8 (#1) - delay 115 secs
(Id:7, Time:10)
(Id:8, Time:115)
RECV Membership query from 192.168.20.1 to 224.0.0.1
Route activate request from 192.168.20.3 to 239.255.255.250Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
About to call timeout 7 (#0)
Aging routes in table.
Removing group 239.255.255.250. Died of old age.
Removed route entry for 239.255.255.250 from table.
Vif bits : 0x00000000
Removing MFC: 192.168.20.3 -> 239.255.255.250, InpVIf: 2
MRT_DEL_MFC; Errno(49): Can't assign requested addressCurrent routing table (Remove route):
No routes in table...
Current routing table (Age active routes):
No routes in table...
Route activate request from 192.168.20.3 to 239.255.255.250
No table entry for 239.255.255.250 [From: 192.168.20.3]. Inserting route.
No existing route for 239.255.255.250. Create new.
No routes in table. Insert at beginning.
Inserted route table entry for 239.255.255.250 on VIF #-1
No downstream listeners for group 239.255.255.250. No join sent.Current routing table (Insert Route):
–---------------------------------------------------
#0: Src: 0.0.0.0, Dst: 239.255.255.250, Age:2, St: I, OutVifs: 0x00000000Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
About to call timeout 8 (#0)
SENT Membership query from 192.168.20.1 to 224.0.0.1
Sent membership query from 192.168.20.1 to 224.0.0.1. Delay: 10
Created timeout 9 (#0) - delay 10 secs
(Id:9, Time:10)
Created timeout 10 (#1) - delay 115 secs
(Id:9, Time:10)
(Id:10, Time:115)
RECV Membership query from 192.168.20.1 to 224.0.0.1
Route activate request from 192.168.20.3 to 239.255.255.250Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
About to call timeout 9 (#0)
Aging routes in table.Current routing table (Age active routes):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.5 to 239.255.255.250
The origin for route 239.255.255.250 changed from 192.168.20.3 to 192.168.20.5Current routing table (Activate Route):
#0: Src: 192.168.20.5, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
The origin for route 239.255.255.250 changed from 192.168.20.5 to 192.168.20.3Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
About to call timeout 10 (#0)
SENT Membership query from 192.168.20.1 to 224.0.0.1
Sent membership query from 192.168.20.1 to 224.0.0.1. Delay: 10
Created timeout 11 (#0) - delay 10 secs
(Id:11, Time:10)
Created timeout 12 (#1) - delay 115 secs
(Id:11, Time:10)
(Id:12, Time:115)
RECV Membership query from 192.168.20.1 to 224.0.0.1
Route activate request from 192.168.20.3 to 239.255.255.250Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
About to call timeout 11 (#0)
Aging routes in table.
Removing group 239.255.255.250. Died of old age.
Removed route entry for 239.255.255.250 from table.
Vif bits : 0x00000000
Removing MFC: 192.168.20.3 -> 239.255.255.250, InpVIf: 2
MRT_DEL_MFC; Errno(49): Can't assign requested addressCurrent routing table (Remove route):
No routes in table...
Current routing table (Age active routes):
No routes in table...
Route activate request from 192.168.20.3 to 239.255.255.250
No table entry for 239.255.255.250 [From: 192.168.20.3]. Inserting route.
No existing route for 239.255.255.250. Create new.
No routes in table. Insert at beginning.
Inserted route table entry for 239.255.255.250 on VIF #-1
No downstream listeners for group 239.255.255.250. No join sent.Current routing table (Insert Route):
–---------------------------------------------------
#0: Src: 0.0.0.0, Dst: 239.255.255.250, Age:2, St: I, OutVifs: 0x00000000Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
About to call timeout 12 (#0)
SENT Membership query from 192.168.20.1 to 224.0.0.1
Sent membership query from 192.168.20.1 to 224.0.0.1. Delay: 10
Created timeout 13 (#0) - delay 10 secs
(Id:13, Time:10)
Created timeout 14 (#1) - delay 115 secs
(Id:13, Time:10)
(Id:14, Time:115)
RECV Membership query from 192.168.20.1 to 224.0.0.1
Route activate request from 192.168.20.3 to 239.255.255.250Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
About to call timeout 13 (#0)
Aging routes in table.Current routing table (Age active routes):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.5 to 239.255.255.250
The origin for route 239.255.255.250 changed from 192.168.20.3 to 192.168.20.5Current routing table (Activate Route):
#0: Src: 192.168.20.5, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
The origin for route 239.255.255.250 changed from 192.168.20.5 to 192.168.20.3Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
About to call timeout 14 (#0)
SENT Membership query from 192.168.20.1 to 224.0.0.1
Sent membership query from 192.168.20.1 to 224.0.0.1. Delay: 10
Created timeout 15 (#0) - delay 10 secs
(Id:15, Time:10)
Created timeout 16 (#1) - delay 115 secs
(Id:15, Time:10)
(Id:16, Time:115)
RECV Membership query from 192.168.20.1 to 224.0.0.1
Route activate request from 192.168.20.3 to 239.255.255.250Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
About to call timeout 15 (#0)
Aging routes in table.
Removing group 239.255.255.250. Died of old age.
Removed route entry for 239.255.255.250 from table.
Vif bits : 0x00000000
Removing MFC: 192.168.20.3 -> 239.255.255.250, InpVIf: 2
MRT_DEL_MFC; Errno(49): Can't assign requested addressCurrent routing table (Remove route):
No routes in table...
Current routing table (Age active routes):
No routes in table...
Route activate request from 192.168.20.3 to 239.255.255.250
No table entry for 239.255.255.250 [From: 192.168.20.3]. Inserting route.
No existing route for 239.255.255.250. Create new.
No routes in table. Insert at beginning.
Inserted route table entry for 239.255.255.250 on VIF #-1
No downstream listeners for group 239.255.255.250. No join sent.Current routing table (Insert Route):
–---------------------------------------------------
#0: Src: 0.0.0.0, Dst: 239.255.255.250, Age:2, St: I, OutVifs: 0x00000000Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
About to call timeout 16 (#0)
SENT Membership query from 192.168.20.1 to 224.0.0.1
Sent membership query from 192.168.20.1 to 224.0.0.1. Delay: 10
Created timeout 17 (#0) - delay 10 secs
(Id:17, Time:10)
Created timeout 18 (#1) - delay 115 secs
(Id:17, Time:10)
(Id:18, Time:115)
RECV Membership query from 192.168.20.1 to 224.0.0.1
Route activate request from 192.168.20.3 to 239.255.255.250Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
About to call timeout 17 (#0)
Aging routes in table.Current routing table (Age active routes):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
About to call timeout 18 (#0)
SENT Membership query from 192.168.20.1 to 224.0.0.1
Sent membership query from 192.168.20.1 to 224.0.0.1. Delay: 10
Created timeout 19 (#0) - delay 10 secs
(Id:19, Time:10)
Created timeout 20 (#1) - delay 115 secs
(Id:19, Time:10)
(Id:20, Time:115)
RECV Membership query from 192.168.20.1 to 224.0.0.1
Route activate request from 192.168.20.3 to 239.255.255.250Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:1, St: A, OutVifs: 0x00000000
About to call timeout 19 (#0)
Aging routes in table.
Removing group 239.255.255.250. Died of old age.
Removed route entry for 239.255.255.250 from table.
Vif bits : 0x00000000
Removing MFC: 192.168.20.3 -> 239.255.255.250, InpVIf: 2
MRT_DEL_MFC; Errno(49): Can't assign requested addressCurrent routing table (Remove route):
No routes in table...
Current routing table (Age active routes):
No routes in table...
Route activate request from 192.168.20.3 to 239.255.255.250
No table entry for 239.255.255.250 [From: 192.168.20.3]. Inserting route.
No existing route for 239.255.255.250. Create new.
No routes in table. Insert at beginning.
Inserted route table entry for 239.255.255.250 on VIF #-1
No downstream listeners for group 239.255.255.250. No join sent.Current routing table (Insert Route):
–---------------------------------------------------
#0: Src: 0.0.0.0, Dst: 239.255.255.250, Age:2, St: I, OutVifs: 0x00000000Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.3 to 239.255.255.250
Current routing table (Activate Route):
#0: Src: 192.168.20.3, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
Route activate request from 192.168.20.5 to 239.255.255.250
The origin for route 239.255.255.250 changed from 192.168.20.3 to 192.168.20.5Current routing table (Activate Route):
#0: Src: 192.168.20.5, Dst: 239.255.255.250, Age:2, St: A, OutVifs: 0x00000000
^Cselect() failure; Errno(4): Interrupted system call
Got a interupt signal. Exiting.
clean handler called
Removing route entry for 239.255.255.250
Vif bits : 0x00000000
Removing MFC: 192.168.20.5 -> 239.255.255.250, InpVIf: 2
MRT_DEL_MFC; Errno(49): Can't assign requested address
All routes removed. Routing table is empty.
Shutdown complete.... -
Pues no veo anda raro que explique por que no te funciona… el pfsense corre en un host fisico o virtualizado? tienes la ont directa al nic del pfsense?
-
Hola donizt :
El pfSense corre en un host virtualizado (KVM, proxmox) y la ont está directamente conectada con un cable a uno de los interfaces físicos del servidor proxmox, que a su vez está dedicado como interfaz externo (virtio) al pfsense.
De todas formas, me parece rarisimo que internet me funcione de maravilla, sin embargo la IPTV no hay manera…
Gracias !!
-
No conozco promox pero revisa en la configuración de los servidores de virtualizacion que no se este filtrando el trafico multicast en vmware hay una opcion para permitir trafico multicast que por defecto viene activada. Revisa que no tengas algo parecido por que lo que parece es que en la vlan de imagenio no hay nada de trafico multicast.
-
mirando en google veo que hay que hacer algunas cosas para que el multicast funcione
http://pve.proxmox.com/wiki/Multicast_notes
https://forum.proxmox.com/threads/multicast-is-there-a-test-to-check.8165/
https://forum.proxmox.com/threads/multicast-problem-solved-enabling-promisc-mode.27082/Al configuración del pfsense aparentemente esta bien. Mínimo deberias tener trafico multicast en la interfave iptv me parece que el problema es externo al pfsense
-
Hola que tal?
Ante todo agradecer a todo la gente del foro la ayuda que están prestando a la comunidad.
Reabro este hilo en vez de crear uno nuevo, porque todos los enlaces de google vienen aquí y tengo un poco de confusión…
¿alguien tiene todo configurado y que le funcione correctamente?
ya que el manual elaborado por donizt en pdf tiene unas pautas a seguir, pero luego él mismo comenta que hay un fallo con el igm-prozy, ¿se actualizó el manual o es la priemra versión?
yo actualmente tengo:
ONT --- pfsense con las 3vlan creadas pero no logro hacer que funcione ni voip ni iptv.
Miento, iptv me llegó a funcionar por vlc, pero el deco arris se queda en negro (leí que hay que conectarlo directamente sin pasar por swtiches para evitar el multicast en todos los puntos de red, pero me pierdo un poco.
si añado una segunda interface conectada directamente al deco... con qué parametros? ip fija? puerta de enlace específica? ¿que reglas le meto en el firewall para asignarla al decodificador?Y luego está el tema de voip... en el manual sólo dice que configures la vlan, y nada más. ¿Es necesario alguna otra configuración?
Estoy haciendo capturas de pantalla de todo, para que una vez vaya todo, poder ampliar el manual.saludos
-
Hola elhits :
Yo sigo sin conseguir hacer funcionar IPTV y VOIP. El resto me funciona perfecto y sin problemas. Lo único es que lo tengo virtualizado con KVM y el problema puede estar en el multicast, pero no he dado con ello.
En cualquier caso, puedo disponer de una máquina dedicada con dos intergaces GBit, para instalar desde cero y realizar pruebas. Me encantaría tener todo funcionando con pfSense.
Cualquier cosa, me comentas.
-
Muy buenas, comento un poco la situación actual:
Actualmente el sistema funciona completamente, tanto la voip, el imagenio y demás. La guia en pdf no esta actualizada pero básicamente por lo único que hay que cambiar son las ips de upstream del interface imageneio en el igmpproxy -172.26.0.0/16, 239.0.0.0/8, 10.0.0.0/8, 239.0.0.0/16, 172.0.0.0/8-
En cuanto a tener el pfsense virtualizado, en mi caso tengo 4 sistemas distintos para familiares y amigos todos virtualizados con vmware esxi y corriendo sin problemas. Pero no he sido capaz de hacerlo funcionar con promox, el trafico multicast no llega a las maquinas virtuales y cuando busque información vi que había muchos casos parecido y decidí volver al vmware.
Mas cosillas, la Voip funciona perfectamente y es una gozada montar una centralita ip y y el telefono conectado al pfsense por openvpn y que las llamadas movil->fijo salgan por el el teléfono de casa via vpn y con la linea de 200MB esa que dan extra que no vale de nada meterla en la centralita y que las fijo->movil salgan por esa tarjeta…. :-)
Todo este sistema en principio solo funciona si la ONT esta por separa del router, por lo visto movistar lleva un tiempo montando un sistema que es todo junto, en ese caso creo que no se puede hacer nada al estar todo integrado, pero no conozco a nadie que se lo pusieran todo integrado y no he podido meterle mano.
-Esta parte es opcional y no afecta al funcionamiento standart-
Si alguien quiere montar un servidor como tvheanded (lo cual recomiendo) se puede montar en otra maquina y recomiendo mirar la pagina de http://www.luispa.com/ que aunque no use pfsense (lo monta todo con gentoo) si da mucha informacion para afinarlo mucho sobre todo en cuanto a la dns de imagenio para el epg. (Nota: olvidaros de hacer un ping a la dns de imagenio 172.26.23.3 que no responde)
Para comprobar que las dns las esta resolviendo correctamente el dominio svc.imagenio.telefonica.net y tv.movistar.es deben apuntar a 172.26.23.3 De no ser asi se meten en la seccion Domain Overrrides dentro del DNS Forwader
-Fin de la parte opcional-Mi recomendación para gente que lo monte de 0 siguiendo los pasos de la guia es que primero monte bien todas las interfaces y el dhcp de voip le de ip y despues seguir con l aparte de imagenio comprobar que el igmpproxy esta haciendo su trabajo haciendo un tcpdump al interface imganeio cuando alguien pida video por molticast (el vlc por ejemplo) si todo ba bien deben empezar a aparecer trafico multicast en el tcpdump. Si eso es asi la cosa tiene buena pinta.
Si no se ve trafico multicast parar y revisar bien las cosas antes de continuar. -
Gracias por tus comentarios, donizt.
Hace una semana, me armé de paciencia y monté en un servidor físico con dos puertos gbit, con pfsense 2.3.4. Seguí los pasos y después de varias pruebas y algunas modificaciones, lo tuve funcionando, con imagenio incluido. Todo fenomenal. Después volví a crear una nueva máquina virtual desde cero en proxmox, seguí los mismos pasos realizados en el servidor físico y… FUNCIONANDO !!! Todavía me queda configurar la parte de VoIP, en breve me podré con ello y te iré comentando.
Saludos.
-
Genial eres el primero que conozco que le funciona con promox, lo mismo al version que hay ahora soluciona lo del multicast de la version anterior, la verdad es que no lo he mirado, pero lo mirare por que promox tiene algunas cosas muy chulas que con vmware son de pago
enhorabuena
-
La guia en pdf no esta actualizada pero básicamente por lo único que hay que cambiar son las ips de upstream del interface imageneio en el igmpproxy -172.26.0.0/16, 239.0.0.0/8, 10.0.0.0/8, 239.0.0.0/16, 172.0.0.0/8-
Porque es necesario añadir todas esas ip al altnet del IGMP Proxy?
Las ips de multicast no creo que sean necesarias…. 239.0.0.0/8 no engloba a 239.0.0.0/16?
172.0.0.0/8 incluye redes publicas que no son telefonica...
Yo no he visto trafico multicast que venga de 10.0.0.0/8...A mi (cuando me funcionaba) me bastaba con 172.16.0.0/12 que seria el rango de red privada fuera de la subred de la VLAN.
Por otro lado a mi me funciono sin problemas pero en un momento dado que tuve que conectar el router de telefonica algo se debe haber actualizado y ahora no cargar el menu. He hecho una captura de paquetes y el desco se queda pillado intentando hablar con main.acs.telefonica.net:7008
20:24:56.772606 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 62: (tos 0x0, ttl 64, id 1352, offset 0, flags [none], proto ICMP (1), length 48) 192.168.128.1 > 192.168.128.250: ICMP echo request, id 61475, seq 0, length 28 20:24:57.777165 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 348: (tos 0x10, ttl 128, id 0, offset 0, flags [none], proto UDP (17), length 334) 192.168.128.1.67 > 192.168.128.250.68: [udp sum ok] BOOTP/DHCP, Reply, length 306, xid 0xb1bb421, Flags [none] (0x0000) Your-IP 192.168.128.250 Client-Ethernet-Address d4:04:cd:fc:34:b2 Vendor-rfc1048 Extensions Magic Cookie 0x63825363 DHCP-Message Option 53, length 1: Offer Server-ID Option 54, length 4: 192.168.128.1 Lease-Time Option 51, length 4: 42711 Subnet-Mask Option 1, length 4: 255.255.255.0 Default-Gateway Option 3, length 4: 192.168.128.1 Domain-Name-Server Option 6, length 8: 172.26.23.3,172.26.23.3 Domain-Name Option 15, length 3: "lan" T240 Option 240, length 21: 58.58.58.58.58.50.51.57.46.48.46.50.46.51.48.58.50.50.50.50.50 20:24:57.779907 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 348: (tos 0x10, ttl 128, id 0, offset 0, flags [none], proto UDP (17), length 334) 192.168.128.1.67 > 192.168.128.250.68: [udp sum ok] BOOTP/DHCP, Reply, length 306, xid 0xb1bb421, Flags [none] (0x0000) Your-IP 192.168.128.250 Client-Ethernet-Address d4:04:cd:fc:34:b2 Vendor-rfc1048 Extensions Magic Cookie 0x63825363 DHCP-Message Option 53, length 1: ACK Server-ID Option 54, length 4: 192.168.128.1 Lease-Time Option 51, length 4: 42710 Subnet-Mask Option 1, length 4: 255.255.255.0 Default-Gateway Option 3, length 4: 192.168.128.1 Domain-Name-Server Option 6, length 8: 172.26.23.3,172.26.23.3 Domain-Name Option 15, length 3: "lan" T240 Option 240, length 21: 58.58.58.58.58.50.51.57.46.48.46.50.46.51.48.58.50.50.50.50.50 20:24:58.491520 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:24:59.413491 d4:04:cd:fc:34:b2 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.128.1 tell 192.168.128.250, length 46 20:24:59.413501 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype ARP (0x0806), length 42: Ethernet (len 6), IPv4 (len 4), Reply 192.168.128.1 is-at 00:15:17:f5:c5:51, length 28 20:24:59.416240 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 83: (tos 0x0, ttl 64, id 53075, offset 0, flags [DF], proto UDP (17), length 69) 192.168.128.250.53095 > 172.26.23.3.53: [udp sum ok] 53880+ A? main.acs.telefonica.net. (41) 20:24:59.424717 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 99: (tos 0x20, ttl 58, id 57319, offset 0, flags [DF], proto UDP (17), length 85) 172.26.23.3.53 > 192.168.128.250.53095: [udp sum ok] 53880 q: A? main.acs.telefonica.net. 1/0/0 main.acs.telefonica.net. A 80.58.63.218 (57) 20:24:59.428857 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 48371, offset 0, flags [DF], proto TCP (6), length 60) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [s], cksum 0x61dc (correct), seq 3858199440, win 5840, options [mss 1460,sackOK,TS val 4294692707 ecr 0,nop,wscale 6], length 0 20:24:59.437825 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 70: (tos 0x0, ttl 250, id 1006, offset 0, flags [none], proto TCP (6), length 56) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [S.], cksum 0x4f3e (correct), seq 2480710678, ack 3858199441, win 4380, options [mss 1452,sackOK,TS val 2622117912 ecr 4294692707], length 0 20:24:59.440100 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 48372, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [.], cksum 0x6435 (correct), seq 1, ack 1, win 5840, options [nop,nop,TS val 4294692718 ecr 2622117912], length 0 20:24:59.441974 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 160: (tos 0x0, ttl 64, id 48373, offset 0, flags [DF], proto TCP (6), length 146) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [P.], cksum 0x84ea (correct), seq 1:95, ack 1, win 5840, options [nop,nop,TS val 4294692720 ecr 2622117912], length 94 20:24:59.450565 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 1494: (tos 0x0, ttl 250, id 16876, offset 0, flags [DF], proto TCP (6), length 1480) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [.], cksum 0x3b30 (correct), seq 1:1441, ack 95, win 4320, length 1440 20:24:59.450580 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 911: (tos 0x0, ttl 250, id 16877, offset 0, flags [DF], proto TCP (6), length 897) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [P.], cksum 0x8a16 (correct), seq 1441:2298, ack 95, win 4320, length 857 20:24:59.452093 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 48374, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [.], cksum 0x533b (correct), seq 95, ack 1441, win 8640, options [nop,nop,TS val 4294692730 ecr 2622117912], length 0 20:24:59.452106 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 48375, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [.], cksum 0x44a2 (correct), seq 95, ack 2298, win 11520, options [nop,nop,TS val 4294692730 ecr 2622117912], length 0 20:24:59.490572 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 264: (tos 0x0, ttl 64, id 48376, offset 0, flags [DF], proto TCP (6), length 250) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [P.], cksum 0x7a60 (correct), seq 95:293, ack 2298, win 11520, options [nop,nop,TS val 4294692769 ecr 2622117912], length 198 20:24:59.499290 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 17417, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [.], cksum 0x5bc9 (correct), seq 2298, ack 293, win 4612, length 0 20:24:59.501161 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 113: (tos 0x0, ttl 250, id 17440, offset 0, flags [DF], proto TCP (6), length 99) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [P.], cksum 0x280c (correct), seq 2298:2357, ack 293, win 4612, length 59 20:24:59.504563 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 407: (tos 0x0, ttl 64, id 48377, offset 0, flags [DF], proto TCP (6), length 393) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [P.], cksum 0x26f1 (correct), seq 293:634, ack 2357, win 11520, options [nop,nop,TS val 4294692782 ecr 2622117912], length 341 20:24:59.507437 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 103: (tos 0x0, ttl 64, id 48378, offset 0, flags [DF], proto TCP (6), length 89) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [P.], cksum 0xdd99 (correct), seq 634:671, ack 2357, win 11520, options [nop,nop,TS val 4294692783 ecr 2622117912], length 37 20:24:59.508311 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 1506: (tos 0x0, ttl 64, id 48379, offset 0, flags [DF], proto TCP (6), length 1492) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [.], cksum 0xc361 (correct), seq 671:2111, ack 2357, win 11520, options [nop,nop,TS val 4294692786 ecr 2622117912], length 1440 20:24:59.508436 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 903: (tos 0x0, ttl 64, id 48380, offset 0, flags [DF], proto TCP (6), length 889) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [P.], cksum 0x1320 (correct), seq 2111:2948, ack 2357, win 11520, options [nop,nop,TS val 4294692786 ecr 2622117912], length 837 20:24:59.508448 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 103: (tos 0x0, ttl 64, id 48381, offset 0, flags [DF], proto TCP (6), length 89) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [P.], cksum 0xe1eb (correct), seq 2948:2985, ack 2357, win 11520, options [nop,nop,TS val 4294692786 ecr 2622117912], length 37 20:24:59.513779 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 17552, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [.], cksum 0x58e4 (correct), seq 2357, ack 634, win 4953, length 0 20:24:59.516152 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 17594, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [.], cksum 0x589a (correct), seq 2357, ack 671, win 4990, length 0 20:24:59.517651 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 17606, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [.], cksum 0x46d0 (correct), seq 2357, ack 2948, win 7267, length 0 20:24:59.517664 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 17607, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [.], cksum 0x4686 (correct), seq 2357, ack 2985, win 7304, length 0 20:24:59.557504 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 939: (tos 0x0, ttl 250, id 18061, offset 0, flags [DF], proto TCP (6), length 925) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [P.], cksum 0x32a0 (correct), seq 2357:3242, ack 2985, win 7304, length 885 20:24:59.597387 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 48382, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [.], cksum 0x29d6 (correct), seq 2985, ack 3242, win 14400, options [nop,nop,TS val 4294692876 ecr 2622117912], length 0 20:24:59.646857 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 519: (tos 0x0, ttl 64, id 48383, offset 0, flags [DF], proto TCP (6), length 505) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [P.], cksum 0x92e9 (correct), seq 2985:3438, ack 3242, win 14400, options [nop,nop,TS val 4294692925 ecr 2622117912], length 453 20:24:59.656448 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 19287, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [.], cksum 0x3f87 (correct), seq 3242, ack 3438, win 7757, length 0 20:24:59.698548 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 427: (tos 0x0, ttl 250, id 19763, offset 0, flags [DF], proto TCP (6), length 413) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [P.], cksum 0x1729 (correct), seq 3242:3615, ack 3438, win 7757, length 373 20:24:59.699077 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 48384, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [.], cksum 0x1af7 (correct), seq 3438, ack 3615, win 17280, options [nop,nop,TS val 4294692977 ecr 2622117912], length 0 20:24:59.700701 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 48385, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [F.], cksum 0x1af4 (correct), seq 3438, ack 3615, win 17280, options [nop,nop,TS val 4294692979 ecr 2622117912], length 0 20:24:59.709917 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 19867, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [.], cksum 0x3e11 (correct), seq 3615, ack 3439, win 7757, length 0 20:24:59.710665 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 19880, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47445: Flags [F.], cksum 0x3e10 (correct), seq 3615, ack 3439, win 7757, length 0 20:24:59.711069 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47445 > 80.58.63.218.7008: Flags [.], cksum 0x1ae9 (correct), seq 3439, ack 3616, win 17280, options [nop,nop,TS val 4294692989 ecr 2622117912], length 0 20:25:04.494583 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:25:04.502327 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:25:14.870642 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:25:14.878386 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:25:24.888912 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:25:24.896525 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:25:28.821279 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 62: (tos 0x10, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 48) 192.168.128.250.50001 > 213.0.178.24.3478: [udp sum ok] UDP, length 20 20:25:28.913572 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 250, id 51637, offset 0, flags [DF], proto UDP (17), length 84) 213.0.178.24.3478 > 192.168.128.250.50001: [udp sum ok] UDP, length 56 20:25:28.916098 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 70: (tos 0x10, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 56) 192.168.128.250.50001 > 213.0.178.24.3478: [udp sum ok] UDP, length 28 20:25:29.917901 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 70: (tos 0x10, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 56) 192.168.128.250.50001 > 213.0.178.24.3478: [udp sum ok] UDP, length 28 20:25:29.973592 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 250, id 52697, offset 0, flags [DF], proto UDP (17), length 84) 213.0.178.24.3478 > 192.168.128.250.50001: [udp sum ok] UDP, length 56 20:25:29.979241 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 62: (tos 0x10, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 48) 192.168.128.250.50001 > 213.0.178.24.3478: [udp sum ok] UDP, length 20 20:25:30.037437 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 250, id 52698, offset 0, flags [DF], proto UDP (17), length 84) 213.0.178.24.3478 > 192.168.128.250.50001: [udp sum ok] UDP, length 56 20:25:30.045452 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 83: (tos 0x0, ttl 64, id 18171, offset 0, flags [DF], proto UDP (17), length 69) 192.168.128.250.41994 > 172.26.23.3.53: [udp sum ok] 31793+ A? main.acs.telefonica.net. (41) 20:25:30.056415 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 99: (tos 0x20, ttl 57, id 57320, offset 0, flags [DF], proto UDP (17), length 85) 172.26.23.3.53 > 192.168.128.250.41994: [udp sum ok] 31793 q: A? main.acs.telefonica.net. 1/0/0 main.acs.telefonica.net. A 80.58.63.218 (57) 20:25:30.061068 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 57281, offset 0, flags [DF], proto TCP (6), length 60) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [s], cksum 0x4a3d (correct), seq 1622382794, win 5840, options [mss 1460,sackOK,TS val 4294723339 ecr 0,nop,wscale 6], length 0 20:25:30.071410 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 70: (tos 0x0, ttl 250, id 15468, offset 0, flags [none], proto TCP (6), length 56) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [S.], cksum 0x6bd4 (correct), seq 2478426486, ack 1622382795, win 4380, options [mss 1452,sackOK,TS val 2530739224 ecr 4294723339], length 0 20:25:30.071938 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 57282, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [.], cksum 0x80cb (correct), seq 1, ack 1, win 5840, options [nop,nop,TS val 4294723350 ecr 2530739224], length 0 20:25:30.072311 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 160: (tos 0x0, ttl 64, id 57283, offset 0, flags [DF], proto TCP (6), length 146) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [P.], cksum 0xefa3 (correct), seq 1:95, ack 1, win 5840, options [nop,nop,TS val 4294723350 ecr 2530739224], length 94 20:25:30.083151 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 1494: (tos 0x0, ttl 250, id 57254, offset 0, flags [DF], proto TCP (6), length 1480) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [.], cksum 0x1640 (correct), seq 1:1441, ack 95, win 4320, length 1440 20:25:30.083166 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 911: (tos 0x0, ttl 250, id 57255, offset 0, flags [DF], proto TCP (6), length 897) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [P.], cksum 0xc4e2 (correct), seq 1441:2298, ack 95, win 4320, length 857 20:25:30.083804 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 57284, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [.], cksum 0x6fd1 (correct), seq 95, ack 1441, win 8640, options [nop,nop,TS val 4294723362 ecr 2530739224], length 0 20:25:30.083818 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 57285, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [.], cksum 0x6138 (correct), seq 95, ack 2298, win 11520, options [nop,nop,TS val 4294723362 ecr 2530739224], length 0 20:25:30.092674 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 264: (tos 0x0, ttl 64, id 57286, offset 0, flags [DF], proto TCP (6), length 250) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [P.], cksum 0x3054 (correct), seq 95:293, ack 2298, win 11520, options [nop,nop,TS val 4294723370 ecr 2530739224], length 198 20:25:30.103514 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 57511, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [.], cksum 0x9695 (correct), seq 2298, ack 293, win 4612, length 0 20:25:30.105513 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 113: (tos 0x0, ttl 250, id 57526, offset 0, flags [DF], proto TCP (6), length 99) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [P.], cksum 0xa403 (correct), seq 2298:2357, ack 293, win 4612, length 59 20:25:30.108290 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 407: (tos 0x0, ttl 64, id 57287, offset 0, flags [DF], proto TCP (6), length 393) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [P.], cksum 0xc305 (correct), seq 293:634, ack 2357, win 11520, options [nop,nop,TS val 4294723386 ecr 2530739224], length 341 20:25:30.108790 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 103: (tos 0x0, ttl 64, id 57288, offset 0, flags [DF], proto TCP (6), length 89) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [P.], cksum 0xfae6 (correct), seq 634:671, ack 2357, win 11520, options [nop,nop,TS val 4294723386 ecr 2530739224], length 37 20:25:30.109790 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 1506: (tos 0x0, ttl 64, id 57289, offset 0, flags [DF], proto TCP (6), length 1492) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [.], cksum 0x343e (correct), seq 671:2111, ack 2357, win 11520, options [nop,nop,TS val 4294723387 ecr 2530739224], length 1440 20:25:30.109802 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 919: (tos 0x0, ttl 64, id 57290, offset 0, flags [DF], proto TCP (6), length 905) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [P.], cksum 0x227a (correct), seq 2111:2964, ack 2357, win 11520, options [nop,nop,TS val 4294723387 ecr 2530739224], length 853 20:25:30.109816 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 103: (tos 0x0, ttl 64, id 57291, offset 0, flags [DF], proto TCP (6), length 89) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [P.], cksum 0xbeed (correct), seq 2964:3001, ack 2357, win 11520, options [nop,nop,TS val 4294723387 ecr 2530739224], length 37 20:25:30.119005 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 57669, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [.], cksum 0x93b0 (correct), seq 2357, ack 634, win 4953, length 0 20:25:30.119019 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 57670, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [.], cksum 0x9366 (correct), seq 2357, ack 671, win 4990, length 0 20:25:30.120504 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 57683, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [.], cksum 0x817c (correct), seq 2357, ack 2964, win 7283, length 0 20:25:30.120517 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 57684, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [.], cksum 0x8132 (correct), seq 2357, ack 3001, win 7320, length 0 20:25:30.182719 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 955: (tos 0x0, ttl 250, id 58458, offset 0, flags [DF], proto TCP (6), length 941) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [P.], cksum 0x3b11 (correct), seq 2357:3258, ack 3001, win 7320, length 901 20:25:30.187495 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 519: (tos 0x0, ttl 64, id 57292, offset 0, flags [DF], proto TCP (6), length 505) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [P.], cksum 0x1e8c (correct), seq 3001:3454, ack 3258, win 14400, options [nop,nop,TS val 4294723465 ecr 2530739224], length 453 20:25:30.198085 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 58641, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [.], cksum 0x7a23 (correct), seq 3258, ack 3454, win 7773, length 0 20:25:30.207080 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 427: (tos 0x0, ttl 250, id 58752, offset 0, flags [DF], proto TCP (6), length 413) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [P.], cksum 0x498f (correct), seq 3258:3631, ack 3454, win 7773, length 373 20:25:30.210107 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 57293, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [F.], cksum 0x37e5 (correct), seq 3454, ack 3631, win 17280, options [nop,nop,TS val 4294723488 ecr 2530739224], length 0 20:25:30.220697 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 58939, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [.], cksum 0x78ad (correct), seq 3631, ack 3455, win 7773, length 0 20:25:30.221071 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 58945, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47446: Flags [F.], cksum 0x78ac (correct), seq 3631, ack 3455, win 7773, length 0 20:25:30.221350 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47446 > 80.58.63.218.7008: Flags [.], cksum 0x37d9 (correct), seq 3455, ack 3632, win 17280, options [nop,nop,TS val 4294723499 ecr 2530739224], length 0 20:25:30.263297 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 328: (tos 0x0, ttl 250, id 52987, offset 0, flags [DF], proto UDP (17), length 314) 213.0.178.24.3478 > 192.168.128.250.50001: [udp sum ok] UDP, length 286 20:25:30.263421 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 328: (tos 0x0, ttl 250, id 52988, offset 0, flags [DF], proto UDP (17), length 314) 213.0.178.24.3478 > 192.168.128.250.50001: [udp sum ok] UDP, length 286 20:25:30.263671 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 328: (tos 0x0, ttl 250, id 52989, offset 0, flags [DF], proto UDP (17), length 314) 213.0.178.24.3478 > 192.168.128.250.50001: [udp sum ok] UDP, length 286 20:25:30.269073 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 83: (tos 0x0, ttl 64, id 18395, offset 0, flags [DF], proto UDP (17), length 69) 192.168.128.250.43048 > 172.26.23.3.53: [udp sum ok] 31863+ A? main.acs.telefonica.net. (41) 20:25:30.282536 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 99: (tos 0x20, ttl 58, id 57321, offset 0, flags [DF], proto UDP (17), length 85) 172.26.23.3.53 > 192.168.128.250.43048: [udp sum ok] 31863 q: A? main.acs.telefonica.net. 1/0/0 main.acs.telefonica.net. A 80.58.63.218 (57) 20:25:30.284315 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 24836, offset 0, flags [DF], proto TCP (6), length 60) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [s], cksum 0xf662 (correct), seq 629810926, win 5840, options [mss 1460,sackOK,TS val 4294723562 ecr 0,nop,wscale 6], length 0 20:25:30.293034 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 70: (tos 0x0, ttl 250, id 15860, offset 0, flags [none], proto TCP (6), length 56) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [S.], cksum 0x23c8 (correct), seq 2452662501, ack 629810927, win 4380, options [mss 1452,sackOK,TS val 3307465752 ecr 4294723562], length 0 20:25:30.295933 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 24837, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [.], cksum 0x38be (correct), seq 1, ack 1, win 5840, options [nop,nop,TS val 4294723574 ecr 3307465752], length 0 20:25:30.296308 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 160: (tos 0x0, ttl 64, id 24838, offset 0, flags [DF], proto TCP (6), length 146) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [P.], cksum 0xd14e (correct), seq 1:95, ack 1, win 5840, options [nop,nop,TS val 4294723574 ecr 3307465752], length 94 20:25:30.305274 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 1494: (tos 0x0, ttl 250, id 56041, offset 0, flags [DF], proto TCP (6), length 1480) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [.], cksum 0x769b (correct), seq 1:1441, ack 95, win 4320, length 1440 20:25:30.305289 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 911: (tos 0x0, ttl 250, id 56042, offset 0, flags [DF], proto TCP (6), length 897) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [P.], cksum 0x9401 (correct), seq 1441:2298, ack 95, win 4320, length 857 20:25:30.307801 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 24839, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [.], cksum 0x27c4 (correct), seq 95, ack 1441, win 8640, options [nop,nop,TS val 4294723586 ecr 3307465752], length 0 20:25:30.307815 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 24840, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [.], cksum 0x192b (correct), seq 95, ack 2298, win 11520, options [nop,nop,TS val 4294723586 ecr 3307465752], length 0 20:25:30.316672 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 264: (tos 0x0, ttl 64, id 24841, offset 0, flags [DF], proto TCP (6), length 250) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [P.], cksum 0xcd89 (correct), seq 95:293, ack 2298, win 11520, options [nop,nop,TS val 4294723594 ecr 3307465752], length 198 20:25:30.325137 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 56333, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [.], cksum 0x65b4 (correct), seq 2298, ack 293, win 4612, length 0 20:25:30.327511 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 113: (tos 0x0, ttl 250, id 56365, offset 0, flags [DF], proto TCP (6), length 99) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [P.], cksum 0xde1c (correct), seq 2298:2357, ack 293, win 4612, length 59 20:25:30.332287 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 407: (tos 0x0, ttl 64, id 24842, offset 0, flags [DF], proto TCP (6), length 393) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [P.], cksum 0x4b52 (correct), seq 293:634, ack 2357, win 11520, options [nop,nop,TS val 4294723610 ecr 3307465752], length 341 20:25:30.332662 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 103: (tos 0x0, ttl 64, id 24843, offset 0, flags [DF], proto TCP (6), length 89) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [P.], cksum 0x7de6 (correct), seq 634:671, ack 2357, win 11520, options [nop,nop,TS val 4294723610 ecr 3307465752], length 37 20:25:30.333664 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 1506: (tos 0x0, ttl 64, id 24844, offset 0, flags [DF], proto TCP (6), length 1492) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [.], cksum 0xf9f3 (correct), seq 671:2111, ack 2357, win 11520, options [nop,nop,TS val 4294723611 ecr 3307465752], length 1440 20:25:30.333678 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 919: (tos 0x0, ttl 64, id 24845, offset 0, flags [DF], proto TCP (6), length 905) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [P.], cksum 0xef2b (correct), seq 2111:2964, ack 2357, win 11520, options [nop,nop,TS val 4294723611 ecr 3307465752], length 853 20:25:30.333689 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 103: (tos 0x0, ttl 64, id 24846, offset 0, flags [DF], proto TCP (6), length 89) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [P.], cksum 0x98cb (correct), seq 2964:3001, ack 2357, win 11520, options [nop,nop,TS val 4294723611 ecr 3307465752], length 37 20:25:30.341504 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 56549, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [.], cksum 0x62cf (correct), seq 2357, ack 634, win 4953, length 0 20:25:30.341517 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 56550, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [.], cksum 0x6285 (correct), seq 2357, ack 671, win 4990, length 0 20:25:30.342752 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 56569, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [.], cksum 0x509b (correct), seq 2357, ack 2964, win 7283, length 0 20:25:30.342764 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 56570, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [.], cksum 0x5051 (correct), seq 2357, ack 3001, win 7320, length 0 20:25:30.423707 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 955: (tos 0x0, ttl 250, id 57736, offset 0, flags [DF], proto TCP (6), length 941) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [P.], cksum 0xebc6 (correct), seq 2357:3258, ack 3001, win 7320, length 901 20:25:30.427108 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 519: (tos 0x0, ttl 64, id 24847, offset 0, flags [DF], proto TCP (6), length 505) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [P.], cksum 0x8f27 (correct), seq 3001:3454, ack 3258, win 14400, options [nop,nop,TS val 4294723705 ecr 3307465752], length 453 20:25:30.435824 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 57959, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [.], cksum 0x4942 (correct), seq 3258, ack 3454, win 7773, length 0 20:25:30.443070 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 427: (tos 0x0, ttl 250, id 58092, offset 0, flags [DF], proto TCP (6), length 413) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [P.], cksum 0xfd47 (correct), seq 3258:3631, ack 3454, win 7773, length 373 20:25:30.445847 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 24848, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [F.], cksum 0xefcb (correct), seq 3454, ack 3631, win 17280, options [nop,nop,TS val 4294723724 ecr 3307465752], length 0 20:25:30.454938 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 58284, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [.], cksum 0x47cc (correct), seq 3631, ack 3455, win 7773, length 0 20:25:30.455312 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 58299, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47447: Flags [F.], cksum 0x47cb (correct), seq 3631, ack 3455, win 7773, length 0 20:25:30.456966 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47447 > 80.58.63.218.7008: Flags [.], cksum 0xefbf (correct), seq 3455, ack 3632, win 17280, options [nop,nop,TS val 4294723735 ecr 3307465752], length 0 20:25:34.911043 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:25:34.918662 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:25:44.928181 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:25:44.935926 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:25:54.945324 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:25:54.953066 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:26:01.396251 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:26:04.963210 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:26:04.970955 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:26:14.981475 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:26:14.989219 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:26:24.999736 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:26:25.007483 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:26:35.017630 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:26:35.025374 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:26:45.034642 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:26:45.042388 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:26:55.052034 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:26:55.059777 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:27:05.069174 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:27:05.076915 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:27:15.086314 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:27:15.094055 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:27:25.103451 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:27:25.111195 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:27:31.364384 d4:04:cd:fc:34:b2 > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Ethernet (len 6), IPv4 (len 4), Request who-has 192.168.128.1 tell 192.168.128.250, length 46 20:27:31.364424 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype ARP (0x0806), length 42: Ethernet (len 6), IPv4 (len 4), Reply 192.168.128.1 is-at 00:15:17:f5:c5:51, length 28 20:27:31.368013 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 62: (tos 0x10, ttl 64, id 0, offset 0, flags [DF], proto UDP (17), length 48) 192.168.128.250.50001 > 213.0.178.24.3478: [udp sum ok] UDP, length 20 20:27:31.448437 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 250, id 43085, offset 0, flags [DF], proto UDP (17), length 84) 213.0.178.24.3478 > 192.168.128.250.50001: [udp sum ok] UDP, length 56 20:27:31.454955 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 83: (tos 0x0, ttl 64, id 8507, offset 0, flags [DF], proto UDP (17), length 69) 192.168.128.250.54473 > 172.26.23.3.53: [udp sum ok] 57008+ A? main.acs.telefonica.net. (41) 20:27:31.468918 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 99: (tos 0x20, ttl 58, id 47608, offset 0, flags [DF], proto UDP (17), length 85) 172.26.23.3.53 > 192.168.128.250.54473: [udp sum ok] 57008 q: A? main.acs.telefonica.net. 1/0/0 main.acs.telefonica.net. A 80.58.63.218 (57) 20:27:31.470306 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 74: (tos 0x0, ttl 64, id 30848, offset 0, flags [DF], proto TCP (6), length 60) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [s], cksum 0x6a3c (correct), seq 2775669194, win 5840, options [mss 1460,sackOK,TS val 4294844746 ecr 0,nop,wscale 6], length 0 20:27:31.478688 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 70: (tos 0x0, ttl 250, id 8384, offset 0, flags [none], proto TCP (6), length 56) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [S.], cksum 0xf415 (correct), seq 2528308302, ack 2775669195, win 4380, options [mss 1452,sackOK,TS val 616884248 ecr 4294844746], length 0 20:27:31.481804 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 30849, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [.], cksum 0x090c (correct), seq 1, ack 1, win 5840, options [nop,nop,TS val 4294844758 ecr 616884248], length 0 20:27:31.482297 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 160: (tos 0x0, ttl 64, id 30850, offset 0, flags [DF], proto TCP (6), length 146) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [P.], cksum 0x9ed7 (correct), seq 1:95, ack 1, win 5840, options [nop,nop,TS val 4294844758 ecr 616884248], length 94 20:27:31.490535 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 1334: (tos 0x0, ttl 250, id 60834, offset 0, flags [DF], proto TCP (6), length 1320) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [.], cksum 0x58ae (correct), seq 1:1281, ack 95, win 3840, length 1280 20:27:31.490553 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 1071: (tos 0x0, ttl 250, id 60835, offset 0, flags [DF], proto TCP (6), length 1057) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [P.], cksum 0x438a (correct), seq 1281:2298, ack 95, win 3840, length 1017 20:27:31.493665 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 30851, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [.], cksum 0xfc71 (correct), seq 95, ack 1281, win 7680, options [nop,nop,TS val 4294844770 ecr 616884248], length 0 20:27:31.493680 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 30852, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [.], cksum 0xee78 (correct), seq 95, ack 2298, win 10240, options [nop,nop,TS val 4294844770 ecr 616884248], length 0 20:27:31.503536 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 264: (tos 0x0, ttl 64, id 30853, offset 0, flags [DF], proto TCP (6), length 250) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [P.], cksum 0x668b (correct), seq 95:293, ack 2298, win 10240, options [nop,nop,TS val 4294844780 ecr 616884248], length 198 20:27:31.512251 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 61236, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [.], cksum 0x6ce4 (correct), seq 2298, ack 293, win 4132, length 0 20:27:31.514124 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 113: (tos 0x0, ttl 250, id 61280, offset 0, flags [DF], proto TCP (6), length 99) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [P.], cksum 0x8ff5 (correct), seq 2298:2357, ack 293, win 4132, length 59 20:27:31.518276 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 407: (tos 0x0, ttl 64, id 30854, offset 0, flags [DF], proto TCP (6), length 393) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [P.], cksum 0x0482 (correct), seq 293:634, ack 2357, win 10240, options [nop,nop,TS val 4294844794 ecr 616884248], length 341 20:27:31.518776 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 103: (tos 0x0, ttl 64, id 30855, offset 0, flags [DF], proto TCP (6), length 89) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [P.], cksum 0x1cc2 (correct), seq 634:671, ack 2357, win 10240, options [nop,nop,TS val 4294844795 ecr 616884248], length 37 20:27:31.519650 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 1506: (tos 0x0, ttl 64, id 30856, offset 0, flags [DF], proto TCP (6), length 1492) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [.], cksum 0x685b (correct), seq 671:2111, ack 2357, win 10240, options [nop,nop,TS val 4294844796 ecr 616884248], length 1440 20:27:31.519663 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 919: (tos 0x0, ttl 64, id 30857, offset 0, flags [DF], proto TCP (6), length 905) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [P.], cksum 0x0403 (correct), seq 2111:2964, ack 2357, win 10240, options [nop,nop,TS val 4294844796 ecr 616884248], length 853 20:27:31.519675 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 103: (tos 0x0, ttl 64, id 30858, offset 0, flags [DF], proto TCP (6), length 89) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [P.], cksum 0x7c67 (correct), seq 2964:3001, ack 2357, win 10240, options [nop,nop,TS val 4294844796 ecr 616884248], length 37 20:27:31.526992 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 61525, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [.], cksum 0x69ff (correct), seq 2357, ack 634, win 4473, length 0 20:27:31.527005 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 61526, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [.], cksum 0x69b5 (correct), seq 2357, ack 671, win 4510, length 0 20:27:31.528241 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 61543, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [.], cksum 0x57cb (correct), seq 2357, ack 2964, win 6803, length 0 20:27:31.528254 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 61544, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [.], cksum 0x5781 (correct), seq 2357, ack 3001, win 6840, length 0 20:27:31.573716 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 939: (tos 0x0, ttl 250, id 62404, offset 0, flags [DF], proto TCP (6), length 925) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [P.], cksum 0x4ea9 (correct), seq 2357:3242, ack 3001, win 6840, length 885 20:27:31.578242 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 519: (tos 0x0, ttl 64, id 30859, offset 0, flags [DF], proto TCP (6), length 505) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [P.], cksum 0xb8d6 (correct), seq 3001:3454, ack 3242, win 12800, options [nop,nop,TS val 4294844854 ecr 616884248], length 453 20:27:31.586583 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 62624, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [.], cksum 0x5082 (correct), seq 3242, ack 3454, win 7293, length 0 20:27:31.593956 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 427: (tos 0x0, ttl 250, id 62746, offset 0, flags [DF], proto TCP (6), length 413) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [P.], cksum 0xed5e (correct), seq 3242:3615, ack 3454, win 7293, length 373 20:27:31.596481 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 30860, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [F.], cksum 0xc7cc (correct), seq 3454, ack 3615, win 15360, options [nop,nop,TS val 4294844873 ecr 616884248], length 0 20:27:31.604948 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 62954, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [.], cksum 0x4f0c (correct), seq 3615, ack 3455, win 7293, length 0 20:27:31.605321 00:15:17:f5:c5:51 > d4:04:cd:fc:34:b2, ethertype IPv4 (0x0800), length 54: (tos 0x0, ttl 250, id 62965, offset 0, flags [DF], proto TCP (6), length 40) 80.58.63.218.7008 > 192.168.128.250.47448: Flags [F.], cksum 0x4f0b (correct), seq 3615, ack 3455, win 7293, length 0 20:27:31.607725 d4:04:cd:fc:34:b2 > 00:15:17:f5:c5:51, ethertype IPv4 (0x0800), length 66: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto TCP (6), length 52) 192.168.128.250.47448 > 80.58.63.218.7008: Flags [.], cksum 0xc7c0 (correct), seq 3455, ack 3616, win 15360, options [nop,nop,TS val 4294844884 ecr 616884248], length 0 20:27:35.121468 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:27:35.129214 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:27:45.139479 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:27:45.147225 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:27:55.157503 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:27:55.165362 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:28:02.231819 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:28:05.176006 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:28:05.183875 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:28:15.193881 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:28:15.201623 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:28:25.211005 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:28:25.218749 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:28:35.228146 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:28:35.235894 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 20:28:45.245130 d4:04:cd:fc:34:b2 > 01:00:5e:00:00:02, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 224.0.0.2: igmp leave 239.0.2.30 20:28:45.252875 d4:04:cd:fc:34:b2 > 01:00:5e:00:02:1e, ethertype IPv4 (0x0800), length 60: (tos 0xc0, ttl 1, id 0, offset 0, flags [DF], proto IGMP (2), length 32, options (RA)) 192.168.128.250 > 239.0.2.30: igmp v2 report 239.0.2.30 Por lo que he googleado podria estar relacionado con el provisionamiento del desco (no creo porque ya he probado conectandolo al router original y debe estar mas que actualizado) o algo de las grabaciones en la nube (el puerto 7008 parece estar relacionado con el protocolo AFS3 que parece ser una especie de sistema de archivos distribuido...). main.acs.telefonica.net:7008 esta firmada por una CA interna de telefonica: [img]https://i.imgur.com/rsTYYat.png[/img] Esa CA si esta instalada en el router original, es posible que por no estar instalada en el pfsense se este bloqueando la comunicacion con ese servidor? Los datos del desco son: ARRISS STIH201-0.0 08-11-2010 Ver. SOFTWARE: 2017.04.17.09.03.35+58bb1432 Ver. HARDWARE: VIP1113-REV1 Ver. FIRMWARE: 2.28.0_159 Por otro lado los que tienen problemas con el VOIP pueden configurar los puertos de SIP y RTP como estaticos en esta pagina: [img]https://i.imgur.com/xJi8Mb0.png[/img] En la captura no se ve pero basicamentee hay que configurar los puertos de SIP y RTP como estaticos para que el pfsense no los randomize. https://doc.pfsense.org/index.php/Static_Port [/s][/s][/s][/s]
-
@donizt Al final conseguiste hacer funcionar el VOD ???