From owner-freebsd-questions Sat Jan 26 21:57:42 2002 Delivered-To: freebsd-questions@freebsd.org Received: from radwaste.oaep.go.th (ppp38.modem56.actconnect.net [203.155.127.38]) by hub.freebsd.org (Postfix) with ESMTP id 07D5137B41B for ; Sat, 26 Jan 2002 21:57:12 -0800 (PST) Received: (from pirat@localhost) by radwaste.oaep.go.th (8.11.6/8.11.3) id g0R6F2D02658; Sun, 27 Jan 2002 13:15:02 +0700 (ICT) (envelope-from pirat@access.inet.co.th) X-Authentication-Warning: radwaste.oaep.go.th: pirat set sender to pirat@access.inet.co.th using -f Date: Sun, 27 Jan 2002 13:14:58 +0700 From: pirat To: Joe & Fhe Barbish Cc: questions@FreeBSD.ORG Subject: Re: ppp -nat ISP does not work Message-ID: <20020127131458.B1106@radwaste.oaep.go.th> Mail-Followup-To: pirat , Joe & Fhe Barbish , questions@FreeBSD.ORG References: <20020127035842.A1106@radwaste.oaep.go.th> Mime-Version: 1.0 Content-Type: multipart/mixed; boundary="i9LlY+UWpKt15+FH" Content-Disposition: inline User-Agent: Mutt/1.2.5i In-Reply-To: ; from barbish@a1poweruser.com on Sat, Jan 26, 2002 at 04:09:19PM -0500 X-Operating-System: FreeBSD-4.4 STABLE Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG --i9LlY+UWpKt15+FH Content-Type: text/plain; charset=us-ascii Content-Disposition: inline hi sirs, it works ! great !! what's a secret behide this? afaik, from the first log file, i have been connected, authenticated but not yet got ip number from the far side. i deeply appreciate for your assistant. both log file and ppp.conf for the default section are attached. i edited the log file ang ppp.conf to save space. with best regards, psr On Sat, Jan 26, 2002 at 04:09:19PM -0500, Joe & Fhe Barbish wrote: > From: "Joe & Fhe Barbish" > > Change ppp.conf this way. > Start it this way ppp -ddial -nat makham > Post complete ppp.conf, need to see default section. > Post ppp.log from this test. > > makham: > # allow users pnt pirat proj-A > set phone "4711" > set authkey XXXXX > set authname XXXXX > # accept pap > # enable pap > set login > set ifaddr 10.0.0.1/0 10.0.0.2/0 255.255.255.0 0.0.0.0 > # delete ALL > add default HISADDR --i9LlY+UWpKt15+FH Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename="PPP.ACT.ok" #tail -160 /var/log/ppp.log and editted to save space LCP: AUTHPROTO[4] 0xc023 (PAP) LCP: MAGICNUM[6] 0x8bb76228 LCP: PROTOCOMP[2] LCP: ACFCOMP[2] LCP: ENDDISC[12] Local Addr: cc_as5300 LCP: deflink: SendConfigAck(90) state = Req-Sent LCP: ACCMAP[6] 0x000a0000 LCP: AUTHPROTO[4] 0xc023 (PAP) LCP: MAGICNUM[6] 0x8bb76228 LCP: PROTOCOMP[2] LCP: ACFCOMP[2] LCP: ENDDISC[12] Local Addr: cc_as5300 LCP: deflink: State change Req-Sent --> Ack-Sent LCP: deflink: SendConfigReq(1) state = Ack-Sent LCP: ACFCOMP[2] LCP: PROTOCOMP[2] LCP: ACCMAP[6] 0x00000000 LCP: MRU[4] 1500 LCP: MAGICNUM[6] 0x12050e7a LCP: deflink: RecvConfigReq(91) state = Ack-Sent LCP: ACCMAP[6] 0x000a0000 LCP: AUTHPROTO[4] 0xc023 (PAP) LCP: MAGICNUM[6] 0x8bb771b9 LCP: PROTOCOMP[2] LCP: ACFCOMP[2] LCP: MRRU[4] 1524 LCP: ENDDISC[12] Local Addr: cc_as5300 LCP: deflink: SendConfigRej(91) state = Ack-Sent LCP: MRRU[4] 1524 LCP: deflink: State change Ack-Sent --> Req-Sent LCP: deflink: RecvConfigAck(1) state = Req-Sent LCP: deflink: State change Req-Sent --> Ack-Rcvd LCP: deflink: RecvConfigReq(92) state = Ack-Rcvd LCP: ACCMAP[6] 0x000a0000 LCP: AUTHPROTO[4] 0xc023 (PAP) LCP: MAGICNUM[6] 0x8bb771b9 LCP: PROTOCOMP[2] LCP: ACFCOMP[2] LCP: ENDDISC[12] Local Addr: cc_as5300 LCP: deflink: SendConfigAck(92) state = Ack-Rcvd LCP: ACCMAP[6] 0x000a0000 LCP: AUTHPROTO[4] 0xc023 (PAP) LCP: MAGICNUM[6] 0x8bb771b9 LCP: PROTOCOMP[2] LCP: ACFCOMP[2] LCP: ENDDISC[12] Local Addr: cc_as5300 LCP: deflink: State change Ack-Rcvd --> Opened LCP: deflink: LayerUp Phase: bundle: Authenticate Phase: deflink: his = PAP, mine = none Phase: Pap Output: makham ******** Phase: Pap Input: SUCCESS () IPCP: Using trigger address 0.0.0.0 CCP: FSM: Using "deflink" as a transport CCP: deflink: State change Initial --> Closed CCP: deflink: LayerStart. CCP: MPPE: Not usable without CHAP81 CCP: deflink: SendConfigReq(1) state = Closed CCP: DEFLATE[4] win 15 CCP: PRED1[2] CCP: deflink: State change Closed --> Req-Sent Phase: deflink: lcp -> open Phase: bundle: Network IPCP: FSM: Using "deflink" as a transport IPCP: deflink: State change Initial --> Closed IPCP: deflink: LayerStart. IPCP: deflink: SendConfigReq(1) state = Closed IPCP: IPADDR[6] 0.0.0.0 IPCP: COMPPROTO[6] 16 VJ slots with slot compression IPCP: deflink: State change Closed --> Req-Sent IPCP: deflink: RecvConfigReq(1) state = Req-Sent IPCP: IPADDR[6] 203.155.127.62 IPCP: deflink: SendConfigAck(1) state = Req-Sent IPCP: IPADDR[6] 203.155.127.62 IPCP: deflink: State change Req-Sent --> Ack-Sent CCP: deflink: RecvConfigReq(1) state = Req-Sent CCP: MPPE[6] value 0x00000001 ( bits, stateful, compressed) CCP: MPPE: Not usable without CHAP81 CCP: deflink: SendConfigRej(1) state = Req-Sent CCP: MPPE[6] value 0x00000001 ( bits, stateful, compressed) CCP: deflink: RecvConfigRej(1) state = Req-Sent CCP: DEFLATE[4] win 15 CCP: MPPE: Not usable without CHAP81 CCP: deflink: SendConfigReq(2) state = Req-Sent CCP: PRED1[2] IPCP: deflink: RecvConfigRej(1) state = Ack-Sent IPCP: COMPPROTO[6] 16 VJ slots with slot compression IPCP: deflink: SendConfigReq(2) state = Ack-Sent IPCP: IPADDR[6] 0.0.0.0 CCP: deflink: RecvConfigReq(2) state = Req-Sent CCP: LZS-DCP[6] CCP: deflink: SendConfigRej(2) state = Req-Sent CCP: LZS-DCP[6] CCP: deflink: RecvConfigAck(2) state = Req-Sent CCP: deflink: State change Req-Sent --> Ack-Rcvd IPCP: deflink: RecvConfigNak(2) state = Ack-Sent IPCP: IPADDR[6] 203.155.127.38 IPCP: IPADDR[6] changing address: 0.0.0.0 --> 203.155.127.38 IPCP: deflink: SendConfigReq(3) state = Ack-Sent IPCP: IPADDR[6] 203.155.127.38 CCP: deflink: RecvConfigReq(3) state = Ack-Rcvd CCP: STAC[5] CCP: deflink: SendConfigRej(3) state = Ack-Rcvd CCP: STAC[5] IPCP: deflink: RecvConfigAck(3) state = Ack-Sent IPCP: deflink: State change Ack-Sent --> Opened IPCP: deflink: LayerUp. IPCP: myaddr 203.155.127.38 hisaddr = 203.155.127.62 Command: makham: delete ALL Command: makham: add 0 0 HISADDR CCP: deflink: RecvConfigReq(4) state = Ack-Rcvd CCP: STAC[5] CCP: deflink: SendConfigRej(4) state = Ack-Rcvd CCP: STAC[5] CCP: deflink: RecvConfigReq(5) state = Ack-Rcvd CCP: PRED1[2] CCP: deflink: SendConfigAck(5) state = Ack-Rcvd CCP: PRED1[2] CCP: deflink: State change Ack-Rcvd --> Opened CCP: deflink: LayerUp. CCP: Predictor1: Input channel reset CCP: Predictor1: Output channel reset CCP: deflink: Out = PRED1[1], In = PRED1[1] LCP: deflink: RecvEchoRequest(1) state = Opened LCP: deflink: SendEchoReply(1) state = Opened LCP: deflink: RecvEchoRequest(2) state = Opened LCP: deflink: SendEchoReply(2) state = Opened LCP: deflink: RecvEchoRequest(3) state = Opened LCP: deflink: SendEchoReply(3) state = Opened LCP: deflink: RecvEchoRequest(4) state = Opened LCP: deflink: SendEchoReply(4) state = Opened LCP: deflink: RecvEchoRequest(5) state = Opened LCP: deflink: SendEchoReply(5) state = Opened LCP: deflink: RecvEchoRequest(6) state = Opened LCP: deflink: SendEchoReply(6) state = Opened Phase: deflink: HDLC errors -> FCS: 3, ADDR: 0, COMD: 0, PROTO: 0 LCP: deflink: RecvEchoRequest(7) state = Opened LCP: deflink: SendEchoReply(7) state = Opened LCP: deflink: RecvEchoRequest(8) state = Opened LCP: deflink: SendEchoReply(8) state = Opened LCP: deflink: RecvEchoRequest(9) state = Opened LCP: deflink: SendEchoReply(9) state = Opened LCP: deflink: RecvEchoRequest(10) state = Opened LCP: deflink: SendEchoReply(10) state = Opened LCP: deflink: RecvEchoRequest(11) state = Opened LCP: deflink: SendEchoReply(11) state = Opened LCP: deflink: RecvEchoRequest(12) state = Opened LCP: deflink: SendEchoReply(12) state = Opened LCP: deflink: RecvEchoRequest(13) state = Opened LCP: deflink: SendEchoReply(13) state = Opened LCP: deflink: RecvEchoRequest(14) state = Opened LCP: deflink: SendEchoReply(14) state = Opened LCP: deflink: RecvEchoRequest(15) state = Opened LCP: deflink: SendEchoReply(15) state = Opened LCP: deflink: RecvEchoRequest(16) state = Opened LCP: deflink: SendEchoReply(16) state = Opened LCP: deflink: RecvEchoRequest(17) state = Opened LCP: deflink: SendEchoReply(17) state = Opened LCP: deflink: RecvEchoRequest(18) state = Opened LCP: deflink: SendEchoReply(18) state = Opened --i9LlY+UWpKt15+FH Content-Type: text/plain; charset=us-ascii Content-Disposition: attachment; filename="PPP.default" ################################################################# # # PPP Sample Configuration File # # Originally written by Toshiharu OHNO # # $Id: ppp.conf.sample,v 1.33 1998/10/03 13:12:14 brian Exp $ # ################################################################# # This file is separated into sections. Each section is named with # a label starting in column 0 and followed directly by a ``:''. The # section continues until the next section. Blank lines and lines # beginning with ``#'' are ignored. # # Lines beginning with "!include" will ``include'' another file. You # may want to ``!include ~/.ppp.conf'' for backwards compatibility. # # Default setup. Always executed when PPP is invoked. # This section is *not* loaded by the ``load'' or ``dial'' commands. # # This is the best place to specify your modem device, it's DTR rate, # and any logging specification. Logging specs should be done first # so that subsequent commands are logged. # default: set log Phase Chat LCP IPCP CCP tun command set device /dev/cuaa2 # set speed 115200 set speed 57600 set dial "ABORT BUSY ABORT NO\\sCARRIER TIMEOUT 5 \"\" AT OK-AT-OK ATE1Q0 OK \\dATL1M1DT\\T TIMEOUT 40 CONNECT" allow users pirat tarika pnt manee proj-a # set timeout 180 set timeout 0 set redial 5 0 makham: allow users pnt pirat proj-A set phone "028070707" set authkey XXXX set authname XXXX # accept pap # enable pap # set login "sername: makham ssword: zemski9" set login set ifaddr 10.0.0.1/0 10.0.0.2/0 255.255.255.0 0.0.0.0 # delete ALL add default HISADDR # Client side PPP # # Although the PPP protocol is a peer to peer protocol, we normally # consider the side that makes the connection as the client and the # side that receives the connection as the server. Authentication # is required by the server either using a unix-style login proceedure # or by demanding PAP or CHAP authentication from the client. # # An on demand example where we have dynamic IP addresses: # If the peer assigns us an arbitrary IP (most ISPs do this) and we # can't predict what their IP will be either, take a wild guess at # some IPs that you can't currently route to. # # The /0 bit in "set ifaddr" says that we insist on 0 bits of the # specified IP actually being correct, therefore, the other side can assign # any IP numbers. # # The forth arg to "set ifaddr" makes us send "0.0.0.0" as our requested # IP number, forcing the peer to make the decision. # # This entry also works with static IP numbers or when not in -auto mode. # The ``add'' line adds a `sticky' default route that will be updated if # and when any of the IP numbers are changed in IPCP negotiations. # The "set ifaddr" is required in -auto mode. # # Finally, the ``enable dns'' bit tells ppp to ask the peer for the # nameserver addresses that should be used. This isn't always supported # by the other side, but if it is, /etc/resolv.conf will automatically be # updated. # pmdemand: set phone 1234567 set login "ABORT NO\\sCARRIER TIMEOUT 5 ogin:--ogin: ppp word: ppp" set timeout 120 set ifaddr 10.0.0.1/0 10.0.0.2/0 255.255.255.0 0.0.0.0 add default HISADDR enable dns # When we want to use PAP or CHAP instead of using a unix-style login # proceedure, we do the following. Note, the peer suggests whether we # should send PAP or CHAP. By default, we send whatever we're asked for. # PAPorCHAPpmdemand: set phone 1234567 set login set authname MyName set authkey MyKey set timeout 120 set ifaddr 10.0.0.1/0 10.0.0.2/0 255.255.255.0 0.0.0.0 add default HISADDR enable dns # On demand dialup example with static IP addresses: # Here, the local side uses 192.244.185.226 and the remote side # uses 192.244.176.44. # # # ppp -auto ondemand # # With static IP numbers, our setup is similar to dynamic: # Remember, ppp.linkup is searched for a "192.244.176.44" label, then # a "ondemand" label, and finally the "MYADDR" label. # ondemand: set phone 1234567 set login "ABORT NO\\sCARRIER TIMEOUT 5 ogin:--ogin: ppp word: ppp" set timeout 120 set ifaddr 192.244.185.226 192.244.176.44 add default HISADDR enable dns # Example segments # # The following lines may be included as part of your configuration # section and aren't themselves complete. They're provided as examples # of how to achieve different things. examples: # Multi-phone example. Numbers separated by a : are used sequentially. # Numbers separated by a | are used if the previous dial or login script # failed. Usually, you will prefer to use only one of | or :, but both # are allowed. # set phone 12345678|12345679:12345670|12345671 # # Ppp can accept control instructions from the ``pppctl'' program. # First, you must set up your control socket. It's safest to use # a UNIX domain socket, and watch the permissions: # set server /var/tmp/internet MySecretPassword 0177 # # Although a TCP port may be used if you want to allow control # connections from other machines: # set server 6670 MySecretpassword # # If you don't like ppp's builtin chat, use an external one: # set login "\"!chat \\\\-f /etc/ppp/ppp.dev.chat\"" # # If we have a ``strange'' modem that must be re-initialized when we # hangup: # set hangup "\"\" AT OK-AT-OK ATZ OK" # # To adjust logging withouth blasting the setting in default: # set log -command +tcp/ip # # To see log messages on the screen in interactive mode: # set log local LCP IPCP CCP # # If you're seeing a lot of magic number problems and failed connections, # try this (see the man page): # set openmode active 5 # # For noisy lines, we may want to reconnect (up to 20 times) after loss # of carrier, with 3 second delays between each attempt: # set reconnect 3 20 # # When playing server for M$ clients, tell them who our NetBIOS name # servers are: # set nbns 10.0.0.1 10.0.0.2 # # Inform the client if they ask for our DNS IP numbers: # enable dns # # If you don't want to tell them what's in your /etc/resolf.conf file # with `enable dns', override the values: # set dns 10.0.0.1 10.0.0.2 # # If we're using the -alias switch, redirect ftp and http to an internal # machine: # alias port 10.0.0.2:ftp ftp alias port 10.0.0.2:http http # # or don't trust the outside at all # alias deny_incoming yes # # I trust user brian to run ppp, so this goes in the `default' section: # allow user brian # # But label `internet' contains passwords that even brian can't have, so # I empty out the user access list in that section so that only root can # have access: # allow users # # I also may wish to set up my ppp login script so that it asks the client # for the label they wish to use. I may only want user ``dodgy'' to access # their own label in direct mode: # dodgy: allow user dodgy allow mode direct # # If we don't want ICMP and DNS packets to keep the connection alive: # set filter alive 0 deny icmp set filter alive 1 deny udp src eq 53 set filter alive 2 deny udp dst eq 53 set filter alive 3 permit 0 0 # # And we don't want ICMPs to cause a dialup: # set filter dial 0 deny icmp set filter dial 1 permit 0 0 # # or any TCP SYN or RST packets (badly closed TCP channels): # set filter dial 2 deny 0 0 tcp syn finrst # # Once the line's up, allow connections for ident (113), telnet (23), # ftp (20 & 21), DNS (53), my place of work (192.244.191.0/24), # ICMP (ping) and traceroute (>33433). # # Anything else is blocked by default # set filter in 0 permit tcp dst eq 113 set filter out 0 permit tcp src eq 113 set filter in 1 permit tcp src eq 23 estab set filter out 1 permit tcp dst eq 23 set filter in 2 permit tcp src eq 21 estab set filter out 2 permit tcp dst eq 21 set filter in 3 permit tcp src eq 20 dst gt 1023 set filter out 3 permit tcp dst eq 20 set filter in 4 permit udp src eq 53 set filter out 4 permit udp dst eq 53 set filter in 5 permit 192.244.191.0/24 0/0 set filter out 5 permit 0/0 192.244.191.0/24 set filter in 6 permit icmp set filter out 6 permit icmp set filter in 7 permit udp dst gt 33433 set filter out 7 permit udp dst gt 33433 # Server side PPP # If you want the remote system to authenticate itself, you insist # that the peer uses CHAP (or PAP) with the "enable" keyword. Both CHAP and # PAP are disabled by default (we usually only "enable" one of them if the # other side is dialing into our server). # When the peer authenticates itself, we use ppp.secret for verification. # # Ppp is launched with: # # ppp -direct CHAPserver # # Note: We can supply a third field in ppp.secret specifying the IP address # for that user. We can even specify a forth field to specify the # ppp.link{up,down} label to use. # CHAPserver: enable chap enable proxy set ifaddr 192.244.176.44 292.244.184.31 accept dns # If we wish to act as a server, allowing PAP access according to # accounts in /etc/passwd, we do this (Without `enable passwdauth', # you may still enter ``*'' as the users password in ppp.secret and # ppp will look it up in the passwd database. This is useful if you # need to assign a special label or IP number or range): # PAPServerwithPASSWD: enable pap enable passwdauth enable proxy set ifaddr 192.244.176.44 292.244.184.31 accept dns # Example to connect using a null-modem cable: # The important thing here is to allow the lqr packets on both sides. # Without them enabled, we can't tell if the line's dropped - there # should always be carrier on a direct connection. # Here, the server sends lqr's every 10 seconds and quits if five in a # row fail. # # Make sure you don't have "deny lqr" in your default: on the client ! # If the peer denies LQR, we still send ECHO LQR packets at the given # lqrperiod interval (ppp-style-pings). # direct-client: set dial "" set line /dev/cuaa0 set sp 115200 set timeout 900 set lqrperiod 10 set log Phase Chat LQM set login "ABORT NO\\sCARRIER TIMEOUT 5 ogin:--ogin: ppp word: ppp HELLO" set ifaddr 10.0.4.2 10.0.4.1 enable lqr accept lqr direct-server: set timeout 0 set lqrperiod 10 set log Phase LQM set ifaddr 10.0.4.1 10.0.4.2 enable lqr accept lqr # Example to connect via compuserve (who insist on 7 bits even parity # during the chat phase). # compuserve: set phone 1234567 set parity even set login "TIMEOUT 10 \"\" \"\" Name: CIS ID: 99999,9999/go:pppconnect \ word: XXXXXXXX" set timeout 300 set ifaddr 10.0.0.1/0 10.0.0.2/0 255.255.255.0 0.0.0.0 delete ALL add default HISADDR # Example for PPP over TCP. # We assume that inetd on tcpsrv.mynet has been # configured to run "ppp -direct tcp-server" when it gets a connection on # port 1234. Read the man page for further details # # Note, we assume we're using a binary-clean connection. If something # such as `rlogin' is involved, you may need to ``set escape 0xff'' # tcp-client: set device tcpsrv.mynet:1234 set dial set login set ifaddr 10.0.5.1 10.0.4.1 255.255.255.0 tcp-server: set ifaddr 10.0.4.1 10.0.5.1 255.255.255.0 # If you want to test ppp, do it through a loopback: # # Requires a line in /etc/services: # ppploop 6671/tcp # loopback ppp daemon # # and a line in /etc/inetd.conf: # ppploop stream tcp nowait root /usr/sbin/ppp ppp -direct loop-in # loop: set timeout 0 set log phase chat connect lcp ipcp command set device localhost:ppploop set dial set login set ifaddr 127.0.0.2 127.0.0.3 set server /var/tmp/loop "" 0177 loop-in: set timeout 0 set log phase lcp ipcp command allow mode direct # If you're going to create a tunnel through a public network, your VPN # should be set up something like this: # # /etc/ppp/secure (which should be executable) says: # #! /bin/sh # exec ssh whatevermachine /usr/sbin/ppp -direct loop-in # sloop: load loop set device !/etc/ppp/secure # If you wish to connect to a server that will dial back *without* using # the ppp callback facility (rfc1570), take advantage of the fact that # ppp doesn't look for carrier 'till `set login' is complete: # # Here, we expect the server to say DIALBACK then disconnect after # we've authenticated ourselves. When this has happened, we wait # 60 seconds for a RING. # dialback: set dial "ABORT BUSY ABORT NO\\sCARRIER TIMEOUT 5 \"\" ATZ OK-ATZ-OK \ ATDT\\T TIMEOUT 60 CONNECT" set login "TIMEOUT 5 ogin:--ogin: ppp word: ppp TIMEOUT 15 DIALBACK \ \"\" NO\\sCARRIER \"\" TIMEOUT 60 RING ATA CONNECT" # Alternatively, if the peer is using the PPP callback protocol, use # normal dial and login scripts and add # set callback auth cbcp e.164 1234567 set cbcp 1234567 # If we're running a ppp server that wants to only call back microsoft # clients on numbers configured in /etc/ppp/ppp.secret (the 5th field): # set callback cbcp set cbcp set log +cbcp set redial 3 1 set device /dev/cuaa0 set speed 115200 set dial "TIMEOUT 10 \"\" AT OK-AT-OK ATDT\\T CONNECT" # Or if we want to allow authenticated clients to specify their own # callback number, use this ``set cbcp'' line instead: # set cbcp * # Multilink mode is available (rfc1990). # To enable multilink capabilities, you must specify a MRRU. 1500 is # a reasonable value. To create new links, use the ``clone'' command # to duplicate an existing link. If you already have more than one # link, you must specify which link you wish to run the command on via # the ``link'' command. # # You can now ``dial'' specific links, or even dial all links at the # same time. The `dial' command may also be prefixed with a specific # link that should do the dialing. # mloop: load loop set mode interactive set mrru 1500 clone 1 2 3 link deflink remove # dial # link 2 dial # link 3 dial mloop-in: set timeout 0 set log tun phase allow mode direct set mrru 1500 install: set speed 115200 set device /dev/cuaa1 set ifaddr 202.44.64.54 0 255.255.255.0 0.0.0.0 set timeout 0 enable dns set log local phase set dial "ABORT BUSY ABORT NO\\sCARRIER TIMEOUT 5 \"\" AT OK-AT-OK ATE1Q0 OK \\dATDT\\T TIMEOUT 40 CONNECT" set login set authname 77142@inetaccess set authkey Pa!racH7 set phone 2065001 install: set speed 115200 set device /dev/cuaa1 set ifaddr 202.44.64.54 0 255.255.255.0 0.0.0.0 set timeout 0 enable dns set log local phase set dial "ABORT BUSY ABORT NO\\sCARRIER TIMEOUT 5 \"\" AT OK-AT-OK ATE1Q0 OK \\dATDT\\T TIMEOUT 40 CONNECT" set login set authname 77142@inetaccess set authkey Pa!racH7 set phone 6400333 --i9LlY+UWpKt15+FH-- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message