Router needs restart after new IP from ISP

Hello,

I have a Linksys WRT1900AC router running OpenWRT 21.02.3. It is connected to DSL via an Ethernet cable connected to a Vigor 167 modem, WAN is set to PPPoE.

I get a new IP from my ISP every 24 hours or so, and the internet stops working after that. The router seems to need a restart, at least after a restart everything works again.

Searching for solutions made me set those LCP-parameters to 5 and 5:
image
But it didn't help, and I don't really understand those options.

How can I find out what causes the internet connection to break? Maybe it doesn't have anything to do with the new IP from my ISP, and it is just a coincidence. Is there an easy fix? A scheduled restart every 24 hours would be my least favorite solution, I want to keep my router running until it or I drop dead.

If it has something to do with anything: All my traffic is routed through a commercial VPN with OpenVPN, I have an extra interface tun0 set up for that.

Independent of your issue, please consider updating to a more supported version of OpenWrt....

That should not be the case. What happens if you try:

  1. log into the router via ssh
  2. issue the following command: /etc/init.d/network restart

Will it pick up a new address or not?

These really only help if you issue would be something like uninitiated PPPoE disconnects.

Maybe yiu can reveal which ISP we are talking about and whether they use anything special, like PPPoE or DHCP, and full dualstack or ds-lite?

1 Like

I will soon, maybe it will solve some problems for me. That would be nice.

After executing the command, the IP showed in WAN changed:

My ISP is 1&1 in Germany, I think they use Telekom-Infrastructure. I don't really know if they use something special, but I could ask them. What would be useful questions?

It should be sufficient just to restart the wan interface, not the whole network.

Yes, 1&1 uses Deutsche Telekom TALs (TeilnehmerAnschlussLeitung?). Depending on l9cation either via L3-bitstream access (BSA) or via L2-BSA. I believe 1&1 uses ds-lite at least on some of its links... Could you reveal the first two octets of your wan IPv4 address, please (so the A and B groups of the A.B.C.D structure of the IPv4 address)?

There's no need to restart the whole router, only the wan interface. This can be automatically done by the watchcat package.

This was not intended as a solution, but as a diagnostic measure...

Do you see log messages concerning changing of IP?

It was 84.158.xx.xxx, after the /etc/init.d/network restart command it is 84.140.xxx.xxx. What would be a command to only restart the WAN-interface?

I will try that, thank you for the suggestion.

What logs would be helpful? Where do I find them?

Mmmh, that are IPs out of Deutsche Telekom's allotment. Could you do the follwing on your router please and post the output here (copy and paste from the terminal window you ran it from, then select the just added text and click the "Preformatted text" button that looks like </>).:
opkg update ; opkg install mtr ; mtr -ezb4w -c 20 62.220.18.8
(das ist ein Versatel DNS Server), the test takes ~20 seconds.

Probably if-down pppoe-wan ; if-up pppoe-wan, but that should really work out of the box and if not we should try to pinpoint what is wrong, before resorting to pure work-arounds...

Try: logread and maybe edit /etc/ppp/options so that it says debug instead of #debug, after that a logread | grep -e ppp should only give you the lines related to ppp...

Please note that posting these logs, might reveal your current IP address, so either redact the log (lot's of work) or simply restart the interface to initiate a PPPoE-reconnect after which end users typically get a new IP address...

1 Like

The output:

Installing mtr (0.94-1) to root...
Downloading https://downloads.openwrt.org/releases/21.02.3/packages/arm_cortex-a9_vfpv3-d16/packages/mtr_0.94-1_arm_cortex-a9_vfpv3-d16.ipk
Configuring mtr.
Start: 2023-10-28T22:38:35+0200
HOST: OpenWrtHost1                                   Loss%   Snt   Last   Avg  Best  Wrst StDev
@Not a TXT record
  1. AS???    10.8.1.1 (10.8.1.1)                     0.0%    20   20.3  20.4  20.1  20.8   0.2
  2. AS147049 194.233.96.2 (194.233.96.2)             0.0%    20   20.6  20.6  20.5  20.7   0.1
  3. AS147049 194.233.96.3 (194.233.96.3)             0.0%    20   20.6  20.6  20.4  21.1   0.1
  4. AS9002   87.245.214.100 (87.245.214.100)         0.0%    20   21.8  21.9  20.3  30.8   2.9
  5. AS9002   GW-Versatel.retn.net (87.245.249.217)   0.0%    20   29.8  32.5  20.7  61.9  11.2
  6. AS8881   62.214.62.18 (62.214.62.18)             0.0%    20   31.5  33.3  31.3  54.5   5.2
  7. AS8881   dns.versatel-west.de (62.220.18.8)      0.0%    20   32.3  32.3  32.0  32.7   0.2

I appreciate that a lot, thank you!

The output:

logread | grep -e ppp
Sat Oct 28 20:23:22 2023 daemon.warn pppd[2587]: IPV6CP: timeout sending Config-Requests
Sat Oct 28 21:05:03 2023 daemon.info pppd[2587]: Terminating on signal 15
Sat Oct 28 21:05:03 2023 daemon.info pppd[2587]: Connect time 42.2 minutes.
Sat Oct 28 21:05:03 2023 daemon.info pppd[2587]: Sent 12307463 bytes, received 244205395 bytes.
Sat Oct 28 21:05:03 2023 daemon.notice netifd: Network device 'pppoe-wan' link is down
Sat Oct 28 21:05:03 2023 daemon.notice pppd[2587]: Connection terminated.
Sat Oct 28 21:05:04 2023 daemon.info pppd[2587]: Sent PADT
Sat Oct 28 21:05:04 2023 daemon.info pppd[2587]: Exit.
Sat Oct 28 21:05:09 2023 daemon.err insmod: module is already loaded - ppp_generic
Sat Oct 28 21:05:09 2023 daemon.err insmod: module is already loaded - pppox
Sat Oct 28 21:05:09 2023 daemon.err insmod: module is already loaded - pppoe
Sat Oct 28 21:05:09 2023 daemon.info pppd[7990]: Plugin rp-pppoe.so loaded.
Sat Oct 28 21:05:09 2023 daemon.info pppd[7990]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
Sat Oct 28 21:05:09 2023 daemon.notice pppd[7990]: pppd 2.4.8 started by root, uid 0
Sat Oct 28 21:05:09 2023 daemon.info pppd[7990]: PPP session is 18
Sat Oct 28 21:05:09 2023 daemon.warn pppd[7990]: Connected to 40:a6:77:3f:2f:66 via interface wan
Sat Oct 28 21:05:09 2023 kern.info kernel: [ 2555.547175] pppoe-wan: renamed from ppp0
Sat Oct 28 21:05:09 2023 daemon.info pppd[7990]: Renamed interface ppp0 to pppoe-wan
Sat Oct 28 21:05:09 2023 daemon.info pppd[7990]: Using interface pppoe-wan
Sat Oct 28 21:05:09 2023 daemon.notice pppd[7990]: Connect: pppoe-wan <--> wan
Sat Oct 28 21:05:09 2023 daemon.info pppd[7990]: Remote message: [UI-SBR:17280,2944;UI-LINEID:1UND1.DEU.DTAG.M4XYC;]
Sat Oct 28 21:05:09 2023 daemon.notice pppd[7990]: PAP authentication succeeded
Sat Oct 28 21:05:09 2023 daemon.notice pppd[7990]: peer from calling number 40:A6:77:3F:2F:66 authorized
Sat Oct 28 21:05:09 2023 daemon.notice pppd[7990]: local  IP address 84.140.248.113
Sat Oct 28 21:05:09 2023 daemon.notice pppd[7990]: remote IP address 62.155.241.57
Sat Oct 28 21:05:09 2023 daemon.notice pppd[7990]: primary   DNS address 217.237.150.205
Sat Oct 28 21:05:09 2023 daemon.notice pppd[7990]: secondary DNS address 217.237.149.142
Sat Oct 28 21:05:09 2023 daemon.notice netifd: Network device 'pppoe-wan' link is up
Sat Oct 28 21:05:09 2023 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
Sat Oct 28 21:05:11 2023 user.notice vpn-policy-routing [7226]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sat Oct 28 21:05:13 2023 user.notice vpn-policy-routing [8900]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sat Oct 28 21:05:16 2023 user.notice vpn-policy-routing [9780]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sat Oct 28 21:05:18 2023 user.notice vpn-policy-routing [10326]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sat Oct 28 21:05:39 2023 daemon.warn pppd[7990]: IPV6CP: timeout sending Config-Requests
Sat Oct 28 21:08:11 2023 daemon.notice openvpn(de1076_nordvpn_udp)[2426]: net_route_v4_best_gw result: via 62.155.241.57 dev pppoe-wan
Sat Oct 28 21:08:12 2023 user.notice vpn-policy-routing [12102]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sat Oct 28 21:08:14 2023 user.notice vpn-policy-routing [12926]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sat Oct 28 22:23:01 2023 daemon.notice openvpn(de1085_nordvpn_udp)[2261]: net_route_v4_best_gw result: via 62.155.241.57 dev pppoe-wan
Sat Oct 28 22:23:02 2023 user.notice vpn-policy-routing [2373]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sat Oct 28 22:23:05 2023 user.notice vpn-policy-routing [3151]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]

As I am a beginner, this output doesn't tell me a lot. But I am curious to learn more, if there is something out of the ordinary I can focus on.
I have a new IP now, VPN is also restarted.

Thanks!

Could it be that mtr was with active VPN (the sequence of autonomous systems (AS) is not at all what I expect from a normal end-user link, but I have not seen any 1&1 mtr lately)? Because for low level debugging we fist need to see what happens without any VPN...

Sat Oct 28 21:05:09 2023 daemon.info pppd[7990]: Remote message: [UI-SBR:17280,2944;UI-LINEID:1UND1.DEU.DTAG.M4XYC;]

This tells me that indeed Deutsche Telekom is the operator of your access line, and that this is a slow link operating either ADSL2+ AnnexJ or VDSL2 .

Sat Oct 28 21:05:09 2023 daemon.notice pppd[7990]: local  IP address 84.140.248.113
Sat Oct 28 21:05:09 2023 daemon.notice pppd[7990]: remote IP address 62.155.241.57
Sat Oct 28 21:05:09 2023 daemon.notice pppd[7990]: primary   DNS address 217.237.150.205
Sat Oct 28 21:05:09 2023 daemon.notice pppd[7990]: secondary DNS address 217.237.149.142

all these IP addresses are from the range of Deutsche Telekom...

And that means this is actually Telekom WIA (wholesale internet access) that is technically this is a telekom line, likely with full dualstack... and for those the default OpenWrt should mostly work out of the box... But since you added a VPN with policy based routing, what other changes to the config did you make? And is the problem the WAN interface or is it the VPN that does not get updated?

Absolutely right, VPN was activated. Sorry. Here is the output without VPN:

Start: 2023-10-28T23:15:03+0200
HOST: OpenWrtHost1                                           Loss%   Snt   Last   Avg  Best  Wrst StDev
  1. AS3320   p3e9bf139.dip0.t-ipconnect.de (62.155.241.57)   0.0%    20    3.2   4.0   3.0  16.2   2.9
  2. AS3320   b-eh2-i.B.DE.NET.DTAG.DE (217.0.205.74)         0.0%    20   12.9  27.4  12.2 171.5  37.7
  3. AS3320   80.156.161.26 (80.156.161.26)                   0.0%    20   22.1  22.9  13.7  40.1   6.6
  4. AS8881   62.214.62.17 (62.214.62.17)                     0.0%    20   16.1  16.3  16.0  16.7   0.2
  5. AS8881   dns.versatel-west.de (62.220.18.8)              0.0%    20   16.2  16.1  15.8  16.5   0.2

I talked with an 1&1 technician, he said it is VDSL2. Slow indeed, glas fiber is not an option here, but maybe that will change within the next year.

Changes I made:

  • Change the DNS in the LAN-Interface to use the pihole, which again uses the router as upstream DNS Server
  • Set up NordVPN for all outgoing traffic, following this guide
  • Set up PiVPN and policy based routing to route all traffic coming from PiVPN to WAN instead of NordVPN, because that didn't work.
  • Setup DynDNS
  • Changed every 'reject' in the Firewall settings to 'drop' and check a checkbox because a Youtube-guy said it helps reduce the workload:

I guess that's it, but by trying a lot to get those things working, I might have changed something I didn't mean to change. Maybe I should, as you said, upgrade the whole system and use that to configure everything again from scratch.

If you say that everything should work with default settings, then this gives me enough confidence to try to rebuild everything and hope for a better outcome.

And that supports my WIA interpretation, that is your link should be simple dual stack and OpenWrt should just do the right thing out of the box, which it does not seem to do...

OK, VDSL2/PTM is IMHO nicer than ADSL2+/ATM/AAL5, but will not matter much for the problem at hand :wink:

That sounds like a fine plan. This time around make you changes sloly step by step and always conform that basic functionality still works...

The defaults should give you working internet access with properly renewing IPv4 and IPv6 addresses, it will not do all of the additional things you added, but as I said above, just try to introduce these step by step.

Finally:

Is a bit dodgy, you should at least have a theory what your changes are supposed to accomplish :wink:

Just thinking about it, could it be that pppd tries to connect a little too early/ too eagerly, before the old lease is really gone from their system - ending you in antispam (dual-connection) defenses?
I had something like that with he.net IPv6 tunnels in the past, daily disconnect by my ISP (without invalidating their tunnel first), but immediate reconnects (which made he.net's system think of a second connection, while the first -in their eyes- was still up, ending up in an endless loop).

Something like the following in cron, like e.g. (with a good hour of hysteresis) might help, as in voluntarily disconnecting (just) before the daily disconnect hits you (side effect, putting it at a convenient time):

0 5 * * * [ $(ifstatus wan | jsonfilter -e '@.uptime') -lt 3650 ] || ifup wan
1 Like

Have you restarted it already manually?

Please, give output AFTER CHANGING OF IP BY ISP, BUT BEFORE ANY MANUAL RESTARTING ACTIONS.

This time I waited for the disconnect and tried to catch everything:

After the connection was lost I automatically got a new IP address: 79.253.xxx.xxx/32
Output of logread | grep -e ppp directly after involuntary disconnect:

logread | grep -e ppp
Sun Oct 29 21:51:13 2023 daemon.debug pppd[12411]: rcvd [LCP TermReq id=0xf5]
Sun Oct 29 21:51:13 2023 daemon.info pppd[12411]: LCP terminated by peer
Sun Oct 29 21:51:13 2023 daemon.info pppd[12411]: Connect time 1440.0 minutes.
Sun Oct 29 21:51:13 2023 daemon.info pppd[12411]: Sent 358241697 bytes, received 1937647343 bytes.
Sun Oct 29 21:51:13 2023 daemon.notice netifd: Network device 'pppoe-wan' link is down
Sun Oct 29 21:51:13 2023 daemon.debug pppd[12411]: Script /lib/netifd/ppp-down started (pid 25669)
Sun Oct 29 21:51:13 2023 daemon.debug pppd[12411]: sent [LCP TermAck id=0xf5]
Sun Oct 29 21:51:13 2023 daemon.notice pppd[12411]: Modem hangup
Sun Oct 29 21:51:13 2023 daemon.notice pppd[12411]: Connection terminated.
Sun Oct 29 21:51:13 2023 daemon.debug pppd[12411]: Send PPPOE Discovery V1T1 PADT session 0x12 length 28
Sun Oct 29 21:51:13 2023 daemon.debug pppd[12411]:  dst 40:a6:77:3f:2f:66  src b4:75:0e:62:b4:6c
Sun Oct 29 21:51:13 2023 daemon.debug pppd[12411]:  [host-uniq  7b 30 00 00] [AC-cookie  49 0b e7 f0 fc a9 75 cf d2 d4 b8 db 6c 73 b9 c6]
Sun Oct 29 21:51:13 2023 daemon.info pppd[12411]: Sent PADT
Sun Oct 29 21:51:13 2023 daemon.debug pppd[12411]: Script /lib/netifd/ppp-down finished (pid 25669), status = 0x1
Sun Oct 29 21:51:13 2023 daemon.info pppd[12411]: Exit.
Sun Oct 29 21:51:13 2023 daemon.err insmod: module is already loaded - ppp_generic
Sun Oct 29 21:51:13 2023 daemon.err insmod: module is already loaded - pppox
Sun Oct 29 21:51:13 2023 daemon.err insmod: module is already loaded - pppoe
Sun Oct 29 21:51:13 2023 daemon.info pppd[25748]: Plugin rp-pppoe.so loaded.
Sun Oct 29 21:51:13 2023 daemon.info pppd[25748]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
Sun Oct 29 21:51:14 2023 daemon.notice pppd[25748]: pppd 2.4.8 started by root, uid 0
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]:  [service-name] [host-uniq  94 64 00 00]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: Recv PPPOE Discovery V1T1 PADO session 0x0 length 42
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]:  dst b4:75:0e:62:b4:6c  src 40:a6:77:3f:2f:66
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]:  [AC-name EUTJ00] [host-uniq  94 64 00 00] [service-name] [AC-cookie  49 0b e7 f0 fc a9 75 cf d2 d4 b8 db 6c 73 b9 c6]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: Send PPPOE Discovery V1T1 PADR session 0x0 length 32
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]:  dst 40:a6:77:3f:2f:66  src b4:75:0e:62:b4:6c
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]:  [service-name] [host-uniq  94 64 00 00] [AC-cookie  49 0b e7 f0 fc a9 75 cf d2 d4 b8 db 6c 73 b9 c6]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: Recv PPPOE Discovery V1T1 PADS session 0x12 length 42
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]:  dst b4:75:0e:62:b4:6c  src 40:a6:77:3f:2f:66
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]:  [service-name] [host-uniq  94 64 00 00] [AC-name EUTJ00] [AC-cookie  49 0b e7 f0 fc a9 75 cf d2 d4 b8 db 6c 73 b9 c6]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: PADS: Service-Name: ''
Sun Oct 29 21:51:14 2023 daemon.info pppd[25748]: PPP session is 18
Sun Oct 29 21:51:14 2023 daemon.warn pppd[25748]: Connected to 40:a6:77:3f:2f:66 via interface wan
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: using channel 4
Sun Oct 29 21:51:14 2023 kern.info kernel: [95321.065395] pppoe-wan: renamed from ppp0
Sun Oct 29 21:51:14 2023 daemon.info pppd[25748]: Renamed interface ppp0 to pppoe-wan
Sun Oct 29 21:51:14 2023 daemon.info pppd[25748]: Using interface pppoe-wan
Sun Oct 29 21:51:14 2023 daemon.notice pppd[25748]: Connect: pppoe-wan <--> wan
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0x9527e69c>]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: rcvd [LCP ConfReq id=0xe5 <mru 1492> <auth pap> <magic 0x2f49db58>]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: sent [LCP ConfAck id=0xe5 <mru 1492> <auth pap> <magic 0x2f49db58>]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: rcvd [LCP ConfAck id=0x1 <mru 1492> <magic 0x9527e69c>]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: sent [LCP EchoReq id=0x0 magic=0x9527e69c]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: sent [PAP AuthReq id=0x1 user="H1und1/xxxxx-xxxx@online.de" password=<hidden>]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: rcvd [LCP EchoRep id=0x0 magic=0x2f49db58]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: rcvd [PAP AuthAck id=0x1 "[UI-SBR:17280,2944;UI-LINEID:1UND1.DEU.DTAG.M4XYC;]"]
Sun Oct 29 21:51:14 2023 daemon.info pppd[25748]: Remote message: [UI-SBR:17280,2944;UI-LINEID:1UND1.DEU.DTAG.M4XYC;]
Sun Oct 29 21:51:14 2023 daemon.notice pppd[25748]: PAP authentication succeeded
Sun Oct 29 21:51:14 2023 daemon.notice pppd[25748]: peer from calling number 40:A6:77:3F:2F:66 authorized
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: sent [IPV6CP ConfReq id=0x1 <addr fe80::91c4:e07f:ef88:1751>]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: rcvd [IPCP ConfReq id=0x2f <addr 62.155.241.57>]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: sent [IPCP ConfAck id=0x2f <addr 62.155.241.57>]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: rcvd [IPCP ConfNak id=0x1 <addr 79.253.103.156> <ms-dns1 217.237.150.205> <ms-dns2 217.237.149.142>]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: sent [IPCP ConfReq id=0x2 <addr 79.253.103.156> <ms-dns1 217.237.150.205> <ms-dns2 217.237.149.142>]
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: rcvd [IPCP ConfAck id=0x2 <addr 79.253.103.156> <ms-dns1 217.237.150.205> <ms-dns2 217.237.149.142>]
Sun Oct 29 21:51:14 2023 daemon.notice pppd[25748]: local  IP address 79.253.103.156
Sun Oct 29 21:51:14 2023 daemon.notice pppd[25748]: remote IP address 62.155.241.57
Sun Oct 29 21:51:14 2023 daemon.notice pppd[25748]: primary   DNS address 217.237.150.205
Sun Oct 29 21:51:14 2023 daemon.notice pppd[25748]: secondary DNS address 217.237.149.142
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: Script /lib/netifd/ppp-up started (pid 25792)
Sun Oct 29 21:51:14 2023 daemon.notice netifd: Network device 'pppoe-wan' link is up
Sun Oct 29 21:51:14 2023 daemon.debug pppd[25748]: Script /lib/netifd/ppp-up finished (pid 25792), status = 0x1
Sun Oct 29 21:51:14 2023 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
Sun Oct 29 21:51:17 2023 user.notice vpn-policy-routing [26097]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sun Oct 29 21:51:17 2023 daemon.debug pppd[25748]: sent [IPV6CP ConfReq id=0x1 <addr fe80::91c4:e07f:ef88:1751>]
Sun Oct 29 21:51:20 2023 daemon.debug pppd[25748]: sent [IPV6CP ConfReq id=0x1 <addr fe80::91c4:e07f:ef88:1751>]
Sun Oct 29 21:51:23 2023 daemon.debug pppd[25748]: sent [IPV6CP ConfReq id=0x1 <addr fe80::91c4:e07f:ef88:1751>]
Sun Oct 29 21:51:26 2023 daemon.debug pppd[25748]: sent [IPV6CP ConfReq id=0x1 <addr fe80::91c4:e07f:ef88:1751>]
Sun Oct 29 21:51:29 2023 daemon.debug pppd[25748]: sent [IPV6CP ConfReq id=0x1 <addr fe80::91c4:e07f:ef88:1751>]
Sun Oct 29 21:51:32 2023 daemon.debug pppd[25748]: sent [IPV6CP ConfReq id=0x1 <addr fe80::91c4:e07f:ef88:1751>]
Sun Oct 29 21:51:35 2023 daemon.debug pppd[25748]: sent [IPV6CP ConfReq id=0x1 <addr fe80::91c4:e07f:ef88:1751>]
Sun Oct 29 21:51:38 2023 daemon.debug pppd[25748]: sent [IPV6CP ConfReq id=0x1 <addr fe80::91c4:e07f:ef88:1751>]
Sun Oct 29 21:51:41 2023 daemon.debug pppd[25748]: sent [IPV6CP ConfReq id=0x1 <addr fe80::91c4:e07f:ef88:1751>]
Sun Oct 29 21:51:44 2023 daemon.warn pppd[25748]: IPV6CP: timeout sending Config-Requests

Additional output of logread | grep -e ppp after the command /etc/init.d/network restart (Still no internet connection, new IP: 84.140.xxx.xxx/32)

Sun Oct 29 21:58:13 2023 daemon.info pppd[25748]: Terminating on signal 15
Sun Oct 29 21:58:13 2023 daemon.info pppd[25748]: Connect time 7.0 minutes.
Sun Oct 29 21:58:13 2023 daemon.info pppd[25748]: Sent 278 bytes, received 1842 bytes.
Sun Oct 29 21:58:13 2023 daemon.notice netifd: Network device 'pppoe-wan' link is down
Sun Oct 29 21:58:13 2023 daemon.debug pppd[25748]: Script /lib/netifd/ppp-down started (pid 28246)
Sun Oct 29 21:58:13 2023 daemon.debug pppd[25748]: sent [LCP TermReq id=0x2 "User request"]
Sun Oct 29 21:58:13 2023 daemon.debug pppd[25748]: rcvd [LCP TermAck id=0x2]
Sun Oct 29 21:58:13 2023 daemon.notice pppd[25748]: Connection terminated.
Sun Oct 29 21:58:13 2023 daemon.debug pppd[25748]: Send PPPOE Discovery V1T1 PADT session 0x12 length 28
Sun Oct 29 21:58:13 2023 daemon.debug pppd[25748]:  dst 40:a6:77:3f:2f:66  src b4:75:0e:62:b4:6c
Sun Oct 29 21:58:13 2023 daemon.debug pppd[25748]:  [host-uniq  94 64 00 00] [AC-cookie  49 0b e7 f0 fc a9 75 cf d2 d4 b8 db 6c 73 b9 c6]
Sun Oct 29 21:58:13 2023 daemon.info pppd[25748]: Sent PADT
Sun Oct 29 21:58:13 2023 daemon.debug pppd[25748]: Script /lib/netifd/ppp-down finished (pid 28246), status = 0x1
Sun Oct 29 21:58:13 2023 daemon.info pppd[25748]: Exit.
Sun Oct 29 21:58:19 2023 daemon.err insmod: module is already loaded - ppp_generic
Sun Oct 29 21:58:19 2023 daemon.err insmod: module is already loaded - pppox
Sun Oct 29 21:58:19 2023 daemon.err insmod: module is already loaded - pppoe
Sun Oct 29 21:58:19 2023 daemon.info pppd[29425]: Plugin rp-pppoe.so loaded.
Sun Oct 29 21:58:19 2023 daemon.info pppd[29425]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
Sun Oct 29 21:58:19 2023 daemon.notice pppd[29425]: pppd 2.4.8 started by root, uid 0
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]:  [service-name] [host-uniq  f1 72 00 00]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: Recv PPPOE Discovery V1T1 PADO session 0x0 length 42
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]:  dst b4:75:0e:62:b4:6c  src 40:a6:77:3f:2f:66
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]:  [AC-name EUTJ00] [host-uniq  f1 72 00 00] [service-name] [AC-cookie  49 0b e7 f0 fc a9 75 cf d2 d4 b8 db 6c 73 b9 c6]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: Send PPPOE Discovery V1T1 PADR session 0x0 length 32
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]:  dst 40:a6:77:3f:2f:66  src b4:75:0e:62:b4:6c
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]:  [service-name] [host-uniq  f1 72 00 00] [AC-cookie  49 0b e7 f0 fc a9 75 cf d2 d4 b8 db 6c 73 b9 c6]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: Recv PPPOE Discovery V1T1 PADS session 0x12 length 42
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]:  dst b4:75:0e:62:b4:6c  src 40:a6:77:3f:2f:66
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]:  [service-name] [host-uniq  f1 72 00 00] [AC-name EUTJ00] [AC-cookie  49 0b e7 f0 fc a9 75 cf d2 d4 b8 db 6c 73 b9 c6]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: PADS: Service-Name: ''
Sun Oct 29 21:58:19 2023 daemon.info pppd[29425]: PPP session is 18
Sun Oct 29 21:58:19 2023 daemon.warn pppd[29425]: Connected to 40:a6:77:3f:2f:66 via interface wan
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: using channel 5
Sun Oct 29 21:58:19 2023 kern.info kernel: [95746.226008] pppoe-wan: renamed from ppp0
Sun Oct 29 21:58:19 2023 daemon.info pppd[29425]: Renamed interface ppp0 to pppoe-wan
Sun Oct 29 21:58:19 2023 daemon.info pppd[29425]: Using interface pppoe-wan
Sun Oct 29 21:58:19 2023 daemon.notice pppd[29425]: Connect: pppoe-wan <--> wan
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0x62aeea68>]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: rcvd [LCP ConfReq id=0x9a <mru 1492> <auth pap> <magic 0x41bb1504>]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: sent [LCP ConfAck id=0x9a <mru 1492> <auth pap> <magic 0x41bb1504>]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: rcvd [LCP ConfAck id=0x1 <mru 1492> <magic 0x62aeea68>]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: sent [LCP EchoReq id=0x0 magic=0x62aeea68]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: sent [PAP AuthReq id=0x1 user="H1und1/ui6188-980@online.de" password=<hidden>]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: rcvd [LCP EchoRep id=0x0 magic=0x41bb1504]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: rcvd [PAP AuthAck id=0x1 "[UI-SBR:17280,2944;UI-LINEID:1UND1.DEU.DTAG.M4XYC;]"]
Sun Oct 29 21:58:19 2023 daemon.info pppd[29425]: Remote message: [UI-SBR:17280,2944;UI-LINEID:1UND1.DEU.DTAG.M4XYC;]
Sun Oct 29 21:58:19 2023 daemon.notice pppd[29425]: PAP authentication succeeded
Sun Oct 29 21:58:19 2023 daemon.notice pppd[29425]: peer from calling number 40:A6:77:3F:2F:66 authorized
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: sent [IPV6CP ConfReq id=0x1 <addr fe80::6daa:d6b7:9b0f:1ec0>]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: rcvd [IPCP ConfReq id=0x1a <addr 62.155.241.57>]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: sent [IPCP ConfAck id=0x1a <addr 62.155.241.57>]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: rcvd [IPCP ConfNak id=0x1 <addr 84.140.248.159> <ms-dns1 217.237.150.205> <ms-dns2 217.237.149.142>]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: sent [IPCP ConfReq id=0x2 <addr 84.140.248.159> <ms-dns1 217.237.150.205> <ms-dns2 217.237.149.142>]
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: rcvd [IPCP ConfAck id=0x2 <addr 84.140.248.159> <ms-dns1 217.237.150.205> <ms-dns2 217.237.149.142>]
Sun Oct 29 21:58:19 2023 daemon.notice pppd[29425]: local  IP address 84.140.248.159
Sun Oct 29 21:58:19 2023 daemon.notice pppd[29425]: remote IP address 62.155.241.57
Sun Oct 29 21:58:19 2023 daemon.notice pppd[29425]: primary   DNS address 217.237.150.205
Sun Oct 29 21:58:19 2023 daemon.notice pppd[29425]: secondary DNS address 217.237.149.142
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: Script /lib/netifd/ppp-up started (pid 29453)
Sun Oct 29 21:58:19 2023 daemon.notice netifd: Network device 'pppoe-wan' link is up
Sun Oct 29 21:58:19 2023 daemon.debug pppd[29425]: Script /lib/netifd/ppp-up finished (pid 29453), status = 0x1
Sun Oct 29 21:58:19 2023 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
Sun Oct 29 21:58:20 2023 user.notice vpn-policy-routing [28634]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sun Oct 29 21:58:22 2023 daemon.debug pppd[29425]: sent [IPV6CP ConfReq id=0x1 <addr fe80::6daa:d6b7:9b0f:1ec0>]
Sun Oct 29 21:58:24 2023 user.notice vpn-policy-routing [30604]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sun Oct 29 21:58:25 2023 daemon.debug pppd[29425]: sent [IPV6CP ConfReq id=0x1 <addr fe80::6daa:d6b7:9b0f:1ec0>]
Sun Oct 29 21:58:26 2023 user.notice vpn-policy-routing [31153]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sun Oct 29 21:58:28 2023 daemon.debug pppd[29425]: sent [IPV6CP ConfReq id=0x1 <addr fe80::6daa:d6b7:9b0f:1ec0>]
Sun Oct 29 21:58:31 2023 daemon.debug pppd[29425]: sent [IPV6CP ConfReq id=0x1 <addr fe80::6daa:d6b7:9b0f:1ec0>]
Sun Oct 29 21:58:34 2023 daemon.debug pppd[29425]: sent [IPV6CP ConfReq id=0x1 <addr fe80::6daa:d6b7:9b0f:1ec0>]
Sun Oct 29 21:58:37 2023 daemon.debug pppd[29425]: sent [IPV6CP ConfReq id=0x1 <addr fe80::6daa:d6b7:9b0f:1ec0>]
Sun Oct 29 21:58:39 2023 daemon.notice openvpn(de1075_nordvpn_udp)[2210]: net_route_v4_best_gw result: via 62.155.241.57 dev pppoe-wan
Sun Oct 29 21:58:40 2023 daemon.debug pppd[29425]: sent [IPV6CP ConfReq id=0x1 <addr fe80::6daa:d6b7:9b0f:1ec0>]
Sun Oct 29 21:58:40 2023 user.notice vpn-policy-routing [32150]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sun Oct 29 21:58:43 2023 user.notice vpn-policy-routing [512]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]

And finally the log until now, after pulling the plug and putting it back again:

logread | grep -e ppp
Sun Oct 29 21:58:54 2023 daemon.err insmod: module is already loaded - ppp_generic
Sun Oct 29 21:58:54 2023 daemon.err insmod: module is already loaded - pppox
Sun Oct 29 21:58:54 2023 daemon.err insmod: module is already loaded - pppoe
Sun Oct 29 21:58:54 2023 daemon.info pppd[3264]: Plugin rp-pppoe.so loaded.
Sun Oct 29 21:58:54 2023 daemon.info pppd[3264]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
Sun Oct 29 21:58:54 2023 daemon.notice pppd[3264]: pppd 2.4.8 started by root, uid 0
Sun Oct 29 21:58:54 2023 daemon.debug pppd[3264]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:58:54 2023 daemon.debug pppd[3264]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:58:54 2023 daemon.debug pppd[3264]:  [service-name] [host-uniq  c0 0c 00 00]
Sun Oct 29 21:58:59 2023 daemon.debug pppd[3264]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:58:59 2023 daemon.debug pppd[3264]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:58:59 2023 daemon.debug pppd[3264]:  [service-name] [host-uniq  c0 0c 00 00]
Sun Oct 29 21:59:04 2023 daemon.debug pppd[3264]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:59:04 2023 daemon.debug pppd[3264]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:59:04 2023 daemon.debug pppd[3264]:  [service-name] [host-uniq  c0 0c 00 00]
Sun Oct 29 21:59:09 2023 daemon.warn pppd[3264]: Timeout waiting for PADO packets
Sun Oct 29 21:59:09 2023 daemon.err pppd[3264]: Unable to complete PPPoE Discovery
Sun Oct 29 21:59:09 2023 daemon.info pppd[3264]: Exit.
Sun Oct 29 21:59:09 2023 daemon.err insmod: module is already loaded - ppp_generic
Sun Oct 29 21:59:09 2023 daemon.err insmod: module is already loaded - pppox
Sun Oct 29 21:59:09 2023 daemon.err insmod: module is already loaded - pppoe
Sun Oct 29 21:59:09 2023 daemon.info pppd[4672]: Plugin rp-pppoe.so loaded.
Sun Oct 29 21:59:09 2023 daemon.info pppd[4672]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
Sun Oct 29 21:59:09 2023 daemon.notice pppd[4672]: pppd 2.4.8 started by root, uid 0
Sun Oct 29 21:59:09 2023 daemon.debug pppd[4672]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:59:09 2023 daemon.debug pppd[4672]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:59:09 2023 daemon.debug pppd[4672]:  [service-name] [host-uniq  40 12 00 00]
Sun Oct 29 21:59:14 2023 daemon.debug pppd[4672]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:59:14 2023 daemon.debug pppd[4672]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:59:14 2023 daemon.debug pppd[4672]:  [service-name] [host-uniq  40 12 00 00]
Sun Oct 29 21:59:19 2023 daemon.debug pppd[4672]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:59:19 2023 daemon.debug pppd[4672]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:59:19 2023 daemon.debug pppd[4672]:  [service-name] [host-uniq  40 12 00 00]
Sun Oct 29 21:59:24 2023 daemon.warn pppd[4672]: Timeout waiting for PADO packets
Sun Oct 29 21:59:24 2023 daemon.err pppd[4672]: Unable to complete PPPoE Discovery
Sun Oct 29 21:59:24 2023 daemon.info pppd[4672]: Exit.
Sun Oct 29 21:59:24 2023 daemon.err insmod: module is already loaded - ppp_generic
Sun Oct 29 21:59:24 2023 daemon.err insmod: module is already loaded - pppox
Sun Oct 29 21:59:24 2023 daemon.err insmod: module is already loaded - pppoe
Sun Oct 29 21:59:24 2023 daemon.info pppd[5731]: Plugin rp-pppoe.so loaded.
Sun Oct 29 21:59:24 2023 daemon.info pppd[5731]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
Sun Oct 29 21:59:25 2023 daemon.notice pppd[5731]: pppd 2.4.8 started by root, uid 0
Sun Oct 29 21:59:25 2023 daemon.debug pppd[5731]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:59:25 2023 daemon.debug pppd[5731]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:59:25 2023 daemon.debug pppd[5731]:  [service-name] [host-uniq  63 16 00 00]
Sun Oct 29 21:59:30 2023 daemon.debug pppd[5731]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:59:30 2023 daemon.debug pppd[5731]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:59:30 2023 daemon.debug pppd[5731]:  [service-name] [host-uniq  63 16 00 00]
Sun Oct 29 21:59:35 2023 daemon.debug pppd[5731]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:59:35 2023 daemon.debug pppd[5731]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:59:35 2023 daemon.debug pppd[5731]:  [service-name] [host-uniq  63 16 00 00]
Sun Oct 29 21:59:40 2023 daemon.warn pppd[5731]: Timeout waiting for PADO packets
Sun Oct 29 21:59:40 2023 daemon.err pppd[5731]: Unable to complete PPPoE Discovery
Sun Oct 29 21:59:40 2023 daemon.info pppd[5731]: Exit.
Sun Oct 29 21:59:40 2023 daemon.err insmod: module is already loaded - ppp_generic
Sun Oct 29 21:59:40 2023 daemon.err insmod: module is already loaded - pppox
Sun Oct 29 21:59:40 2023 daemon.err insmod: module is already loaded - pppoe
Sun Oct 29 21:59:40 2023 daemon.info pppd[6399]: Plugin rp-pppoe.so loaded.
Sun Oct 29 21:59:40 2023 daemon.info pppd[6399]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
Sun Oct 29 21:59:40 2023 daemon.notice pppd[6399]: pppd 2.4.8 started by root, uid 0
Sun Oct 29 21:59:40 2023 daemon.debug pppd[6399]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:59:40 2023 daemon.debug pppd[6399]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:59:40 2023 daemon.debug pppd[6399]:  [service-name] [host-uniq  ff 18 00 00]
Sun Oct 29 21:59:45 2023 daemon.debug pppd[6399]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:59:45 2023 daemon.debug pppd[6399]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:59:45 2023 daemon.debug pppd[6399]:  [service-name] [host-uniq  ff 18 00 00]
Sun Oct 29 21:59:50 2023 daemon.debug pppd[6399]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:59:50 2023 daemon.debug pppd[6399]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:59:50 2023 daemon.debug pppd[6399]:  [service-name] [host-uniq  ff 18 00 00]
Sun Oct 29 21:59:55 2023 daemon.warn pppd[6399]: Timeout waiting for PADO packets
Sun Oct 29 21:59:55 2023 daemon.err pppd[6399]: Unable to complete PPPoE Discovery
Sun Oct 29 21:59:55 2023 daemon.info pppd[6399]: Exit.
Sun Oct 29 21:59:55 2023 daemon.err insmod: module is already loaded - ppp_generic
Sun Oct 29 21:59:55 2023 daemon.err insmod: module is already loaded - pppox
Sun Oct 29 21:59:55 2023 daemon.err insmod: module is already loaded - pppoe
Sun Oct 29 21:59:55 2023 daemon.info pppd[7552]: Plugin rp-pppoe.so loaded.
Sun Oct 29 21:59:55 2023 daemon.info pppd[7552]: RP-PPPoE plugin version 3.8p compiled against pppd 2.4.8
Sun Oct 29 21:59:55 2023 daemon.notice pppd[7552]: pppd 2.4.8 started by root, uid 0
Sun Oct 29 21:59:55 2023 daemon.debug pppd[7552]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 21:59:55 2023 daemon.debug pppd[7552]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 21:59:55 2023 daemon.debug pppd[7552]:  [service-name] [host-uniq  80 1d 00 00]
Sun Oct 29 21:59:55 2023 daemon.debug pppd[7552]: Recv PPPOE Discovery V1T1 PADT session 0x12 length 0
Sun Oct 29 21:59:55 2023 daemon.debug pppd[7552]:  dst b4:75:0e:62:b4:6c  src 40:a6:77:3f:2f:66
Sun Oct 29 21:59:55 2023 daemon.debug pppd[7552]:
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: Send PPPOE Discovery V1T1 PADI session 0x0 length 12
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]:  dst ff:ff:ff:ff:ff:ff  src b4:75:0e:62:b4:6c
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]:  [service-name] [host-uniq  80 1d 00 00]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: Recv PPPOE Discovery V1T1 PADO session 0x0 length 42
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]:  dst b4:75:0e:62:b4:6c  src 40:a6:77:3f:2f:66
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]:  [AC-name EUTJ00] [host-uniq  80 1d 00 00] [service-name] [AC-cookie  49 0b e7 f0 fc a9 75 cf d2 d4 b8 db 6c 73 b9 c6]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: Send PPPOE Discovery V1T1 PADR session 0x0 length 32
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]:  dst 40:a6:77:3f:2f:66  src b4:75:0e:62:b4:6c
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]:  [service-name] [host-uniq  80 1d 00 00] [AC-cookie  49 0b e7 f0 fc a9 75 cf d2 d4 b8 db 6c 73 b9 c6]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: Recv PPPOE Discovery V1T1 PADS session 0x12 length 42
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]:  dst b4:75:0e:62:b4:6c  src 40:a6:77:3f:2f:66
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]:  [service-name] [host-uniq  80 1d 00 00] [AC-name EUTJ00] [AC-cookie  49 0b e7 f0 fc a9 75 cf d2 d4 b8 db 6c 73 b9 c6]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: PADS: Service-Name: ''
Sun Oct 29 22:00:00 2023 daemon.info pppd[7552]: PPP session is 18
Sun Oct 29 22:00:00 2023 daemon.warn pppd[7552]: Connected to 40:a6:77:3f:2f:66 via interface wan
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: using channel 1
Sun Oct 29 22:00:00 2023 kern.info kernel: [   88.378636] pppoe-wan: renamed from ppp0
Sun Oct 29 22:00:00 2023 daemon.info pppd[7552]: Renamed interface ppp0 to pppoe-wan
Sun Oct 29 22:00:00 2023 daemon.info pppd[7552]: Using interface pppoe-wan
Sun Oct 29 22:00:00 2023 daemon.notice pppd[7552]: Connect: pppoe-wan <--> wan
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: sent [LCP ConfReq id=0x1 <mru 1492> <magic 0x5d7abf7>]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: rcvd [LCP ConfReq id=0x6f <mru 1492> <auth pap> <magic 0x4fa6dc62>]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: sent [LCP ConfAck id=0x6f <mru 1492> <auth pap> <magic 0x4fa6dc62>]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: rcvd [LCP ConfAck id=0x1 <mru 1492> <magic 0x5d7abf7>]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: sent [LCP EchoReq id=0x0 magic=0x5d7abf7]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: sent [PAP AuthReq id=0x1 user="H1und1/xxxxxx-xxx@online.de" password=<hidden>]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: rcvd [LCP EchoRep id=0x0 magic=0x4fa6dc62]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: rcvd [PAP AuthAck id=0x1 "[UI-SBR:17280,2944;UI-LINEID:1UND1.DEU.DTAG.M4XYC;]"]
Sun Oct 29 22:00:00 2023 daemon.info pppd[7552]: Remote message: [UI-SBR:17280,2944;UI-LINEID:1UND1.DEU.DTAG.M4XYC;]
Sun Oct 29 22:00:00 2023 daemon.notice pppd[7552]: PAP authentication succeeded
Sun Oct 29 22:00:00 2023 daemon.notice pppd[7552]: peer from calling number 40:A6:77:3F:2F:66 authorized
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: sent [IPCP ConfReq id=0x1 <addr 0.0.0.0> <ms-dns1 0.0.0.0> <ms-dns2 0.0.0.0>]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: sent [IPV6CP ConfReq id=0x1 <addr fe80::508e:eb3f:4209:0565>]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: rcvd [IPCP ConfReq id=0x8b <addr 62.155.241.57>]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: sent [IPCP ConfAck id=0x8b <addr 62.155.241.57>]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: rcvd [IPCP ConfNak id=0x1 <addr 79.253.107.67> <ms-dns1 217.237.150.205> <ms-dns2 217.237.149.142>]
Sun Oct 29 22:00:00 2023 daemon.debug pppd[7552]: sent [IPCP ConfReq id=0x2 <addr 79.253.107.67> <ms-dns1 217.237.150.205> <ms-dns2 217.237.149.142>]
Sun Oct 29 22:00:01 2023 daemon.debug pppd[7552]: rcvd [IPCP ConfAck id=0x2 <addr 79.253.107.67> <ms-dns1 217.237.150.205> <ms-dns2 217.237.149.142>]
Sun Oct 29 22:00:01 2023 daemon.notice pppd[7552]: local  IP address 79.253.107.67
Sun Oct 29 22:00:01 2023 daemon.notice pppd[7552]: remote IP address 62.155.241.57
Sun Oct 29 22:00:01 2023 daemon.notice pppd[7552]: primary   DNS address 217.237.150.205
Sun Oct 29 22:00:01 2023 daemon.notice pppd[7552]: secondary DNS address 217.237.149.142
Sun Oct 29 22:00:01 2023 daemon.debug pppd[7552]: Script /lib/netifd/ppp-up started (pid 7975)
Sun Oct 29 22:00:01 2023 daemon.notice netifd: Network device 'pppoe-wan' link is up
Sun Oct 29 22:00:01 2023 daemon.debug pppd[7552]: Script /lib/netifd/ppp-up finished (pid 7975), status = 0x1
Sun Oct 29 22:00:01 2023 user.notice firewall: Reloading firewall due to ifup of wan (pppoe-wan)
Sun Oct 29 22:00:03 2023 user.notice vpn-policy-routing [6436]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sun Oct 29 22:00:03 2023 daemon.debug pppd[7552]: sent [IPV6CP ConfReq id=0x1 <addr fe80::508e:eb3f:4209:0565>]
Sun Oct 29 22:05:21 2023 user.notice vpn-policy-routing [8850]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sun Oct 29 22:05:23 2023 daemon.debug pppd[7552]: sent [IPV6CP ConfReq id=0x1 <addr fe80::508e:eb3f:4209:0565>]
Sun Oct 29 22:05:26 2023 daemon.debug pppd[7552]: sent [IPV6CP ConfReq id=0x1 <addr fe80::508e:eb3f:4209:0565>]
Sun Oct 29 22:05:29 2023 daemon.debug pppd[7552]: sent [IPV6CP ConfReq id=0x1 <addr fe80::508e:eb3f:4209:0565>]
Sun Oct 29 22:05:32 2023 daemon.debug pppd[7552]: sent [IPV6CP ConfReq id=0x1 <addr fe80::508e:eb3f:4209:0565>]
Sun Oct 29 22:05:35 2023 daemon.debug pppd[7552]: sent [IPV6CP ConfReq id=0x1 <addr fe80::508e:eb3f:4209:0565>]
Sun Oct 29 22:05:38 2023 daemon.debug pppd[7552]: sent [IPV6CP ConfReq id=0x1 <addr fe80::508e:eb3f:4209:0565>]
Sun Oct 29 22:05:40 2023 daemon.notice openvpn(de1075_nordvpn_udp)[2449]: net_route_v4_best_gw result: via 62.155.241.57 dev pppoe-wan
Sun Oct 29 22:05:41 2023 daemon.debug pppd[7552]: sent [IPV6CP ConfReq id=0x1 <addr fe80::508e:eb3f:4209:0565>]
Sun Oct 29 22:05:42 2023 user.notice vpn-policy-routing [9770]: Creating table 'wan/pppoe-wan/62.155.241.57' [✓]
Sun Oct 29 22:05:44 2023 daemon.debug pppd[7552]: sent [IPV6CP ConfReq id=0x1 <addr fe80::508e:eb3f:4209:0565>]
Sun Oct 29 22:05:47 2023 daemon.warn pppd[7552]: IPV6CP: timeout sending Config-Requests

OK, I mean, can you specify string to trigger some action (network restart)?

I am not sure if I understand your question. Do you mean what commands I used to restart the network and the router? If yes:

  • The first time the connection broke I didn't do anything, it just stopped working 24 hours after the last time I got a new IP from my ISP.

  • Then I used the command /etc/init.d/network restart to try to get everything work again without having to restart the router. But, as I wrote, I got a new IP but still no internet connection.

  • Last try, the successfull one, I didn't use any command, I just pulled the plug of the router and put it back in again. After waiting a minute, everything worked normal again

I am sorry if I misunderstood your question.