Section 8 - Security Schedules Path: Security > Firewall > Schedules Firewall rules can be enabled or disabled automatically if they are associated with a configured schedule. The schedule configuration page allows you to define days of the week and the time of day for a new schedule, and then this schedule can be selected in the firewall rule configuration page. Note: All schedules will follow the time in the router’s configured time zone.
Section 8 - Security Custom Services Path: Security > Firewall > Custom Services Custom services can be defined to add to the list of services available during firewall rule configuration. While common services have known TCP/UDP/ICMP ports for traffic, many custom or uncommon applications exist in the LAN or WAN. In the custom service configuration menu you can define a range of ports and identify the traffic type (TCP/UDP/ICMP) for this service.
Section 8 - Security ALGs Path: Security > Firewall > ALGs Application Level Gateways (ALGs) are security components that enhance the firewall and NAT support of this router to seamlessly support application layer protocols. In some cases enabling the ALG will allow the firewall to use dynamic ephemeral TCP/ UDP ports to communicate with the known ports a particular client application (such as H.
Section 8 - Security SMTP ALGs Path: Security > Firewall > ALGs > SMTP ALGs Simple Mail Transfer Protocol (SMTP) is a text based protocol used for transferring email between mail servers over the Internet. Typically the local SMTP server will be located on a DMZ so that mail sent by remote SMTP servers will traverse the router to reach the local server. Local users will then use email client software to retrieve their email from the local SMTP server.
Section 8 - Security Approved Mail IDs Path: Security > Firewall > ALGs > Approved Mail IDs 1. Click Security > Firewall > ALGs > Approved Mail IDs tab. 2. Right-click an entry and select either Edit or Delete. To add a new mail ID, click Add New Approved Mail ID. 3. Enter a mail ID and click Save.
Section 8 - Security Blocked Mail IDs Path: Security > Firewall > ALGs > Blocked Mail IDs 1. Click Security > Firewall > ALGs > Blocked Mail IDs tab. 2. Right-click an entry and select either Edit or Delete. To add a new mail ID, click Add New Blocked Mail ID. 3. Enter a mail ID and click Save.
Section 8 - Security Mail Filtering Path: Security > Firewall > ALGs > Mail Filtering 1. Click Security > Firewall > ALGs > Mail Filtering tab. 2. Right-click an entry and select either Edit or Delete. To add a new mail ID, click Add New Mail Filter. 3. Enter a subject and a mail ID. 4. Select to allow or block. 5. Click Save.
Section 8 - Security VPN Passthrough Path: Security > Firewall > VPN Passthrough This router’s firewall settings can be configured to allow encrypted VPN traffic for IPsec, PPTP, and L2TP VPN tunnel connections between the LAN and internet. A specific firewall rule or service is not appropriate to introduce this passthrough support; instead the options in the VPN Passthrough page must be toggled to ON. 1. Click Security > Firewall > VPN Passthrough. 2.
Section 8 - Security Dynamic Port Forwarding Application Rules Path: Security > Firewall > Dynamic Port Forwarding > Application Rules Application rules are also referred to as port triggering. This feature allows devices on the LAN or DMZ to request one or more ports to be forwarded to them. Port triggering waits for an outbound request from the LAN/DMZ on one of the defined outgoing ports, and then opens an incoming port for that specified type of traffic.
Section 8 - Security 3. Complete the fields from the table below and click Save. Field Name Enter a name for your rule. Description Enable Toggle to ON to activate the rule. Protocol Select TCP or UDP. Interface Select either LAN or DMZ. Outgoing (Trigger) Port Range Incoming Port Range Save Enter the start and end trigger port range. Enter the port range to open. Click to save your settings. 4. Click on the Application Rules Status tab to see a list of rules and their status.
Section 8 - Security Attack Checks Path: Security > Firewall > Attack Checks Attacks can be malicious security breaches or unintentional network issues that render the router unusable Attack checks allow you to manage WAN security threats such as continual ping requests and discovery via ARP scans. TCP and UDP flood attack checks can be enabled to manage extreme usage of WAN resources. Additionally certain Denial-of-Service (DoS) attacks can be blocked.
Section 8 - Security Intel® AMT Path: Security > Firewall > Intel® AMT Intel® Active Management Technology (AMT) allows you to remotely access and manage every networked device, even those that lack a working operating system or hard drive, or are turned off as long as the computer is connected to line power and to the network. Intel AMT uses a separate management processor that runs independently on the client machine and can be reached through the wired or wireless network. 1.
Section 8 - Security IPS Path: Security > Firewall > IPS The router’s Intrusion Prevention System (IPS) prevents malicious attacks from the internet from accessing the private network. Static attack signatures loaded to the router allow common attacks to be detected and prevented. The checks can be enabled between the WAN and DMZ or LAN, and a running counter will allow the administrator to see how many malicious intrusion attempts from the WAN have been detected and prevented.
Section 9 - Maintenance Maintenance System Settings Path: Maintenance > Administration > System Setting You may change the name of the router here. 1. Click Maintenance > Administration > System Setting. 2. Complete the fields from the table below and click Save. Field Current System Name Displays the current name for the router. New Name for System Enter a new name for the router. Save Description Click to save and activate your settings.
Section 9 - Maintenance Date and Time Path: Maintenance > Administration > Date and Time You can configure your time zone, whether or not to adjust for Daylight Savings Time, and with which Network Time Protocol (NTP) server to synchronize the date and time. You can choose to set Date and Time manually, which will store the information on the router’s real time clock (RTC). If the router has access to the internet, the most accurate mechanism to set the router time is to enable NTP server communication. 1.
Section 9 - Maintenance Session Settings Path: Maintenance > Administration > Session Settings Here you can set the timeout value for admin and guest logins. 1. Click Maintenance > Administration > Session Settings. 2. Complete the fields from the table below and click Save. Field Administrator Description Enter the timeout value in minutes for the Administrator account. Guest Enter the timeout value in minutes for the Guest account. Save Click to save and activate your settings.
Section 8 - Security License Updates Path: Maintenance > Administration > License Update Certain features can be added to the router by purchasing a license key. An activation code is provided based on the router’s MAC Address, so it will be unique to that particular device. Each license has the following three parameters: Field Model Activation Code Expiration Description The license model as it relates to the feature being added. The activation code corresponding to this license.
Section 9 - Maintenance USB Share Ports Path: Maintenance > Administration > USB Share Ports This page allows configure the SharePort feature available on this router. 1. Click Maintenance > Administration > USB Share Ports. 2. Complete the fields from the table below and click Save. Field USB Port 1 Printer Description Toggle to ON to enable USB port 1. Once enabled you will need to enter your printer information. USB Port 2 Printer Toggle to ON to enable USB port 2.
Section 9 - Maintenance SMS Service Inbox Path: Maintenance > Administration > SMS Service > Inbox The D-Link Services Router has a USB interface to connect 3G modem support to send and receive Short Messaging Service (SMS). The received messages can be seen in the Inbox and allows the user to create a new SMS. If WAN3 is used in dedicated WAN mode, load balancing mode, or if the 3G USB device is not connected to router then the controls on this page will not be available. To view any incoming messages: 1.
Section 9 - Maintenance Create SMS Path: Maintenance > Administration > SMS Service> Create SMS This page allows you to send a message using the SMS service. 1. Click Maintenance > Administration > SMS Service > Create SMS tab. 2. Complete the fields from the table below and click Send Message. Field Receiver Description Enter the phone number of the intended receiver. Text Message Enter the message you want to send. Send Message Click to send your message. Cancel Click to reset the fields.
Section 9 - Maintenance Package Manager Path: Maintenance > Administration > Package Manager Note: This feature is only supported on the DSR-1000, DSR-1000N, DSR-500, and DSR-500N routers. A package is a set of files which are installed by the router from D-Link’s repositories. This feature allows users to download new drivers for supported USB devices and language packs to enable multi-lingual support for the router’s management interface.
Section 9 - Maintenance 2. Complete the fields from the table below. Field List of Default Drivers Manual Install Description Displays the default drivers that are installed. Click to display a list of available packages for download. You must be connected to the Internet. Here you can select the driver to update or install. If you have downloaded a packed, click Browse and select the package. Click Open and then click Install. Install History Displays a list of package installations.
Section 9 - Maintenance Set Language Path: Maintenance > Administration > Set Language You can download language packs (refer to “Package Manager” on page 168) and install them on the router. Once you have downloaded a pack, follow the steps below to install: 1. Click Maintenance > Administration > Set Language. 2. Select a loaded language pack from the drop-down menu and click Save.
Section 9 - Maintenance Web GUI Management Path: Maintenance > Administration > Web GUI Management The Web GUI Management page will allow you to specify by IP address or VLAN what users can configure the router using the web GUI. 1. Click Maintenance > Administration > Web GUI Management. 2. Toggle Enable to ON and click Save. 3. Click Add New Configuration. 4. Enter a name for this configuration. 5.
Section 9 - Maintenance Remote Management Path: Maintenance > Management > Remote Management Enable this feature to be able to manage the router from a remote location, using HTTPS or Telnet. Both HTTPS and Telnet access can be restricted to a subset of IP addresses. The router administrator can define a known PC, single IP address or range of IP addresses that are allowed to access the GUI with HTTPS.
Section 9 - Maintenance SNMP Path: Maintenance > Management > SNMP SNMP is an additional management tool that is useful when multiple routers in a network are being managed by a central Master system. When an external SNMP manager is provided with this router’s Management Information Base (MIB) file, the manager can update the router’s hierarchal variables to view or update configuration parameters.
Section 9 - Maintenance SNMP Trap List Path: Maintenance > Management > SNMP > SNMP Trap List To create a new SNMP trap: 1. Click Maintenance > Management > SNMP > SNMP Trap List tab. 2. Right-click an entry and select either Edit or Delete. To add a new trap, click Add SNMP Trap. 3. Complete the fields from the table below and click Save. Field IP Address Port Community Authentication Type Save Description The IP Address of the SNMP trap agent.
Section 9 - Maintenance Access Control Path: Maintenance > Management > SNMP > Access Control List To edit, delete, or create a new access control entry: 1. Click Maintenance > Management > SNMP > Access Control List tab. 2. Right-click an entry and select either Edit or Delete. To add a new trap, click Add Access Control. 3. Complete the fields from the table below and click Save. Field IP Address Subnet Mask Community Access Type Save Description The IP Address of the SNMP agent.
Section 9 - Maintenance SNMP System Info Path: Maintenance > Management > SNMP > SNMP System Info To create a new SNMP trap: 1. Click Maintenance > Management > SNMP > SNMP System Info tab. 2. Complete the fields from the table below and click Save. Field SysContact Description The name of the contact person for this router. Examples: admin, John Doe. SysLocation The physical location of the router: Example: Rack #2, 4th Floor. SysName Save A name given for easy identification of the router.
Section 9 - Maintenance Diagnostics Ping an IP Address/Domain Name Path: Maintenance > Management > Diagnostics > Network Tools As part of the diagnostics functions on the router, you can ping an IP address or domain name. You can use this function to test connectivity between the router and another device on the network or the Internet. 1. Click Maintenance > Diagnostics > Network Tools tab. 2.
Section 9 - Maintenance Using Traceroute Path: Maintenance > Management > Diagnostics > Network Tools The router provides a Traceroute function that lets you map the network path to a public host. Up to 30 “hops” between this router and the destination will be displayed. 1. Click Maintenance > Diagnostics > Network Tools tab. 2. Under Command Output for Ping and Traceroute, in the IP Address/Domain Name field, enter an IP address or domain name. 3. Click Traceroute.
Section 9 - Maintenance Performing DNS Lookups Path: Maintenance > Management > Diagnostics > Network Tools The router provides a DNS lookup function that lets you retrieve the IP address of a Web, FTP, Mail, or any other server on the Internet. 1. Click Maintenance > Diagnostics > Network Tools tab. 2. Under DNS Lookup, in the Domain Name field, enter an Internet name. 3. Click Lookup. The results will appear in the Command Output display.
Section 9 - Maintenance Capture Packets Path: Maintenance > Management > Diagnostics > Capture Packets The router lets you capture all packets that pass through the LAN and WAN interfaces. The packet trace is limited to 1MB of data per capture session. If the capture file size exceeds 1MB, it is deleted automatically and a new capture file is created. 1. Click Maintenance > Diagnostics > Capture Packets tab. 2. Select an interface from the drop-down menu. 3. Click Start Trace.
Section 9 - Maintenance System Check Path: Maintenance > Management > Diagnostics > System Check As part of the diagnostics functions on the router, you can view the static and dynamic routes for both IPv4 and IPv6. 1. Click Maintenance > Diagnostics > System Check tab. 2. Click Display IPv4 Table or Display IPv6 Table. The results will appear in the Command Output display.
Section 9 - Maintenance Power Saving Path: Maintenance > Management > Power Saving The router allows you to adjust the power consumption of the hardware based on your actual usage. The two “green” options available for your LAN switch are Power Saving by Link Status and Length Detection State. 1. Click Maintenance > Diagnostics > Power Saving. 2. Complete the fields from the table below and click Save.
Section 9 - Maintenance Firmware Upgrade You can upgrade to a newer firmware version from the Administration web page. In the Firmware Upgrade section, to upgrade your firmware, click Browse, locate and select the firmware image on your host, and click Upgrade. After the new firmware image is validated, the new image is written to flash and the router will automatically reboot with the new firmware.
Section 9 - Maintenance Using PC To upgrade the firmware from a PC: 1. Download the latest firmware version from the D-Link support website. 2. Once downloaded, log in to the router and click Maintenance > Firmware > Firmware Upgrade > Using System (PC) tab. 3. Click Browse and locate the firmware file you downloaded. Select it and click Open. 4. Click Upgrade. Note: The upgrade process takes a few minutes. Do not interrupt the upgrade or turn off the router; otherwise you can damage the firmware.
Section 9 - Maintenance Using USB To upgrade the firmware using a USB thumb drive: 1. Download the latest firmware version from the D-Link support website and copy the file to a USB thumb drive. 2. Plug the USB thumb drive into a USB port on the router. 3. Log in to the router and click Maintenance > Firmware > Firmware Upgrade > Using USB tab. 4. Select the firmware file from the list and click Upgrade. Note: The upgrade process takes a few minutes.
Section 9 - Maintenance Configuration Files Backup Path: Maintenance > Firmware > Backup / Restore After you configure the router, you can back up the configuration settings. When you back up the settings, they are saved as a file. You can then use the file to restore the settings on the same router if something goes wrong or on a different router (must be the same model) that will replace the existing router. To backup your configuration files: 1. Click Maintenance > Firmware > Backup / Restore tab. 2.
Section 9 - Maintenance Restore To restore your settings from a saved backup file: 1. Click Maintenance > Firmware > Backup / Restore. 2. To restore the file from your computer, click Browse and select the file. Click Open and then click Restore. To restore the file from a USB thumb drive, select the file in the list under the corresponding USB port and click Restore.
Section 9 - Maintenance Configuration Settings If there is a USB storage device currently plugged in to the router, you can enable auto-backup. The snapshot of current configuration settings will be updated on the USB storage device and overwrite any files with the same filename (i.e., if there was an earlier configuration backup done to this location). 1. Click Maintenance > Firmware > Backup / Restore > Configuration Settings tab. 2.
Section 9 - Maintenance Soft Reboot Performing a soft reboot simply performs a power cycle. 1. Click Maintenance > Firmware > Soft Reboot. 2. Click Soft Reboot. The router will power cycle.
Section 9 - Maintenance Reset to Factory Default Settings If you reset the router to its factory default settings, it returns to the state when it was new — all changes you made to the default configuration are lost. Examples of settings that get restored include critical things you need to get online, such as login password, SSID, IP addresses, and wireless security keys. 1. Click Maintenance > Firmware > Soft Reboot. 2. Click Default.
Section 9 - Maintenance Log Settings The router allows you capture log messages. You can monitor the type of traffic that goes through the router and be notified of potential attacks or errors when they are detected by the controller. The following sections describe the log configuration settings and the ways you can access these logs.
Section 9 - Maintenance For each facility, the following events (in order of severity) can be logged: • Emergency: system is unusable • Alert: action must be taken immediately • Critical: critical conditions • Error: error conditions • Warning: warning conditions • Notification: normal but significant condition • Information: informational • Debugging: debug-level messages When a particular severity level is selected, all events with severity equal to and greater than the chosen severity are captured.
Section 9 - Maintenance Routing Logs Path: Maintenance > Logs Settings > Routing Logs Traffic can be tracked based on whether the packet was accepted or dropped by the firewall. Denial of service attacks, general attack information, login attempts, dropped packets, and similar events can be captured for review. Note: Enabling logging options may generate a significant volume of log messages and is recommended for debugging purposes only.
Section 9 - Maintenance System Logs Path: Maintenance > Logs Settings > System Logs In addition to network segment logging, unicast and multicast traffic can be logged. Unicast packets have a single destination on the network, whereas broadcast (or multicast) packets are sent to all possible destinations simultaneously. One other useful log control is to log packets that are dropped due to configured bandwidth profiles over a particular interface.
Section 9 - Maintenance Remote Logs Path: Maintenance > Logs Settings > Remote Logs Once you have configured the type of logs that you want the router to collect, they can be sent to either a Syslog server or an E-Mail address. For remote logging a key configuration field is the Remote Log Identifier.
Section 9 - Maintenance Field SMTP Port Description Enter a prefix used to identify the source of the message. This identifier is prefixed to both e-mail and Syslog messages. Toggle to ON to enable E-Mail logs. Enter the IP address or network address of the SMTP server. The router will connect to this server to send e-mail logs when required. The SMTP server must be operational for e-mail notifications to be received. Enter the SMTP port of the e-mail server.
Section 9 - Maintenance Syslog Server Path: Maintenance > Logs Settings > Syslog Server An external Syslog server is often used to collect and store logs from the router. This remote device typically has less memory constraints than the local Event Viewer on the router. Therefore, a number of logs can be collected over a sustained period. This is useful for debugging network issues or to monitor router traffic over a long duration. The router supports eight concurrent Syslog servers.
Section 9 - Maintenance Event Logs Path: Maintenance > Logs Settings > Event Logs The router’s web management interface displays configured log messages from the Status menu. When traffic through or to the router matches settings in the Facility Logs page or Routing Logs page, the corresponding log message will appear in this window with a timestamp. 1. Click Maintenance > Log Settings > Event Logs. 2. Toggle to ON and click Save.
Section 9 - Maintenance IPv6 Logs Path: Maintenance > Logs Settings > IPv6 Logs This page allows you to configure what IPv6 events you want to log. 1. Click Maintenance > Log Settings > IPv6 Logs. 2. Complete the fields from the table below and click Save. Field Accepted Packets Description LAN to WAN Toggle to ON to log accepted packets. Dropped Packets Toggle to ON to log dropped packets. WAN Accepted Packets Toggle to ON to log accepted packets.
Section 10 - Status and Statistics Status and Statistics Dashboard Path: Status > Dashboard The router provides a dashboard that displays about the resources the system is using. The dashboard page is organized into the following sections: Field Traffic Overview WAN Ports Bandwidth Usage VPNs Traffic Information Description Displays a chart of traffic overview by service for each interface. Displays a chart of traffic overview by bandwidth and packet information for WAN traffic.
Section 10 - Status and Statistics Manage Dashboard To manage the dashboard: 1. Click on the Manage Dashboard button. 2. The following window will pop out and allow you to enable or disable the overview panels shown on the dashboard. Toggle the panel to ON or OFF and click Save.
Section 10 - Status and Statistics System Path: Status > System Information > Device > System The System Info page displays the current system name, firmware version, hardware version, and serial number.
Section 10 - Status and Statistics LAN Info Path: Status > System Information > Device > LAN The LAN Information page summarizes the LAN settings including MAC address, IP address, and link state.
Section 10 - Status and Statistics WAN1 Path: Status > System Information > Device > WAN1 The WAN1 Information page summarizes the WAN1 port settings.
Section 10 - Status and Statistics WAN2 Path: Status > System Information > Device > WAN2 The WAN2 Information page summarizes the WAN2 port settings.
Section 10 - Status and Statistics WAN3 Path: Status > System Information > Device > WAN3 The WAN3 Information page summarizes the WAN3 settings.
Section 10 - Status and Statistics Wireless Path: Status > System Information > Device > Wireless The Wireless Information page displays traffic statistics for each enabled access point. This page will give a snapshot of how much traffic is being transmitted over each wireless link.
Section 10 - Status and Statistics All Logs Current Logs Path: Status > System Information > All Logs > Current Logs The Current Logs window displays configured log messages from the router as they appear. Each log will appear with a timestamp as determined by the router's configured time. If remote logging such as a Syslog server or e-mail logging is configured, the same logs are sent to the remote interface while being displayed here.
Section 10 - Status and Statistics Firewall Logs Path: Status > System Information > All Logs > Firewall Logs The Firewall Logs window displays configured firewall event messages from the router as they appear. Each log will appear with a timestamp as determined by the router's configured time. Click Clear All to remove all entries in the Display Logs screen or click Send Logs to send all logs in the Current Logs screen to preconfigured e-mail recipients.
Section 10 - Status and Statistics IPSec VPN Logs Path: Status > System Information > All Logs > IPSec VPN Logs The IPSec VPN Logs window displays IPSec VPN event messages from the router as they appear. Each log will appear with a timestamp as determined by the router's configured time. Click Clear All to remove all entries in the Display Logs screen or click Send Logs to send all logs in the Current Logs screen to preconfigured e-mail recipients.
Section 10 - Status and Statistics SSL VPN Logs Path: Status > System Information > All Logs > SSL VPN Logs The SSL VPN Logs window displays SSL VPN event messages from the router as they appear. Each log will appear with a timestamp as determined by the router's configured time. Click Clear All to remove all entries in the Display Logs screen or click Send Logs to send all logs in the Current Logs screen to preconfigured e-mail recipients.
Section 10 - Status and Statistics USB Status Path: Status > System Information > USB Status The USB Status page summarizes the USB devices connected to the router. You may connect USB printer and USB storage device directly to the router.
Section 10 - Status and Statistics Network Information DHCP Leased Clients Path: Status > Network Information > DHCP Clients Three separated tabs display a list of clients whom get IP leased from the router: LAN leased clients, IPv6 leased clients, and DMZ leased clients.
Section 10 - Status and Statistics Active Sessions Path: Status > Network Information > Active Sessions This table lists the active internet sessions through the router’s firewall. The session’s protocol, state, local, and remote IP addresses are shown.
Section 10 - Status and Statistics Active VPNs Path: Status > Network Information > Active VPNs You can view and change the status (connect or drop) of the router’s VPN associations/connections. Here, the active VPN associations/connections are listed along with the traffic details and tunnel state. The traffic is a cumulative measure of transmitted/received packets since the tunnel was established.
Section 10 - Status and Statistics Interface Statistics Path: Status > Network Information > Interfaces Statistics This page displays packet information on the LAN, VLAN, and WLAN interfaces.
Section 10 - Status and Statistics View Wireless Clients Path: Status > Network Information > Wireless Clients The clients connected to a particular AP can be viewed on this page. Connected clients are sorted by the MAC address and indicate the security parameters used by the wireless link, as well as the time connected to the corresponding AP. The statistics table has auto-refresh control which allows display of the most current port level data at each page refresh.
Section 10 - Status and Statistics Device Stats Path: Status > Network Information > Device Stats Detailed transmit and receive statistics for each physical port are presented here. Each interface (WAN1, WAN2/ DMZ, LAN, and VLANs) have port specific packet level information provided for review. Transmitted/received packets, port collisions, and the cumulating bytes/sec for transmit/receive directions are provided for each interface along with the port up time.
Section 10 - Status and Statistics Wireless Statistics Path: Status > Network Information > Wireless Statistics The Wireless Statistics page displays the incrementing traffic statistics for each enabled access point. This page will give a snapshot of how much traffic is being transmitted over each wireless link. If you suspect that a radio or VAP may be down, the details on this page would confirm if traffic is being sent and received through the VAP.
Section 10 - Status and Statistics View LAN Clients Path: Status > Network Information > LAN Clients The LAN clients to the router are identified by an ARP scan through the LAN switch. The NetBIOS name (if available), IP address, and MAC address of discovered LAN hosts are displayed.
Section 11 - Troubleshooting Troubleshooting Internet Connection Symptom: You cannot access the router’s web-configuration interface from a PC on your LAN. Recommended action: 1. Check the Ethernet connection between the PC and the router. 2. Ensure that your PC’s IP address is on the same subnet as the router. If you are using the recommended addressing scheme, your PC’s address should be in the range 192.168.10.2 to 192.168.10.254. 3. Check your PC’s IP address.
Section 11 - Troubleshooting Symptom: Router cannot obtain an IP address from the ISP. Recommended action: 1. Turn off power to the cable or DSL modem. 2. Turn off the router. 3. Wait five minutes, and then reapply power to the cable or DSL modem. 4. When the modem LEDs indicate that it has resynchronized with the ISP, reapply power to the router. If the router still cannot obtain an ISP address, see the next symptom. Symptom: Router still cannot obtain an IP address from the ISP. Recommended action: 1.
Section 11 - Troubleshooting Date and time Symptom: Date shown is January 1, 1970. Possible cause: The router has not yet successfully reached a network time server (NTS). Recommended action: 1. If you have just configured the router, wait at least five minutes, select Administration > Time Zone, and recheck the date and time. 2. Verify your Internet access settings. Symptom: Time is off by one hour. Possible cause: The router does not automatically adjust for Daylight Savings Time. Recommended action: 1.
Section 11 - Troubleshooting Pinging to Test LAN Connectivity Most TCP/IP terminal devices and firewalls contain a ping utility that sends an ICMP echo-request packet to the designated device. The DSR responds with an echo reply. Troubleshooting a TCP/IP network is made very easy by using the ping utility in your PC or workstation. Testing the LAN path from your PC to your router 1. From the PC’s Windows toolbar, Click Start and in the search box at the bottom, type cmd and press Enter. 2.
Section 11 - Troubleshooting Testing the LAN path from your PC to a remote device 1. From the PC’s Windows toolbar, Click Start and in the search box at the bottom, type cmd and press Enter. 2. Type ping -n 10 where -n 10 specifies a maximum of 10 tries and is the IP address of a remote device such as your ISP’s DNS server. Example: ping -n 10 10.1.1.1. 3. Press Enter and then observe the display (see the previous procedure). 4.
Section 11 - Troubleshooting Restoring factory-default configuration settings To restore factory-default configuration settings, do either of the following: 1. Do you know the account password and IP address? • If yes, select Administration > Settings Backup & Upgrade and click default. • If no, do the following: On the rear panel of the router, press and hold the Reset button about 10 seconds, until the test LED lights and then blinks. Release the button and wait for the router to reboot. 2.
Appendix A - Glossary Appendix A - Glossary ARP Address Resolution Protocol. Broadcast protocol for mapping IP addresses to MAC addresses. CHAP Challenge-Handshake Authentication Protocol. Protocol for authenticating users to an ISP. DDNS Dynamic DNS. System for updating domain names in real time. Allows a domain name to be assigned to a device with a dynamic IP address. DHCP Dynamic Host Configuration Protocol.
Appendix A - Glossary PPPoE Point-to-Point Protocol over Ethernet. Protocol for connecting a network of hosts to an ISP without the ISP having to manage the allocation of IP addresses. PPTP Point-to-Point Tunneling Protocol. Protocol for creation of VPNs for the secure transfer of data from remote clients to private servers over the Internet. RADIUS Remote Authentication Dial-In User Service. Protocol for remote user authentication and accounting.
Appendix B - Factory Default Settings Appendix B - Factory Default Settings Feature Description User Login URL Default Settings http://192.168.10.1 Device Login User Name admin Password admin WAN MAC Address Use default address WAN MTU size 1500 Internet Connection Local Area Network (LAN) Firewall D-Link DSR-Series User Manual Port Speed Autosense IP Address 192.168.10.1 IPv4 Subnet Mask 255.255.255.
Appendix C - Standard Services Available for Port Forwarding & Firewall Configuration Appendix C - Standard Services for Port Forwarding & Firewall Configuration • • • • • • • • • • • • • • • • • • • • • • • • • • • ANY AIM BGP BOOTP_CLIENT BOOTP_SERVER CU-SEEME:UDP CU-SEEME:TCP DNS:UDP DNS:TCP FINGER FTP HTTP HTTPS ICMP-TYPE-3 ICMP-TYPE-4 ICMP-TYPE-5 ICMP-TYPE-6 ICMP-TYPE-7 ICMP-TYPE-8 ICMP-TYPE-9 ICMP-TYPE-10 ICMP-TYPE-11 ICMP-TYPE-13 ICQ IMAP2 IMAP3 IRC D-Link DSR-Series User Manual • • • • • • • • •
Appendix D - Log Output Reference Appendix D - Log Output Reference Facility: System (Networking) Log Message Severity Log Message DEBUG networkIntable.txt not found DEBUG sqlite3QueryResGet failed DEBUG sqlite3QueryResGet failed.Query:%s ERROR Interface is already deleted in bridge DEBUG ddnsDisable failed ERROR removing %s from bridge %s... %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR adding %s to bridge %s... %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR stopping bridge...
Appendix D - Log Output Reference nimfAdvOptSetWrap: looks like we are reconnecting. “ DEBUG ddns: SQL error: %s ERROR nimfAdvOptSetWrap: Mtu Size: %d DEBUG ddnsDisable failed ERROR nimfAdvOptSetWrap: NIMF table is %s DEBUG ddns: SQL error: %s ERROR nimfAdvOptSetWrap:WAN_MODE TRIGGER DEBUG sqlite3QueryResGet failed.
Appendix D - Log Output Reference nimfMacGet: MacAddress: %s DEBUG failed to enable IPv6 forwarding ERROR nimfMacGet: MacAddress: %s DEBUG failed to set capabilities on the “ ERROR nimfMacGet: returning with status: %s DEBUG failed to enable IPv6 forwarding ERROR Now in enableing LanBridge function DEBUG failed to set capabilities on the “ ERROR sucessfully executed the command %s DEBUG failed to disable IPv6 forwarding ERROR Now in disableing LanBridge function DEBUG failed to set ca
Appendix D - Log Output Reference nimfAdvOptSetWrap: unable to get current Port “ nimfAdvOptSetWrap: unable to get current MTU Option nimfAdvOptSetWrap: error getting Mac Address from “ nimfAdvOptSetWrap: unable to get the MTU nimfAdvOptSetWrap: error setting interface advanced “ nimfAdvOptSetWrap: error getting MTU size nimfAdvOptSetWrap: unable to get Mac Address nimfAdvOptSetWrap: error setting interface advanced “ nimfAdvOptSetWrap: failed to get old connectiontype nimfAdvOptSetWrap: old connection type
Appendix D - Log Output Reference vlan disabled, not applying vlan configuration.. DEBUG disableLan function is failed to disable ConfigPort” ERROR failed query %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR failed query %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR no ports present in this vlanId %d DEBUG Unable to Disable configurable port from ERROR failed query %s DEBUG configPortTblHandler has failed ERROR vlan disabled, not applying vlan configuration..
Appendix D - Log Output Reference DialNumber: %s DEBUG Failed to Open SSHD Configuration File ERROR Apn: %s DEBUG Ipaddress should be provided with accessoption 1 ERROR GetDnsFromIsp: %s DEBUG Subnetaddress should be provided with accessoption 2 ERROR IdleTimeOutFlag: %s DEBUG Failed to restart sshd ERROR IdleTimeOutValue: %d DEBUG unable to open the “ ERROR AuthMetho: %d DEBUG sqlite3QueryResGet failed.Query:%s ERROR executing %s ...
Appendix D - Log Output Reference Invalid oidp passed DEBUG Failed to enable vlan ERROR Failed to get oid from the tree DEBUG Failed to disable vlan ERROR threegEnable: Input to wrapper %s DEBUG Failed to set vlanPort table entries, while \ ERROR threegEnable: spawning command %s DEBUG Failed to enable vlan ERROR threegMgmtHandler: query string: %s DEBUG unknown vlan state ERROR threegMgmtHandler: returning with status: %s DEBUG Error in executing DB update handler ERROR adding to d
Appendix D - Log Output Reference PID File for pptpd found DEBUG Error in executing DB update handler ERROR pid: %d DEBUG are we getting invoked twice ?? ERROR PID File for pptpd interface found DEBUG could not open %s to append ERROR pid: %d DEBUG could not write nameserver %s to %s ERROR options.pptpd file found DEBUG could not write nameserver %s to %s ERROR options.pptpd file not found DEBUG could not open %s to truncate ERROR Conf File for pptpd found DEBUG pptpd.
Appendix D - Log Output Reference pptpMgmtTblHandler: UserName: %s DEBUG writing Chap-secrets/Pap-Secrets failed ERROR pptpMgmtTblHandler: Password: %s DEBUG xl2tpdStop failed ERROR pptpMgmtTblHandler: dynamic MyIp configured DEBUG xl2tpdStart failed ERROR pptpMgmtTblHandler: MyIp: %s DEBUG sqlite3QueryResGet failed.
Appendix D - Log Output Reference l2tpMgmtTblHandler: Mtu: %d DEBUG pppoeMultipleEnableDisable: pppoe enable failed ERROR l2tpMgmtTblHandler: IspName: %s DEBUG pppoeMultipleEnableDisable: pppoe disable failed ERROR l2tpMgmtTblHandler: UserName: %s DEBUG pppoeMgmtTblHandler: unable to get current Mtu Option ERROR l2tpMgmtTblHandler: Password: %s DEBUG pppoeMgmtTblHandler: unable to get the Mtu ERROR l2tpMgmtTblHandler: AccountName: %s DEBUG pppoeMgmtTblHandler: pppoe enable failed ERROR
Appendix D - Log Output Reference Wan is not up or in load balencing mode WARN dhcpcReleaseLease: unable to release lease ERROR threegMgmtHandler: no row found. nRows = %d nCols = %d WARN dhcpcEnable: unable to kill dhclient ERROR pppoeMgmtDBUpdateHandler: empty update. WARN dhcpcEnable: enabling dhcpc failed on: %s ERROR dhcpcEnable: dhclient already running on: %s WARN dhcpcDisable: unable to kill dhclient ERROR dhcpcDisable: deleted dhclient.
Appendix D - Log Output Reference Facility: System (VPN) Log Message Severity Log Message Severity %d command not supported by eapAuth DEBUG PEAP key derive: ERROR ERROR pCtx NULL. DEBUG PEAP context is NULL: ERROR ERROR Current cert subject name= %s DEBUG Constructing P2 response: ERROR ERROR X509_STORE_CTX_get_ex_data failed. DEBUG innerEapRecv is NULL: ERROR ERROR Cannot get cipher, no session est.
Appendix D - Log Output Reference Setting version %d DEBUG Processing PEAP message: ERROR ERROR PEAP pkt rcvd: data len=(%d) flags=(%d) version=(%d) DEBUG Processing PEAP message: ERROR ERROR Got PEAP/Start packet.
Appendix D - Log Output Reference Deleted EAP/TTLS context: OK DEBUG AVP code not recognized ERROR No more fragments in message. ERROR DEBUG EAPAUTH_MALLOC failed. ERROR Upper EAP sent us: method state = %d; decision = %d DEBUG Converting password to unicode: Error ERROR P2: sending fragment. DEBUG Generating password hash: Error. ERROR P2 send unfragmented message. DEBUG Generating password hash hash: Error. ERROR P1: sending fragment. DEBUG Generating master key: Error.
Appendix D - Log Output Reference %d authentication not enabled in the system. Initializing inner non-EAP auth plugin: ERROR Error calculating binary. DEBUG adpDigestInit for SHA1 failed. DEBUG adpDigestInit for SHA1 failed. DEBUG E = %d DEBUG R = %d DEBUG Could not initialize des-ecb DEBUG adpDigestInit for MD4 failed. DEBUG adpDigestInit for SHA1 failed. DEBUG adpDigestInit for SHA1 failed. DEBUG innerEapRecv is NULL: ERROR. ERROR Error converting received auth reponse to bin.
Appendix D - Log Output Reference Stripped username=(%s) DEBUG profile %s already exists. ERROR digestLen = %d. DEBUG EAPAUTH_MALLOC failed ERROR ClearText = DEBUG User not found. ERROR CipherText = DEBUG EAP-MD5 not enabled in system configuration. ERROR digestLen = %d. DEBUG EAP-MSCHAPV2 not enabled in system configuration. ERROR digestLen1 = %d. DEBUG EAP-TLS not enabled in system configuration. ERROR digestLen2 = %d. DEBUG EAP-TTLS not enabled in system configuration.
Appendix D - Log Output Reference BIO_new_mem_buf failed. ERROR Error initializing digest context. ERROR malloc failed. ERROR Error initializing DES in Klite ERROR BIO_new_mem_buf failed. ERROR Error initializing MD4 in Klite ERROR ERROR Error initializing RC4 in Klite ERROR ERROR Error initializing SHA in Klite ERROR ERROR Error cleaning cipher context. ERROR ERROR Error destroying cipher context. ERROR ERROR Error cleaning digest context.
Appendix D - Log Output Reference Process operation failed ERROR Couldn’t execute command ERROR state machine is in invalid state. ERROR Memory allocation failed ERROR Packet length mismatch %d, %d ERROR Memory allocation failed ERROR eapAuthTypeToType: Invalid eapAuthType %d ERROR invalid certificate data ERROR eapTypeToAuthType: Invalid eapType %d ERROR .Query:%s ERROR unable to create method context. ERROR .Query:%s ERROR method ctxCreate failed.
Appendix D - Log Output Reference Facility: System (Admin) Log Message Severity Log Message Severity Usage:%s DEBUG unable to register to UMI ERROR Could not open database: %s DEBUG sqlite3QueryResGet failed ERROR CPU LOG File not found DEBUG radSendtoServer: socket: %s ERROR MEM LOG File not found DEBUG radSendtoServer: bind() Failed: %s: %s ERROR cpuMemUsageDBUpdateHandler: update query: %s DEBUG Printing the whole list after inserting DEBUG %s at %d(minute) %d(hour) %d(da
Appendix D - Log Output Reference Verified Message-Authenticator DEBUG radGetIPByName: couldn’t resolve hostname: %s ERROR Unloaded RADIUS Dictionary DEBUG radGetHostIP: couldn’t get hostname ERROR Adding Dictionary Attribute %s DEBUG radGetHostIP: couldn’t get host IP address ERROR Adding Dictionary Value %s DEBUG RADIUS dictionary loading failed ERROR Loaded Dictionary %s DEBUG Failed to set default timeout value ERROR Adding Dictionary Attribute ‘%s’ DEBUG Failed to set default ret
Appendix D - Log Output Reference Releasing Packet and cookie:%p DEBUG Invalid arguments to ioctl handler ERROR Releasing Packet with cookie:%p DEBUG radEapSendRtn: Invalid Arguments ERROR Received EAP-Identity from Pnac: %s DEBUG radEapSendRtn: failed to allocate buffer ERROR Filling User-Name: %s DEBUG umiIoctl failed ERROR Filling State: DEBUG failed to initialize EAP message queue ERROR Filling EAP-Message: DEBUG Unable to set debug for radEap.
Appendix D - Log Output Reference Could not read data from file DEBUG Unable to initialize ntpControl ERROR ntpTblHandler DEBUG ntpMgmt : Couldn’t open database %s ERROR status: %d DEBUG ERROR : incomplete DB update information ERROR tz: %d DEBUG empty update.
Appendix D - Log Output Reference Query string: %s DEBUG Failed to enable printer properly ERROR sqlite3QueryResGet failed.Query:%s DEBUG Failed to mount device on system ERROR %s: 1. usb is already disconnected for old usb type. “ DEBUG Failed to enable network storage device” ERROR %s: 2.call disable for new usb type ! DEBUG Failed to mount device on system ERROR %s: 3. usb is already disconnected for old usb type. “ DEBUG Sqlite update failed ERROR %s: 4. Disabled old usb type .
Appendix D - Log Output Reference adpListNodeRemove : Returned with an error ERROR Failed to write access control entries ERROR command too long. Try increasing “ ERROR Failed to write snmpv3 users entries ERROR failed to allocate memory for CRON_NODE ERROR Failed to write snmp trap entries ERROR sqlite3QueryResGet failed ERROR Failed to write system entries. ERROR There was an error while reading the schedules.
Appendix D - Log Output Reference Facility: System (Firewall) Log Message Severity Log Message Severity Enabling rule for protocol binding. DEBUG Disable all NAT rules. DEBUG Disabling rule for protocol binding. DEBUG Enable all NAT rules. DEBUG Enabling Remote SNMP on WAN. DEBUG Enabling NAT URL filter rules. DEBUG Disabling Remote SNMP on WAN DEBUG Restarting all NAT rules. DEBUG wan traffic counters are restared DEBUG Deleting schedule based firewall rules.
Appendix D - Log Output Reference prerouting Firewall Rule add for Relay failed Deleting MAC Filter Policy for Address %s Disabling attack check for TCP Flood. DEBUG Disabling attack check for UDP Flood. DEBUG Disabling attack check for IPsec. DEBUG Adding MAC Filter Policy for Address %s DEBUG Disabling attack check for PPTP. DEBUG Disabling Firewall Rules for DMZ host DEBUG Disabling attack check for L2TP.
Appendix D - Log Output Reference Adding IP/MAC binding rule for %s MAC address “ Deleting IP/MAC binding rule for %s MAC “ ./src/firewall/linux/user/ firewalld.c:60:#undef ADP_DEBUG ./src/firewall/linux/user/ firewalld.
Appendix D - Log Output Reference Deleting rule, port triggering for protocol TCP. Deleting rule, port triggering for protocol UDP. Deleting rule, port triggering for protocol TCP. Deleting rule, port triggering for protocol UDP. Enabling rule, port triggering for protocol TCP. Enabling rule, port triggering for protocol UDP. Enabling rule, port triggering for protocol TCP. Enabling rule, port triggering for protocol UDP. DEBUG Setting transparent mode for pLogicalIfName \ DEBUG DEBUG Enabling Accept f
Appendix D - Log Output Reference Restarting Firewall For %s Address Update from %s:%s Disabling Firewall Rule for MSS packet marking Enabling Firewall Rule for MSS packet marking Enabling packet marking rule for %s IDLE timer Deleted firewall rule %s for service %s with action %s %s firewall rule %s for service %s with action %s Added firewall rule %s for service %s with action %s DEBUG nimfBridgeTblHandler: unable to get interfaceName ERROR DEBUG nimfBridgeTblHandler: \ ERROR DEBUG nimfBridgeTblHa
Appendix D - Log Output Reference Facility: Local0 (Wireless) Log Message Severity Log Message Severity (node=%s) setting %s to val = %d DEBUG sqlite3QueryResGet failed ERROR Custom wireless event: ‘%s’ DEBUG sqlite3QueryResGet failed ERROR Wireless event: cmd=0x%x len=%d DEBUG VAP(%s) set beacon interval failed ERROR DEBUG VAP(%s) set DTIM interval failed ERROR DEBUG VAP(%s) set RTS Threshold failed ERROR ran query %s DEBUG VAP(%s) set Fragmentation Threshold failed ERROR DBUpdate
Appendix D - Log Output Reference node not found *:*:*:%x:%x:%x DEBUG Interface name and policy must be specified ERROR error installing unicast key for %s DEBUG invalid ACL type %d ERROR cmd =%d i_type =%d i_val=%d DEBUG interface name not specified ERROR join event for new node %s DEBUG interface name not specified ERROR wpa/rsn IE id %d/%d not supported DEBUG Invalid interface - %s specified ERROR wpa IE id %d not supported DEBUG buffer length not specified ERROR leave event for
Appendix D - Log Output Reference eapolRecvKeyMsg: replay counter not incremented DEBUG IAPP-CACHE-NOTIFY-REQUEST send to ERROR eapolRecvKeyMsg: replay counter is not same DEBUG ./src/dot11/iapp/iappLib.
Appendix D - Log Output Reference failed to send PNAC_FORCE_AUTHORIZED “ DEBUG unable to get %s mac address ERROR failed to send PNAC_AUTHORIZED “ DEBUG Failed to set %s SSID ERROR DEBUG Failed to set SSID broadcast status ERROR DEBUG Failed to set PreAuth mode ERROR DEBUG unable to install key ERROR failed to send PNAC_VAR_KEY_AVAILABLE (TRUE) “ failed to send PNAC_VAR_KEY_TX_EN (TRUE) “ failed to send PNAC_VAR_KEY_TX_EN (FALSE) “ failed to send PNAC_FORCE_AUTHORIZED “ DEBUG KDOT11_SET_P
Appendix D - Log Output Reference state changed from %s to %s DEBUG PNAC user comp id not set.
Appendix D - Log Output Reference from pnacPDUProcess: code = %d, identifier = %d, “ DEBUG from pnacPDUProcess: setting rxResp true DEBUG from pnacPDUProcess: code = %d, identifier = %d, “ DEBUG from pnacPDUProcess: received “ DEBUG from pnacPDUProcess: received “ DEBUG from pnacPDUProcess: received PNAC_ EAPOL_KEY_PACKET DEBUG doing pnacTxCannedFail DEBUG doing pnacTxCannedSuccess DEBUG doing pnacTxReqId DEBUG doing pnacTxReq DEBUG doing pnacTxStart DEBUG doing pnacTxLogoff DEBUG do
Appendix D - Log Output Reference Supplicant[%d]: DEBUG could not initialize AES-128-ECB ERROR Supp Pae state = %s DEBUG MD5 initialization failed ERROR from pnacBackAuthFail: calling pnacTxCannedFail DEBUG RC4 framework initialization failed ERROR %s returned ERROR DEBUG PNAC framework initialization failed ERROR pnacUmiIoctlHandler: cmd: %s(%d) DEBUG ERROR: option value not specified ERROR %s not configured for 802.
Appendix D - Log Output Reference PMKSA refcount not 1 WARN Error from pnacRadXlateASAdd: cannot open socket ERROR IV verification failednknown subtype> WARN Error from pnacRadXlateDemoRecv: received null EAP pkt ERROR pnacIfConfig: overwriting previous interface “ WARN From pnacRadXlateDemoRecv: send “ ERROR pnacIfConfig: overwriting previous “ WARN Error from pnacRadXlateDemoRecv: RADIUS “ ERROR pnacIfConfig: overwriting previous username” WARN pnacIfConfig: overwriting previous passwor
Appendix D - Log Output Reference pnacPhyPortParamSet: device invalid %s%d pnacPhyPortParamSet: EIOCGADDR ioctl failed pnacPhyPortParamSet: multicast addr add ioctl failed pnacPhyPortParamUnset: multicast addr del ioctl failed Recd IE data for non-existent AP %s ERROR Recd WSC Start command without interface name ERROR Recd WSC start for non-existent AP %s ERROR Recd WSC start for wrong AP %s ERROR Unable to send WSC_WLAN_CMD_PORT to WSC ERROR pnacPDUXmit: Invalid arguments ERROR Failed to get
Appendix D - Log Output Reference Profile %s does not exist ERROR kpnacPortPaeConfig failed ERROR Profile %s does not exist ERROR Invalid arguments ERROR Profile %s does not exist ERROR Profile %s does not exist ERROR Profile %s does not exist ERROR SSID not set.
Appendix D - Log Output Reference Error from pnacTxCannedSuccess: eap pkt create failed Error from pnacTxReqId: eap pkt create failed Error from pnacTxReq: eap pkt create failed Error from pnacSendRespToServer: malloc failed Error from pnacSendRespToServer: no AS configured Error from pnacTxStart: basic pkt create failed Error from pnacTxStart: basic pkt create failed Error from pnacTxRspId: eap pkt create failed Error from pnacTxRspAuth: eap pkt create failed Error from pnacEapPktRecord: EAP packet too” P
Appendix D - Log Output Reference pnacUmiSuppConfig: Invalid config data pnacUmiSuppConfig: Invalid backend name specified pnacUmiSuppConfig: %s not configured for 802.
Appendix D - Log Output Reference %s%d: bad sequence number: %d, expected: %d, DEBUG TKIP DEBUG PPPIOCDETACH file->f_count=%d, DEBUG %s: cannot map channel to mode; freq %u flags 0x%x, DEBUG PPP: outbound frame not passed DEBUG %s: %s, vap->iv_dev->name, buf DEBUG PPP: VJ decompression error DEBUG %s: [%s] %s, vap->iv_dev->name, DEBUG PPP: inbound frame not passed DEBUG PPP: reconstructed packet DEBUG PPP: no memory for DEBUG missed pkts %u..
Appendix D - Log Output Reference DEBUG %s: no memory for new proc entry (%s)!, __func__, %s: 0x%p len %u, tag, p, len DEBUG %03d:, i DEBUG PPPOL2TP: --> %s, __FUNCTION__) DEBUG %02x, ((u_int8_t *)p)[i] DEBUG PPPOL2TP: <-- %s, __FUNCTION__) DEBUG first difference at byte %u, i DEBUG %s: recv: , tunnel->name DEBUG %s: , t->name DEBUG %s: xmit:, session->name DEBUG FAIL: ieee80211_crypto_newkey failed DEBUG %s: xmit:, session->name DEBUG FAIL: ieee80211_crypto_setkey failed DEBUG PPP
Appendix D - Log Output Reference IRQ 32 is triggered DEBUG FAIL: encap data length mismatch DEBUG ip_finish_output2: No header cache and no neighbour! DEBUG FAIL: encrypt data does not compare DEBUG a guy asks for address mask.
Appendix D - Log Output Reference UDP: bad checksum. From %d.%d.%d.%d:%d to %d.%d.%d.%d:%d ulen %d, DEBUG ath_hal: logging to %s %s, ath_hal_ logfile, DEBUG a guy asks for address mask. Who is it? DEBUG ath_hal: logging disabled DEBUG fib_add_ifaddr: bug: prim == NULL DEBUG %s%s, sep, ath_hal_buildopts[i] DEBUG fib_del_ifaddr: bug: prim == NULL DEBUG ath_pci: No devices found, driver not installed.
Appendix D - Log Output Reference ip_rt_bug: %u.%u.%u.%u -> %u.%u.%u.%u, %s, DEBUG txmic DEBUG UDP: short packet: From %u.%u.%u.%u:%u %d/%d to %u.%u.%u.%u:%u, DEBUG %02x, hk->kv_txmic[i] DEBUG UDP: bad checksum. From %d.%d.%d.%d:%d to %d.%d.%d.%d:%d ulen %d, DEBUG %s: unable to update h/w beacon queue parameters, DEBUG REJECT: ECHOREPLY no longer supported.
Appendix D - Log Output Reference ip_conntrack_rtsp: max_outstanding must be a positive integer DEBUG %s: unable to collect channel list from HAL; DEBUG ip_conntrack_rtsp: setup_timeout must be a positive integer DEBUG R (%p %llx) %08x %08x %08x %08x %08x %08x %c, DEBUG ip_conntrack_rtsp: ERROR registering port %d, ports[i] DEBUG T (%p %llx) %08x %08x %08x %08x %08x %08x %08x %08x %c, DEBUG ip_nat_rtsp v IP_NF_RTSP_VERSION loading DEBUG %s: no memory for sysctl table!, __func__ DEBUG %s: Sor
Appendix D - Log Output Reference netfilter PSD unloaded - (c) astaro AG DEBUG algExceptionHandler: Exception! DEBUG %s , SELF DEBUG dnsExceptionHandler: Exception! DEBUG %s , LAN DEBUG IPsecExceptionHandler: Exception! DEBUG %s , WAN DEBUG ESP Packet Src:%x Dest:%x Sport:%d dport:%d secure:%d spi:%d isr:%p, DEBUG TRUNCATED DEBUG xlr8NatConntrackPreHook: We found the valid context, DEBUG SRC=%u.%u.%u.%u DST=%u.%u.%u.%u , DEBUG xlr8NatConntrackPreHook: Not a secured packet.
Appendix D - Log Output Reference PARAMETER=%u , DEBUG GATEWAY=%u.%u.%u.%u , DEBUG MTU=%u , ntohs(ich->un.frag.mtu) DEBUG PROTO=AH DEBUG INCOMPLETE [%u bytes] , DEBUG SPI=0x%x , ntohl(ah->spi) DEBUG PROTO=ESP INCOMPLETE [%u bytes] , SPI=0x%x , ntohl(eh->spi) PROTO=%u , ih->protocol UID=%u , skb->sk->sk_socket->file->f_uid <%d>%sIN=%s OUT=%s , loginfo->u.log.
Appendix D - Log Output Reference DEBUG DEBUG MPPE/MPPC encryption/compression module unregistered PPP generic driver version PPP_ VERSION MPPE/MPPC encryption/compression module registered MPPE/MPPC encryption/compression module unregistered PPP generic driver version PPP_ VERSION PPPoL2TP kernel driver, %s, PPPoL2TP kernel driver, %s, INFO INFO DEBUG PPPoL2TP kernel driver, %s, INFO DEBUG DEBUG failed to create procfs entry . proc dir not created ..
Appendix D - Log Output Reference kmalloc failed DEBUG %s: %s: mem=0x%lx, irq=%d, INFO unknown cyrpto ioctl cmd received %x, cmd DEBUG %s: %s: mem=0x%lx, irq=%d, INFO register_chrdev returned ZERO DEBUG %s: %s, dev_info, version INFO const char *descr, krb5_keyblock *k) { DEBUG %s: driver unloaded, dev_info INFO F password, &pdata DEBUG %s, buf INFO test key, key DEBUG %s: %s (, dev_info, ath_hal_version INFO pre-hashed key, key DEBUG %s: driver unloaded, dev_info INFO const cha
Appendix D - Log Output Reference 3.
Appendix D - Log Output Reference Wrong address mask %u.%u.%u.%u from Redirect from %u.%u.%u.%u on %s about source route option ICMP: %u.%u.%u.%u: ICMP: %u.%u.%u.%u: Source Wrong address mask %u.%u.%u.%u from Redirect from %u.%u.%u.%u on %s about IP: routing cache hash table of %u buckets, %ldKbytes, source route option %u.%u.%u.%u -> %u.%u.%u.
Appendix D - Log Output Reference DES Hardware Test Duration: %d:%d, SHA Software Test: %d iterations, iter SHA Software Test Duration: %d:%d, SHA Hardware Test: %d iterations, iter SHA Hardware Test Duration: %d:%d, MD5 Software Test: %d iterations, iter MD5 Software Test Duration: %d:%d, MD5 Hardware Test: %d iterations, iter DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG try_module_get failed try_module_get failed \ %s: unknown pairwise cipher %d, %s: unknown group cipher %d, %s: unknown SIOCSI
Appendix D - Log Output Reference usage: rtparams rt_idx <0|1> per <0..100> probe_intval <0..100> DEBUG host %u.%u.%u.%u/if%d ignores WARNING usage: acparams ac <0|3> RTS <0|1> aggr scaling <0..4> min mbps <0..250> DEBUG martian source %u.%u.%u.%u from WARNING usage: hbrparams ac <2> enable <0|1> per_low <0..50> DEBUG ll header: WARNING %s(): ADDBA mode is AUTO, __func__ DEBUG martian destination %u.%u.%u.%u from WARNING %s(): Invalid TID value, __func__ DEBUG %u.%u.%u.
Appendix D - Log Output Reference [%s:%s] discard frame, %s, vap->iv_dev->name, DEBUG %s%d: trying to write outside history ERROR [%s:%s] discard %s information element, %s, DEBUG %s%d: trying to write outside history ERROR [%s:%s] discard information element, %s, DEBUG %s%d: trying to write outside history ERROR [%s:%s] discard %s frame, %s, vap->iv_dev>name, DEBUG [%s:%s] discard frame, %s, vap->iv_dev->name, DEBUG HBR list dumpNode\tAddress\t\t\tState\tTrigger\ tBlock Nodes informationAd
Appendix D - Log Output Reference %s: %s, dev->name, buf DEBUG %s: cannot allocate space for SHA1 digest, fname ERROR %s: no memory for sysctl table!, __func__ DEBUG %s%d: trying to write outside history ERROR %s: failed to register sysctls!, vap->iv_dev->name DEBUG %s%d: trying to write outside history ERROR Atheros HAL assertion failure: %s: line %u: %s, DEBUG %s%d: trying to write outside history ERROR ath_hal: logging to %s %s, ath_hal_logfile, DEBUG %s%d: too big uncompressed packet:
Appendix D - Log Output Reference Logging should be disabled before changing bufer size DEBUG JBD: Failed to read block at offset %u, ERROR %s:allocation failed for pl_info, __func__ DEBUG JBD: error %d scanning journal, err ERROR %s: Unable to allocate buffer, __func__ DEBUG JBD: IO error %d recovering block ERROR %s:allocation failed for pl_info, __func__ DEBUG ./Logs_kernel.txt:303:KERN_ERR ERROR %s: Unable to allocate buffer, __func__ DEBUG ./Logs_kernel.
Appendix D - Log Output Reference rx FIFO overrun; reseting DEBUG addr family wrong: %d, usin->sin_ family ERROR %s: During Wow Sleep and got BMISS, __func__ DEBUG udp addr=%x/%hu, usin->sin_addr.s_ addr, usin->sin_port ERROR AC\tRTS \tAggr Scaling\tMin Rate(Kbps)\tHBR \ tPER LOW THRESHOLD DEBUG %s: %s:%d: BAD TUNNEL MAGIC ERROR BE\t%s\t\t%d\t%6d\t\t%s\t%d, DEBUG %s: %s:%d: BAD TUNNEL MAGIC ERROR BK\t%s\t\t%d\t%6d\t\t%s\t%d, DEBUG socki_lookup: socket file changed! ERROR VI\t%s\t\t%d\t%
Appendix D - Log Output Reference Radar found on channel %d (%d MHz), DEBUG %03d:, i ERROR End of DFS wait period DEBUG %02x, ((unsigned char *)p)[i] ERROR %s error allocating beacon, __func__ DEBUG mic check failed ERROR failed to allocate UAPSD QoS NULL tx descriptors: %d, error DEBUG [%s] Wrong parameters, __func__ ERROR failed to allocate UAPSD QoS NULL wbuf DEBUG [%s] Wrong Key length, __func__ ERROR %s: unable to allocate channel table, __func__ DEBUG [%s] Wrong parameters, __fu
Appendix D - Log Output Reference Pattern added already DEBUG ERROR: %s: Timeout at page %#0x addr %#0x ERROR Error : All the %d pattern are in use.
Appendix D - Log Output Reference %s: unable to reset hardware; hal status %u, __func__, status DEBUG ****ASSERTION HIT**** DEBUG MacAddr=%s, DEBUG TxBufIdx=%d, i DEBUG Tid=%d, tidno DEBUG AthBuf=%p, tid->tx_buf[i] DEBUG %s: unable to reset hardware; hal status %u, DEBUG %s: unable to reset hardware; hal status %u, DEBUG %s: unable to start recv logic, DEBUG _fmt, __VA_ARGS__ \ DEBUG sample_pri=%d is a multiple of refpri=%d, sample_pri, refpri DEBUG ===========ft->ft_ numfilters=%u====
Appendix D - Log Output Reference mac 00-00-00-00-00-00 DEBUG FAST PATH Breaks on MAX PACKET %d %d,bufMgrLen(pBufMgr),IP_MAX_ PACKET CRITICAL %02x, hk->kv_mic[i] DEBUG SAV CHECK FAILED IN ENCRYPTION CRITICAL txmic DEBUG Match Found proto %d spi %d,pPktInfo->proto,pFlowEntry->pre. spi CRITICAL %02x, hk->kv_txmic[i] DEBUG PRE: proto: %u srcip:%u.%u.%u.%u sport :%u dstip: %u.%u.%u.%u dport: %u, CRITICAL Cannot support setting tx and rx keys individually DEBUG POST: proto: %u srcip:%u.%u.%u.
Appendix E - RJ-45 Pin-outs Appendix E - RJ-45 Pin-outs Signal CTS DTR TxD GND GND RxD DSR RTS D-Link DSR-Series User Manual RJ-45 Cable RJ-45 PIN NC NC 6 5 4 3 NC NC Adapter DB-9 PIN NC NC 3 5 5 2 NC NC Signal NC NC RxD GND GND TxD NC NC 294
Appendix F - New Wi Fi Frequency table ( New appendix section ) Appendix F - New Wi Fi Frequency table ( New appendix section ) Channel supported in20 Mhz Country 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) Australia Russia Iceland Singapore Sweden Taiwan Finland Slovenia Ireland United states D-Link DSR-Series User Manual Channel supported in 40 Mhz Upper side band Lower side band 2.
Appendix F - New Wi Fi Frequency table ( New appendix section ) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) Latin America Denmark Germany Netherlands Norway Poland Luxembourg South Africa United Kingdom Ireland France Israel Korea 2.4Ghz 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 5, 6, 7, 8, 9, 10, 11, 12, 13 1, 2, 3, 4, 5, 6, 7, 8, 9 5 Ghz 36, 40, 44, 48, 149, 153, 157, 161, 165 40, 48, 153, 161 36, 44, 149, 157 2.
Appendix F - New Wi Fi Frequency table ( New appendix section ) 27) 28) Canada China D-Link DSR-Series User Manual 5 Ghz 36, 40, 44, 48, 149, 153, 157, 161, 165 40, 48, 153, 161 36, 44, 149, 157 2.4Ghz 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 5, 6, 7, 8, 9, 10, 11 1, 2, 3, 4, 5, 6, 7 5 Ghz 36, 40, 44, 48, 149, 153, 157, 161, 165 40, 48, 153, 161 36, 44, 149, 157 2.
Appendix G - Product Statement Appendix G - Product Statement 1. DSR-1000N Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix G - Product Statement Canadian Department of Communications Industry Canada (IC) Notice CAN ICES-3(B)/NMB-3(B) Industry Canada Statement This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device.
Appendix G - Product Statement This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member states and EFTA countries under the following conditions and/or with the following restrictions: - In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain authorization to use the device for setting up outdoor radio links and/or for supplying public access to telecommunications and/or network services.
Appendix G - Product Statement Česky [Czech] [D-Link Corporation] tímto prohlašuje, že tento [DSR-1000N] je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES. Dansk [Danish] Undertegnede [D-Link Corporation] erklærer herved, at følgende udstyr [DSR-1000N] overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF.
Appendix G - Product Statement Português [Portuguese] [D-Link Corporation] declara que este [DSR-1000N]está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE. Slovensko [Slovenian] [D-Link Corporation] izjavlja, da je ta [DSR-1000N] v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/ES. Slovensky [Slovak] [D-Link Corporation] týmto vyhlasuje, že [DSR-1000N] spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES.
Appendix G - Product Statement 2.DSR-500N Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix G - Product Statement Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: 1) This device may not cause harmful interference, and 2) This device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE: Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment.
Appendix G - Product Statement ýHVN\ >&]HFK@ >' /LQN &RUSRUDWLRQ@ WtPWR SURKODãXMH åH WHQWR >'65 1@ MH YH VKRGČ VH ]iNODGQtPL SRåDGDYN\ D GDOãtPL SĜtVOXãQêPL XVWDQRYHQtPL VPČUQLFH (6 'DQVN >'DQLVK@ 8QGHUWHJQHGH >' /LQN &RUSRUDWLRQ@ HUNO UHU KHUYHG DW I¡OJHQGH XGVW\U >'65 1@ RYHUKROGHU GH Y VHQWOLJH NUDY RJ ¡YULJH UHOHYDQWH NUDY L GLUHNWLY () 'HXWVFK >*HUPDQ@ +LHUPLW HUNOlUW >' /LQN &RUSRUDWLRQ@ GDVV VLFK GDV *HUlW >'65 1@ LQ hEHUHLQVWLPPXQJ PLW GHQ JUXQGOHJHQGHQ $QIRU
Appendix G - Product Statement 3RUWXJXrV >3RUWXJXHVH@ 6ORYHQVNR >6ORYHQLDQ@ 6ORYHQVN\ >6ORYDN@ >' /LQN &RUSRUDWLRQ@ GHFODUD TXH HVWH >'65 1@HVWi FRQIRUPH FRP RV UHTXLVLWRV HVVHQFLDLV H RXWUDV GLVSRVLo}HV GD 'LUHFWLYD &( >' /LQN &RUSRUDWLRQ@ L]MDYOMD GD MH WD >'65 1@ Y VNODGX ] ELVWYHQLPL ]DKWHYDPL LQ RVWDOLPL UHOHYDQWQLPL GRORþLOL GLUHNWLYH (6 >' /LQN &RUSRUDWLRQ@ WêPWR Y\KODVXMH åH >'65 1@ VSĎĖD ]iNODGQp SRåLDGDYN\ D YãHWN\ SUtVOXãQp XVWDQRYHQLD 6PHUQLFH (6 6XRPL
Appendix G - Product Statement 3.DSR-250N/DSR-250NB1 Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix G - Product Statement EC), Low-voltage Directive (2006/95/EC), the procedures given in European Council Directive 99/5/EC and 2004/104/EC. The equipment was passed. The test was performed according to the following European standards: EN 300 328 V.1.7.1 EN 301 489-1 V.1. 8.1 / EN 301 489-17 V.2.1.1 EN 62311 EN 60950-1 Regulatory statement (R&TTE) European standards dictate maximum radiated transmit power of 100mW EIRP and frequency range 2.4002.
Appendix G - Product Statement Radiation Exposure Statement: The device meets the exemption from the routine evaluation limits in section 2.5 of RSS 102 and compliance with RSS-102 RF exposure, users can obtain Canadian information on RF exposure and compliance. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body.
Appendix G - Product Statement 4. DSR-150N Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix G - Product Statement EN 60950-1: Safety of Information Technology Equipment EN50385 : (2002-08) Product standard to demonstrate the compliance of radio base stations and fixed terminal stations for wireless telecommunication systems with the basic restrictions or the reference levels related to human exposure to radio frequency electromagnetic fields (110MHz - 40 GHz) - General public EN 300 328 V1.7.
Appendix G - Product Statement Česky [Czech] Dansk [Danish] Deutsch [German] Eesti [Estonian] English Español [Spanish] Ελληνική [Greek] Français [French] Italiano [Italian] Latviski [Latvian] Lietuvių [Lithuanian] Nederlands [Dutch] Malti [Maltese] Magyar [Hungarian] Polski [Polish] Português [Portuguese] Slovensko [Slovenian] Slovensky [Slovak] Suomi [Finnish] Svenska [Swedish] [Jméno výrobce] tímto prohlašuje, že tento [typ zařízení] je ve shodě se základními požadavky a dalšími příslušnými ustanoveními
Appendix G - Product Statement Industry Canada statement: This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation. Ce dispositif est conforme à la norme CNR-210 d’Industrie Canada applicable aux appareils radio exempts de licence.