Building Networks for People Unified Services Router User Manual DSR-500N/1000N Release 1.01 http://www.dlink.
User Manual Unified Services Router D-Link Corporation Copyright © 2010. http://www.dlink.
Unified Services Router User Manual User Manual DSR-500N/1000N Unified Services Router Version 1.0 Copyright © 2010 Copyright Notice This publication, including all photographs, illustrations and software, is protected under international copyright laws, with all rights reserved. Neither this manual, nor any of the material contained herein, may be reproduced without written consent of the author. Disclaimer The information in this document is subject to change without notice.
Unified Services Router User Manual Table of Contents Chapter 1. Introduction ............................................................................................................................. 8 1.1 About this User Manual ............................................................................................ 8 1.2 Typographical Conventions ..................................................................................... 8 Chapter 2. Configuring Your Network: LAN Setup .................
Unified Services Router 4.6 User Manual Wi-Fi Protected Setup (WPS) ............................................................................... 56 Chapter 5. Securing the Private Network ............................................................................................ 59 5.1 Firewall Rules .......................................................................................................... 59 5.2 Defining Rule Schedules .................................................................
Unified Services Router 9.4.2 9.4.3 9.5 9.6 9.7 9.8 9.8.1 9.8.2 9.8.3 9.8.4 User Manual Sending Logs to E-mail or Syslog ...................................................................... 111 Event Log Viewer in GUI ..................................................................................... 113 Backing up and Restoring Configuration Settings ........................................... 114 Upgrading Router Firmware ..............................................................................
Unified Services Router User Manual List of Figures Figure 1: Setup page for LAN TCP/IP settings ...................................................................................... 11 Figure 2: IPv6 LAN and DHCPv6 configuration ..................................................................................... 13 Figure 3: Configuring the Router Advertisement Daemon ................................................................... 16 Figure 4: IPv6 Advertisement Prefix settings ....................
Unified Services Router User Manual Figure 32: Radio card configuration options ........................................................................................... 55 Figure 33: Advanced Wireless communication settings ....................................................................... 56 Figure 34: WPS configuration for an AP with WPA/WPA2 profile....................................................... 57 Figure 35: List of Available Firewall Rules .............................................
Unified Services Router User Manual Figure 64: SSL VPN Portal configuration.............................................................................................. 100 Figure 65: USB device configuration ..................................................................................................... 101 Figure 66: Certificate summary for IPSec and HTTPS management ............................................... 102 Figure 67: User Login policy configuration .....................................
Unified Services Router User Manual Chapter 1. Introduction The D-Link Unified Services Routers are enterprise grade security gateway solutions with Firewall, VPN and in some cases 802.11n Access Point capabilities. These devices have wizards to allow for quick and easy configuration for internet access, VPN tunnels, and wireless networks. The GUI provides all the capabilities for novice and advanced users to administer this secure and feature rich router. 1.
Chapter 2. Configuring Your Network: LAN Setup It is assumed that the user has a machine for management connected to the LAN to the router. The LAN connection may be through the wired Ethernet ports available on the router, or once the initial setup is complete, the device may also be managed through its wireless interface as it is bridged with the LAN.
Unified Services Router User Manual To configure LAN Connectivity, please follow the steps below: 1. In the LAN Setup page, enter the following information for your router: • IP address (factory default: 192.168.10.1). If you change the IP address and click Save Settings, the GUI will not respond. Open a new connection to the new IP address and log in again.
Unified Services Router • User Manual Enable DNS Proxy: To enable the router to act as a proxy for all DNS requests and communicate with the ISP’s DNS servers, click the checkbox. 3. Click Save Settings to apply all changes. Figure 1: Setup page for LAN TCP/IP settings 2.1.1 LAN Configuration in an IPv6 Network Advanced > IPv6 > IPv6 LAN > IPv6 LAN Config In IPv6 mode, the LAN DHCP server is enabled by default (similar to IPv4 mode).
Unified Services Router User Manual IPv4 / IPv6 mode must be enabled in the Advanced > IPv6 > IP mode to enable IPv6 configuration options. LAN Settings The default IPv6 LAN address for the router is fec0::1. You can change this 128 bit IPv6 address based on your network requirements. The other field that defines the LAN settings for the router is the prefix length. The IPv6 network (subnet) is identified by the initial bits of the address called the prefix. By default this is 64 bits long.
Unified Services Router User Manual Figure 2: IPv6 LAN and DHCPv6 configuration If you change the IP address and click Save Settings, the GUI will not respond. Open a new connection to the new IP address and log in again. Be sure the LAN host (the machine used to manage the router) has obtained IP address from newly assigned pool (or has a static IP address in the router’s LAN subnet) before accessing the router via changed IP address. As with an IPv4 LAN network, the router has a DHCPv6 server.
Unified Services Router User Manual • DHCP Mode: The IPv6 DHCP server is either stateless or stateful. If stateless is selected an external IPv6 DHCP server is not required as the IPv6 LAN hosts are auto-configured by this router. In this case the router advertisement daemon (RADVD) must be configured on this device and ICMPv6 router discovery messages are used by the host for autoconfiguration. There are no managed addresses to serve the LAN nodes.
Unified Services Router User Manual RADVD Advanced > IPv6 > IPv6 LAN > Router Advertisement To support stateless IPv6 auto configuration on the LAN, set the RADVD status to Enable. The following settings are used to configure RADVD: • Advertise Mode: Select Unsolicited Multicast to send router advertisements (RA’s) to all interfaces in the multicast group. To restrict RA’s to well known IPv6 addresses on the LAN, and thereby reduce overall network traffic, select Unicast only.
Unified Services Router User Manual Figure 3: Configuring the Router Advertisement Daemon Advertisement Prefixes Advanced > IPv6 > IPv6 LAN > Advertisement Prefixes The router advertisements configured with advertisement prefixes allow this router to inform hosts how to perform stateless address auto configuration. Router advertisements contain a list of subnet prefixes that allow the router to determine neighbors and whether the host is on the same link as the router.
Unified Services Router User Manual • IPv6 Prefix Length: This value indicates the number contiguous, higher order bits of the IPv6 address that define up the network portion of the address. Typically this is 64. • Prefix Lifetime: This defines the duration (in seconds) that the requesting node is allowed to use the advertised prefix. It is analogous to DHCP lease time in an IPv4 network. Figure 4: IPv6 Advertisement Prefix settings 2.
Unified Services Router User Manual will allow traffic from LAN hosts belonging to this VLAN ID to pass through to other configured VLAN IDs that have Inter VLAN Routing enabled. Figure 5: Adding VLAN memberships to the LAN 2.2.1 Associating VLANs to ports In order to tag all traffic through a specific LAN port with a VLAN ID, you can associate a VLAN to a physical port. Setup > VLAN Settings > Port VLAN VLAN membership properties for the LAN and wireless LAN are listed on this page.
Unified Services Router User Manual Figure 6: Port VLAN list • In Access mode the port is a member of a single VLAN (and only one). All data going into and out of the port is untagged. Traffic through a port in access mode looks like any other Ethernet frame. • In Trunk mode the port is a member of a user selectable set of VLANs. All data going into and out of the port is tagged. Untagged coming into the port is not forwarded, except for the default VLAN with PVID=1, which is untagged.
Unified Services Router User Manual Figure 7: Configuring VLAN membership for a port 2.3 Configurable Port: DMZ Setup This router supports one of the physical ports to be configured as a secondary WAN Ethernet port or a dedicated DMZ port. A DMZ is a subnetwork that is open to the public but behind the firewall. The DMZ adds an additional layer of security to the LAN, as specific services/ports that are exposed to the internet on the DMZ do not have to be exposed on the LAN.
Unified Services Router User Manual Figure 8: DMZ configuration In order to configure a DMZ port, the router’s configurable port must be set to DMZ in the Setup > Internet Settings > Configurable Port page. 2.4 Universal Plug and Play (UPnP) Advanced > Advanced Network > UPnP Universal Plug and Play (UPnP) is a feature that allows the router to discovery devices on the network that can communicate with the router and allow for auto configuration.
Unified Services Router • User Manual Advertisement Period: This is the frequency that the router broadcasts UPnP information over the network. A large value will minimize network traffic but cause delays in identifying new UPnP devices to the network. • Advertisement Time to Live: This is expressed in hops for each UPnP packet. This is the number of steps a packet is allowed to propagate before being discarded. Small values will limit the UPnP broadcast range.
Unified Services Router User Manual Chapter 3. Connecting to the Internet: WAN Setup This router has two WAN ports that can be used to establish a connection to the internet. The following ISP connection types are supported: DHCP, Static, PPPoE, PPTP, L2TP, 3G Internet (via USB modem). It is assumed that you have arranged for internet service with your Internet Service Provider (ISP).
Unified Services Router User Manual 3G Internet access with a USB modem is supported on the secondary WAN port (WAN2). The Internet Connection Setup Wizard assists with the primary WAN port (WAN1) configuration only. 3.
Unified Services Router • User Manual Server IP Address: Enter the IP address of the PPTP or L2TP server. 3.2.1 WAN Port IP address Your ISP assigns you an IP address that is either dynamic (newly generated each time you log in) or static (permanent). The IP Address Source option allows you to define whether the address is statically provided by the ISP or should be received dynamically at each login. If static, enter your IP address, IPv4 subnet mask, and the ISP gateway’s IP address.
Unified Services Router User Manual Figure 11: Manual WAN configuration 26
Unified Services Router User Manual 3.2.4 PPPoE Profiles Setup > Internet Settings > PPPoE Profiles > WAN1 PPPoE Profiles Some ISP’s allow for multiple concurrent PPPoE sessions (it is most common in Japan). Each connection can have its own specific authentication requirements and will provide unique IP, gateway, and DNS address parameters to the associated WAN port.
Unified Services Router User Manual Figure 13: PPPoE profile configuration 3.2.5 WAN Configuration in an IPv6 Network Setup > IPv6 > IPv6 WAN1 Config For IPv6 WAN connections, this router can have a static IPv6 address or receive connection information when configured as a DHCPv6 client. In the case where the ISP assigns you a fixed address to access the internet, the static configuration settings must be completed.
Unified Services Router User Manual When the ISP allows you to obtain the WAN IP settings via DHCP, you need to provide details for the DHCPv6 client configuration. The DHCPv6 client on the gateway can be either stateless or stateful. If a stateful client is selected the gateway will connect to the ISP’s DHCPv6 server for a leased address.
Unified Services Router User Manual • Connection state: This is whether the WAN is connected or disconnected to an ISP. The Link State is whether the physical WAN connection in place; the Link State can be UP (i.e. cable inserted) while the WAN Connection State is down.
Unified Services Router User Manual Figure 15: Connection Status information for both WAN ports The WAN status page allows you to Enable or Disable static WAN links. For WAN settings that are dynamically received from the ISP, you can Renew or Release the link parameters if required.
Unified Services Router User Manual 3.3 Bandwidth Controls Advanced > Advanced Network > Traffic Management > Bandwidth Profiles Bandwidth profiles allow you to regulate the traffic flow from the LAN to WAN 1 or WAN 2. This is useful to ensure that low priority LAN users (like guests or HTTP service) do not monopolize the available WAN’s bandwidth for cost-savings or bandwidth-priority-allocation purposes.
Unified Services Router User Manual • For finer control, the Rate profile type can be used. With this option the minimum and maximum bandwidth allowed by this profile can be limited. • Choose the WAN interface that the profile should be associated with Figure 17: Bandwidth Profile Configuration page Advanced > Advanced Network > Traffic Management > Traffic Selectors Once a profile has been created it can then be associated with a traffic flow from the LAN to WAN.
Unified Services Router User Manual Figure 18: Traffic Selector Configuration 3.4 Features with Multiple WAN Links This router supports multiple WAN links. This allows you to take advantage of failover and load balancing features to ensure certain internet dependent services are prioritized in the event of unstable WAN connectivity on one of the ports. Setup > Internet Settings > WAN Mode To use Auto Failover or Load Balancing, WAN link failure detection must be configured.
Unified Services Router User Manual 3.4.2 Load Balancing This feature allows you to use multiple WAN links (and presumably multiple ISP’s) simultaneously. After configuring more than one WAN port, the load balancing option is available to carry traffic over more than one link. Protocol bindings are used to segregate and assign services over one WAN port in order to manage internet flow.
Unified Services Router User Manual Figure 19: Load Balancing is available when multiple WAN ports are configured and Protocol Bindings have been defined 3.4.3 Protocol Bindings Advanced > Routing > Protocol Bindings Protocol bindings are required when the Load Balancing feature is in use. Choosing from a list of configured services or any of the user-defined services, the type of traffic can be assigned to go over only one of the available WAN ports.
Unified Services Router User Manual Figure 20: Protocol binding setup to associate a service and/or LAN source to a WAN and/or destination network 3.5 Routing Configuration Routing between the LAN and WAN will impact the way this router handles traffic that is received on any of its physical interfaces. The routing mode of the gateway is core to the behavior of the traffic flow between the secure LAN and the internet. 3.5.
Unified Services Router User Manual IP address. Along with connection sharing, NAT also hides internal IP addresses from the computers on the Internet. NAT is required if your ISP has assigned only one IP address to you. The computers that connect through the router will need to be assigned IP addresses from a private subnet. • Transparent mode routing between the LAN and WAN does not perform NAT.
Unified Services Router User Manual Figure 21: Routing Mode is used to configure traffic routing between WAN and LAN, as well as Dynamic routing (RIP) 3.5.
Unified Services Router User Manual Dynamic routing using the Routing Information Protocol (RIP) is an Interior Gateway Protocol (IGP) that is common in LANs. With RIP this router can exchange routing information with other supported routers in the LAN and allow for dynamic adjustment of routing tables in order to adapt to modifications in the LAN without interrupting traffic flow. The RIP direction will define how this router sends and receives RIP packets.
Unified Services Router User Manual The List of Static Routes displays all routes that have been added manually by an administrator and allows several operations on the static routes. The List of IPv4 Static Routes and List of IPv6 Static Routes share the same fields (with one exception): • Name: Name of the route, for identification and management. • Active: Determines whether the route is active or inactive. A route can be added to the table and made inactive, if not needed.
Unified Services Router User Manual Figure 22: Static route configuration fields 3.6 Configurable Port - WAN Option This router supports one of the physical ports to be configured as a secondary WAN Ethernet port or a dedicated DMZ port. If the port is selected to be a secondary WAN interface, all configuration pages relating to WAN2 are enabled.
Unified Services Router User Manual Figure 23: WAN2 configuration for 3G internet (part 1) Cellular 3G internet access is available on WAN2 via a USB modem. The cellular ISP that provides the 3G data plan will provide the authentication requirements to establish a connection. The dial Number and APN are specific to the cellular carriers.
Unified Services Router User Manual Figure 24: WAN2 configuration for 3G internet (part 2) 3.7 WAN Port Settings Advanced > Advanced Network > WAN Port Setup The physical port settings for each WAN link can be defined here. If your ISP account defines the WAN port speed or is associated with a MAC address, this information is required by the router to ensure a smooth connection with the network. The default MTU size supported by all ports is 1500.
Unified Services Router User Manual The default MAC address is defined during the manufacturing process for the interfaces, and can uniquely identify this router. You can customize each WAN port’s MAC address as needed, either by letting the WAN port assume the current LAN host’s MAC address or by entering a MAC address manually.
Unified Services Router User Manual Chapter 4. Wireless Access Point Setup This router has an integrated 802.11n radio that allows you to create an access point for wireless LAN clients. The security/encryption/authentication options are grouped in a wireless Profile, and each configured profile will be available for selection in the AP configuration menu.
Unified Services Router User Manual Figure 26: Wireless Network Setup Wizards 4.1.1 Wireless Network Setup Wizard This wizard provides a step-by-step guide to create and secure a new access point on the router. The network name (SSID) is the AP identifier that will be detected by supported clients. The Wizard uses a TKIP+AES cipher for WPA / WPA2 security; depending on support on the client side, devices associate with this AP using either WPA or WPA2 security with the same pre-shared key.
Unified Services Router User Manual • Personal Identification Number (PIN): The wireless device that supports WPS may have an alphanumeric PIN, and if entered in this field the AP will establish a link to the client. Click Connect to complete setup and connect to the client. • Push Button Configuration (PBC): for wireless devices that support PBC, press and hold down on this button and within 2 minutes, click the PBC connect button.
Unified Services Router User Manual server, or both. Note that WPA does not support 802.11n data rates; is it appropriate for legacy 802.11 connections. • WPA2: this security type uses CCMP encryption (and the option to add TKIP encryption) on either PSK (pre-shared key) or Enterprise (RADIUS Server) authentication. • WPA + WPA2: this uses both encryption algorithms, TKIP and CCMP. WPA clients will use TKIP and WPA2 clients will use CCMP encryption algorithms.
Unified Services Router User Manual size. Next choose one of the keys to be used for authentication. The selected key must be shared with wireless clients to connect to this device. Figure 28: Profile configuration to set network security 4.2.2 WPA or WPA2 with PSK A pre-shared key (PSK) is a known passphrase configured on the AP and client both and is used to authenticate the wireless client. An acceptable passphrase is between 8 to 63 characters in length.
Unified Services Router User Manual 4.2.3 RADIUS Authentication Setup > Wireless Settings > RADIUS Settings Enterprise Mode uses a RADIUS Server for WPA and/or WPA2 security. A RADIUS server must be configured and accessible by the router to authenticate wireless client connections to an AP enabled with a profile that uses RADIUS authentication. • The Authentication IP Address is required to identify the server.
Unified Services Router User Manual Figure 29: RADIUS server (External Authentication) configuration 4.3 Creating and Using Access Points Setup > Wireless Settings > Access Points Once a profile (a group of security settings) is created, it can be assigned to an AP on the router. The AP SSID can be configured to broadcast its availability to the 802.11 environment can be used to establish a WLAN network. The AP configuration page allows you to create a new AP and link to it one of the available profiles.
Unified Services Router User Manual Figure 30: Virtual AP configuration A valuable power saving feature is the start and stop time control for this AP. You can conserve on the radio power by disabling the AP when it is not in use. For example on evenings and weekends if you know there are no wireless clients, the start and stop time will enable/disable the access point automatically.
Unified Services Router User Manual Figure 31: List of configured access points (Virtual APs) shows one enabled access point on the radio, broadcasting its SSID The clients connected to a particular AP can be viewed by using the Status Button on the List of Available Access Points. Traffic statistics are shown for that individual AP, as compared to the summary stats for each AP on the Statistics table.
Unified Services Router User Manual 4.4 Tuning Radio Specific Settings Setup > Wireless Settings > Radio Settings The Radio Settings page lets you configure the channels and power levels available for the AP’s enabled on the device. The router has a dual band 802.11n radio, meaning either 2.4 GHz or 5 GHz frequency of operation can be selected (not concurrently though). Based on the selected operating frequency, the mode selection will let you define whether legacy connections or only 802.
Unified Services Router User Manual 4.5 Advanced Wireless Settings Advanced > Wireless Settings > Advanced Wireless Sophisticated wireless administrators can modify the 802.11 communication parameters in this page. Generally, the default settings are appropriate for most networks. Please refer to the GUI integrated help text for further details on the use of each configuration parameter. Figure 33: Advanced Wireless communication settings 4.
Unified Services Router User Manual connect within 60 seconds of clicking the “Configure via PIN” button immediately below the PIN field. There is no LED indication that a client has connected. • Push Button Configuration (PBC): for wireless devices that support PBC, press and hold down on this button and within 2 minutes click the PBC connect button. The AP will detect the wireless device and establish a link to the client.
Chapter 5. Securing the Private Network You can secure your network by creating and applying rules that your router uses to selectively block and allow inbound and outbound Internet traffic. You then specify how and to whom the rules apply.
Unified Services Router User Manual may use the IP address if a static address is assigned to the WAN port, or if your WAN address is dynamic a DDNS (Dynamic DNS) name can be used. Outbound (LAN/DMZ to WAN) rules restrict access to traffic leaving your network, selectively allowing only specific local users to access specific outside resources. The default outbound rule is to allow access from the secure zone (LAN) to either the public DMZ or insecure WAN.
Unified Services Router User Manual Figure 36: List of Available Schedules to bind to a firewall rule 5.3 Configuring Firewall Rules Advanced > Firewall Settings > Firewall Rules All configured firewall rules on the router are displayed in the Firewall Rules list. This list also indicates whether the rule is enabled (active) or not, and gives a summary of the From/To zone as well as the services or users that the rule affects. To create a new firewall rules, follow the steps below: 1.
Unified Services Router User Manual • Service: ANY means all traffic is affected by this rule. For a specific service the drop down list has common services, or you can select a custom defined service. • Action & Schedule: Select one of the 4 actions that this rule defines: BLOCK always, ALLOW always, BLOCK by schedule otherwise ALLOW, or ALLOW by schedule otherwise BLOCK. A schedule must be preconfigured in order for it to be available in the dropdown list to assign to this rule.
Unified Services Router • User Manual External IP address: The rule can be bound to a specific WAN interface by selecting either the primary WAN or configurable port WAN as the source IP address for incoming traffic. This router supports multi-NAT and so the External IP address does not necessarily have to be the WAN address. On a single WAN interface, multiple public IP addresses are supported.
Unified Services Router User Manual Figure 37: The firewall rule configuration page allows you to define the To/From zone, service, action, schedules, and specify source/destination IP addresses as needed.
Unified Services Router User Manual 5.3.1 Firewall Rule Configuration Examples Example 1: Allow inbound HTTP traffic to the DMZ Situation: You host a public web server on your local DMZ network. You want to allow inbound HTTP requests from any outside IP address to the IP address of your web server at any time of day. Solution: Create an inbound rule as follows.
Unified Services Router User Manual arrange with your ISP to have more than one public IP address for your use, you can use the additional public IP addresses to map to servers on your LAN. One of these public IP addresses is used as the primary IP address of the router. This address is used to provide Internet access to your LAN PCs through NAT. The other addresses are available to map to your DMZ servers. The following addressing scheme is used to illustrate this procedure: Router • WAN IP address: 10.
Unified Services Router User Manual • Click apply – now schedule “Weekend” isolates all day Saturday and Sunday from the rest of the week. Figure 38: Schedule configuration for the above example. 2. Since we are trying to block HTTP requests, it is a service with To Zone: Insecure (WAN1/WAN2) that is to be blocked according to schedule “Weekend”.
Unified Services Router User Manual 3. Select the Action to “Block by Schedule, otherwise allow”. This will take a predefined schedule and make sure the rule is a blocking rule during the defined dates/times. All other times outside the schedule will not be affected by this firewall blocking rule 4. As we defined our schedule in schedule “Weekend”, this is available in the dropdown menu 5. We want to block the IP range assigned to the marketing group. Let’s say they have IP 192.168.10.20 to 192.168.10.
Unified Services Router User Manual Figure 39: List of user defined services. 5.5 ALG support Advanced > Firewall Settings > ALGs Application Level Gateways (ALGs) are security component that enhance the firewall and NAT support of this router to seamlessly support application layer protocols. In some cases enabling the ALG will allow the firewall to use dynamic ephemeral TCP/ UDP ports to communicate with the known ports a particular client application (such as H.
Unified Services Router User Manual Figure 40: Available ALG support on the router. 5.6 VPN Passthrough for Firewall Advanced > Firewall Settings > VPN Passthrough This router’s firewall settings can be configured to allow encrypted VPN traffic for IPSec, PPTP, and L2TP VPN tunnel connections between the LAN and internet. A specific firewall rule or service is not appropriate to introduce this passthrough support; instead the appropriate check boxes in the VPN Passthrough page must be enabled.
Unified Services Router User Manual Figure 41: Passthrough options for VPN tunnels 5.7 Application Rules Advanced > Application Rules > Application Rules Application rules are also referred to as port triggering. This feature allows devices on the LAN or DMZ to request one or more ports to be forwarded to them. Port triggering waits for an outbound request from the LAN/DMZ on one of the defined outgoing ports, and then opens an incoming port for that specified type of traffic.
Unified Services Router User Manual Figure 42: List of Available Application Rules showing 4 unique rules The application rule status page will list any active rules, i.e. incoming ports that are being triggered based on outbound requests from a defined outgoing port. 5.8 Web Content Filtering The gateway offers some standard web filtering options to allow the admin to easily create internet access policies between the secure LAN and insecure WAN.
Unified Services Router User Manual Figure 43: Content Filtering used to block access to proxy servers and prevent ActiveX controls from being downloaded • Approved URLs Advanced > Website Filter > Approved URLs The Approved URLs is an acceptance list for all URL domain names. Domains added to this list are allowed in any form. For example, if the domain “yahoo” is added to this list then all of the following URL’s are permitted access from the LAN: www.yahoo.com , yahoo.co.uk, etc.
Unified Services Router User Manual Figure 44: Two trusted domains added to the Approved URLs List • Blocked Keywords Advanced > Website Filter > Blocked Keywords Keyword blocking allows you to block all website URL’s or site content that contains the keywords in the configured list. This is lower priority than the Approved URL List; i.e. if the blocked keyword is present in a site allowed by a Trusted Domain in the Approved URL List, then access to that site will be allowed.
Unified Services Router User Manual Figure 45: Two keywords added to the block list 5.9 IP/MAC Binding Advanced > IP/MAC Binding Another available security measure is to only allow outbound traffic (from the LAN to WAN) when the LAN node has an IP address matching the MAC address bound to it.
Unified Services Router User Manual Figure 46: The above example of IP/MAC Binding binds a LAN host’s MAC Address to an IP address. If there is an IP/MAC Binding violation, the violating packet will be dropped and logs will be captured 5.10 Intrusion Prevention (IPS) Advanced > Advanced Network > IPS The gateway’s Intrusion Prevention System (IPS) prevents malicious attacks from the internet from accessing the private network.
Unified Services Router User Manual Figure 47: Intrusion Prevention features on the router 5.10.1 Protecting from Internet Attacks Advanced > Advanced Network > Attack Checks Attacks can be malicious security breaches or unintentional network issues that render the router unusable. Attack checks allow you to manage WAN security threats such as continual ping requests and discovery via ARP scans. TCP and UDP flood attack checks can be enabled to manage extreme usage of WAN resources.
Unified Services Router User Manual Figure 48: Protecting the router and LAN from internet attacks 78
Unified Services Router User Manual Chapter 6. IPSec / PPTP / L2TP VPN A VPN provides a secure communication channel (“tunnel”) between two gateway routers or a remote PC client. The following types of tunnels can be created: • Gateway-to-gateway VPN: to connect two or more routers to secure traffic between remote sites. • Remote Client (client-to-gateway VPN tunnel): A remote client initiates a VPN tunnel as the IP address of the remote PC client is not known in advance.
Unified Services Router User Manual Figure 49: VPN Wizard launch screen To easily establish a VPN tunnel using VPN Wizard, follow the steps below: 1. Step 1: Select the VPN tunnel type to create • The tunnel can either be a gateway to gateway connection (site-to-site) or a tunnel to a host on the internet (remote access).
Unified Services Router • User Manual Local WAN IP address / FQDN: This field can be left blank if you are not using a different FQDN or IP address than the one specified in the WAN port’s configuration. 3.
Unified Services Router User Manual 6.2 Configuring IPSec Policies Setup > VPN Settings > IPSec > IPSec Policies A IPSec policy is between this router and another gateway or this router and a IPSec client on a remote host. The IPSec mode can be either tunnel or transport depending on the network being traversed between the two policy endpoints. • Transport: This is used for end-to-end communication between this router and the tunnel endpoint, either another IPSec gateway or an IPSec VPN client on a host.
Unified Services Router User Manual Figure 50: IPSec policy configuration Once the tunnel type and endpoints of the tunnel are defined you can determine the Phase 1 / Phase 2 negotiation to use for the tunnel. This is covered in the IPSec mode setting, as the policy can be Manual or Auto. For Auto policies, the Internet Key Exchange (IKE) protocol dynamically exchanges keys between two IPSec hosts. The Phase 1 IKE parameters are used to define the tunnel’s security association details.
Unified Services Router User Manual Figure 51: IPSec policy configuration continued (Auto policy via IKE) A Manual policy does not use IKE and instead relies on manual keying to exchange authentication parameters between the two IPSec hosts. The incoming and outgoing security parameter index (SPI) values must be mirrored on the remote tunnel endpoint. As well the encryption and integrity algorithms and keys must match on the remote IPSec host exactly in order for the tunnel to establish successfully.
Unified Services Router User Manual Figure 52: IPSec policy configuration continued (Auto / Manual Phase 2) 6.2.1 Extended Authentication (XAUTH) You can also configure extended authentication (XAUTH). Rather than configure a unique VPN policy for each user, you can configure the VPN gateway router to authenticate users from a stored list of user accounts or with an external authentication server such as a RADIUS server.
Unified Services Router User Manual VPN client software is required to establish a VPN tunnel between the router and remote endpoint. Open source software (such as OpenVPN or Openswan) as well as Microsoft IPSec VPN software can be configured with the required IKE policy parameters to establish an IPSec VPN tunnel. Refer to the client software guide for detailed instructions on setup as well as the router’s online help.
Unified Services Router User Manual Figure 53: PPTP tunnel configuration – PPTP Server 6.4.2 L2TP Tunnel Support Setup > VPN Settings > L2TP > L2TP Server A L2TP VPN can be established through this router. Once enabled a L2TP server is available on the router for LAN and WAN L2TP client users to access. Once the L2TP server is enabled, L2TP clients that are within the range of configured IP addresses of allowed clients can reach the router’s L2TP server.
Chapter 7. SSL VPN The router provides an intrinsic SSL VPN feature as an alternate to the standard IPSec VPN. SSL VPN differs from IPSec VPN mainly by removing the requirement of a preinstalled VPN client on the remote host. Instead, users can securely login through the SSL User Portal using a standard web browser and receive access to configured network resources within the corporate LAN.
Unified Services Router User Manual Figure 55: Available Users with login status and associated Group/Domain Advanced > Users > Domains The Domain determines the authentication method (local user database, external server) to be used when validating the remote user’s connection. As well the Domain determines the portal layout presented to the remote SSL user.
Unified Services Router User Manual following user types are assigned to a user that reaches the GUI login screen from the LAN or WAN: • Administrator: This is the router’s super-user, and can manage the router, use SSL VPN to access network resources, and login to L2TP/PPTP servers on the WAN. There will always be one default administrator user for the GUI. • Guest (read only): The guest user gains read only access to the GUI to observe and review configuration settings.
Unified Services Router User Manual Figure 56: User configuration options 7.2 Using SSL VPN Policies Setup > VPN Settings > SSL VPN Server > SSL VPN Policies SSL VPN Policies can be created on a Global, Group, or User level. User level policies take precedence over Group level policies and Group level policies take precedence over Global policies. These policies can be applied to a specific network resource, IP address or ranges on the LAN, or to different SSL VPN services supported by the router.
Unified Services Router User Manual Figure 57: List of SSL VPN polices (Global filter) To add a SSL VPN policy, you must first assign it to a user, group, or make it global (i.e. applicable to all SSL VPN users). If the policy is for a group, the available configured groups are shown in a drop down menu and one must be selected. Similarly, for a user defined policy a SSL VPN user must be chosen from the available list of configured users. The next step is to define the policy details.
Unified Services Router User Manual Figure 58: SSL VPN policy configuration 7.2.1 Using Network Resources Setup > VPN Settings > SSL VPN Server > Resources Network resources are services or groups of LAN IP addresses that are used to easily create and configure SSL VPN policies. This shortcut saves time when creating similar policies for multiple remote SSL VPN users.
Unified Services Router User Manual Figure 59: List of configured resources, which are available to assign to SSL VPN policies 7.3 Application Port Forwarding Setup > VPN Settings > SSL VPN Server > Port Forwarding Port forwarding allows remote SSL users to access specified network applications or services after they login to the User Portal and launch the Port Forwarding service. Traffic from the remote user to the router is detected and re-routed based on configured port forwarding rules.
Unified Services Router User Manual users with easy-to-remember FQDN’s to access TCP applications instead of errorprone IP addresses when using the Port Forwarding service through the SSL User Portal. Defining the hostname is optional as minimum requirement for port forwarding is identifying the TCP application and local server IP address. The local server IP address of the configured hostname must match the IP address of the configured application for port forwarding.
Unified Services Router User Manual The IP addresses of the client’s network interfaces (Ethernet, Wireless, etc.) cannot be identical to the router’s IP address or a server on the corporate LAN that is being accessed through the SSL VPN tunnel. Figure 61: SSL VPN client adapter and access configuration The router allows full tunnel and split tunnel support. Full tunnel mode just sends all traffic from the client across the VPN tunnel to the router.
Unified Services Router User Manual Figure 62: Configured client routes only apply in split tunnel mode 7.5 User Portal Setup > VPN Settings > SSL VPN Client > SSL VPN Client Portal When remote users want to access the private network through an SSL tunnel (either using the Port Forwarding or VPN tunnel service), they login through a user portal. This portal provides the authentication fields to provide the appropriate access levels and privileges as determined by the router administrator.
Unified Services Router User Manual Figure 63: List of configured SSL VPN portals. The configured portal can then be associated with an authentication domain 7.5.1 Creating Portal Layouts Setup > VPN Settings > SSL VPN Server > Portal Layouts The router allows you to create a custom page for remote SSL VPN users that is presented upon authentication.
Unified Services Router User Manual Figure 64: SSL VPN Portal configuration 100
Unified Services Router User Manual Chapter 8. Advanced Configuration Tools 8.1 USB Device Setup Setup > USB Settings There are two USB ports on the DSR Unified Services Router. The port supports a 3G modem where the USB dongle is used as a secondary WAN interface. Additionally, the port can be used for a USB storage device if USB Disc is type is selected. This storage can be accessed by LAN devices if appropriate policies are configured. Figure 65: USB device configuration 8.
Unified Services Router User Manual A self certificate is a certificate issued by a CA identifying your device (or selfsigned if you don’t want the identity protection of a CA). The Active Self Certificate table lists the self certificates currently loaded on the gateway. The following information is displayed for each uploaded self certificate: Name: The name you use to identify this certificate, it is not displayed to IPSec VPN peers or SSL users.
Unified Services Router User Manual Chapter 9. Administration & Management 9.1 Configuration Access Control The primary means to configure this gateway via the browser-independent GUI. The GUI can be accessed from LAN node by using the gateway’s LAN IP address and HTTP, or from the WAN by using the gateway’s WAN IP address and HTTPS (HTTP over SSL). Administrator and Guest users are permitted to login to the router’s management interface. The user type is set in the Advanced > Users > Users page.
Unified Services Router User Manual Figure 68: Remote Management from the WAN 9.1.2 CLI Access In addition to the web-based GUI, the gateway supports SSH and Telnet management for command-line interaction. The CLI login credentials are shared with the GUI for administrator users. To access the CLI, type “cli” in the SSH or console prompt and login with administrator user credentials. 9.
Unified Services Router User Manual Figure 69: SNMP Users, Traps, and Access Control Tools > Admin > SNMP System Info The router is identified by an SNMP manager via the System Information. The identifier settings The SysName set here is also used to identify the router for SysLog logging.
Unified Services Router User Manual Figure 70: SNMP system information for this router 9.3 Configuring Time Zone and NTP Tools > Date and Time You can configure your time zone, whether or not to adjust for Daylight Savings Time, and with which Network Time Protocol (NTP) server to synchronize the date and time. You can choose to set Date and Time manually, which will store the information on the router’s real time clock (RTC).
Unified Services Router User Manual Figure 71: Date, Time, and NTP server setup 9.4 Log Configuration This router allows you to capture log messages for traffic through the firewall, VPN, and over the wireless AP. As an administrator you can monitor the type of traffic that goes through the router and also be notified of potential attacks or errors when they are detected by the router. The following sections describe the log configuration settings and the ways you can access these logs. 9.4.
Unified Services Router User Manual • System: This refers to application and management level features available on this router, including SSL VPN and administrator changes for managing the unit. • Wireless: This facility corresponds to the 802.11 driver used for providing AP functionality to your network. For each facility, the following events (in order of severity) can be logged: Emergency, Alert, Critical, Error, Warning, Notification, Information, Debugging.
Unified Services Router User Manual Figure 72: Facility settings for Logging The display for logging can be customized based on where the logs are sent, either the Event Log viewer in the GUI (the Event Log viewer is in the Status > Logs page) or a remote Syslog server for later review. E-mail logs, discussed in a subsequent section, follow the same configuration as logs configured for a Syslog server.
Unified Services Router User Manual • Example: If Accept Packets from LAN to WAN is enabled and there is a firewall rule to allow SSH traffic from LAN, then whenever a LAN machine tries to make an SSH connection, those packets will be accepted and a message will be logged. (Assuming the log option is set to Allow for the SSH firewall rule.) Dropped Packets are packets that were intentionally blocked from being transferred through the corresponding network segment.
Unified Services Router User Manual Figure 73: Log configuration options for traffic through router 9.4.2 Sending Logs to E-mail or Syslog Tools > Log Settings > Remote Logging Once you have configured the type of logs that you want the router to collect, they can be sent to either a Syslog server or an E-Mail address. For remote logging a key configuration field is the Remote Log Identifier.
Unified Services Router User Manual this requirement. In some cases the SMTP server may send out IDENT requests, and this router can have this response option enabled as needed. Once the e-mail server and recipient details are defined you can determine when the router should send out logs. E-mail logs can be sent out based on a defined schedule by first choosing the unit (i.e. the frequency) of sending logs: Hourly, Daily, or Weekly.
Unified Services Router User Manual the local Event Viewer on the router’s GUI, and thus can collect a considerable number of logs over a sustained period. This is typically very useful for debugging network issues or to monitor router traffic over a long duration. This router supports up to 8 concurrent Syslog servers. Each can be configured to receive different log facility messages of varying severity.
Unified Services Router User Manual Figure 76: VPN logs displayed in GUI event viewer 9.5 Backing up and Restoring Configuration Settings Tools > System You can back up the router’s custom configuration settings to restore them to a different device or the same router after some other changes. During backup, your settings are saved as a file on your host. You can restore the router's saved settings from this file as well.
Unified Services Router User Manual 2. To restore your saved settings from a backup file, click Browse then locate the file on the host. After clicking Restore, the router begins importing the file’s saved configuration settings. After the restore, the router reboots automatically with the restored settings. 3. To erase your current settings and revert to factory default settings, click the Default button.
Unified Services Router User Manual Figure 78: Firmware version information and upgrade option This router also supports an automated notification to determine if a newer firmware version is available for this router. By clicking the Check Now button in the notification section, the router will check a D-Link server to see if a newer firmware version for this router is available for download and update the Status field below. 9.
Unified Services Router User Manual Figure 79: Dynamic DNS configuration 9.8 Using Diagnostic Tools Tools > System Check The router has built in tools to allow an administrator to evaluate the communication status and overall network health.
Unified Services Router User Manual Figure 80: Router diagnostics tools available in the GUI 9.8.1 Ping This utility can be used to test connectivity between this router and another device on the network connected to this router. Enter an IP address and click PING. The command output will appear indicating the ICMP echo request status. 9.8.2 Trace Route This utility will display all the routers present between the destination IP address and this router.
Unified Services Router User Manual Figure 81: Sample traceroute output 9.8.3 DNS Lookup To retrieve the IP address of a Web, FTP, Mail or any other server on the Internet, type the Internet Name in the text box and click Lookup. If the host or domain entry exists, you will see a response with the IP address. A message stating “Unknown Host” indicates that the specified Internet Name does not exist. This feature assumes there is internet access available on the WAN link(s). 9.8.
Unified Services Router User Manual Chapter 10. Router Status and Statistics 10.1 System Overview The Status page allows you to get a detailed overview of the system configuration. The settings for the wired and wireless interfaces are displayed in the Device Status page, and then the resulting hardware resource and router usage details are summarized on the router’s Dashboard. 10.1.
Unified Services Router User Manual Figure 82: Device Status display 121
Unified Services Router User Manual Figure 83: Device Status display (continued) 10.1.2 Resource Utilization Status > Device Info > Dashboard The Dashboard page presents hardware and usage statistics. The CPU and Memory utilization is a function of the available hardware and current configuration and traffic through the router. Interface statistics for the wired connections (LAN, WAN1, WAN2/DMZ, VLANs) provide indication of packets through and packets dropped by the interface.
Unified Services Router User Manual Figure 84: Resource Utilization statistics 123
Unified Services Router User Manual 124
Unified Services Router User Manual Figure 85: Resource Utilization data (continued) 125
Unified Services Router User Manual Figure 86: Resource Utilization data (continued) 10.2 Traffic Statistics 10.2.1 Wired Port Statistics Status > Traffic Monitor > Device Statistics Detailed transmit and receive statistics for each physical port are presented here. Each interface (WAN1, WAN2/DMZ, LAN, and VLANs) have port specific packet level information provided for review.
Unified Services Router User Manual Figure 87: Physical port statistics 10.2.2 Wireless Statistics Status > Traffic Monitor > Wireless Statistics The Wireless Statistics tab displays the incrementing traffic statistics for each enabled access point. This page will give a snapshot of how much traffic is being transmitted over each wireless link. If you suspect that a radio or VAP may be down, the details on this page would confirm if traffic is being sent and received through the VAP.
Unified Services Router User Manual Figure 88: AP specific statistics 10.3 Active Connections 10.3.1 Sessions through the Router Status > Active Sessions This table lists the active internet sessions through the router’s firewall. The session’s protocol, state, local and remote IP addresses are shown.
Unified Services Router User Manual Figure 89: List of current Active Firewall Sessions 129
Unified Services Router User Manual 10.3.2 Wireless Clients Status > Wireless Clients The clients connected to a particular AP can be viewed on this page. Connected clients are sorted by the MAC address and indicate the security parameters used by the wireless link, as well as the time connected to the corresponding AP. The statistics table has auto-refresh control which allows display of the most current port level data at each page refresh. The default auto-refresh for this page is 10 seconds.
Unified Services Router User Manual Figure 91: List of LAN hosts 10.3.4 Active VPN Tunnels Status > Active VPNs You can view and change the status (connect or drop) of the router’s IPSec security associations. Here, the active IPSec SAs (security associations) are listed along with the traffic details and tunnel state. The traffic is a cumulative measure of transmitted/received packets since the tunnel was established.
Unified Services Router User Manual Figure 92: List of current Active VPN Sessions All active SSL VPN connections, both for VPN tunnel and VPN Port forwarding, are displayed on this page as well. Table fields are as follows. Field Description User Name The SSL VPN user that has an active tunnel or port forwarding session to this router. IP Address IP address of the remote VPN client. Local PPP Interface The interface (WAN1 or WAN2) through which the session is active.
Unified Services Router User Manual Chapter 11. Trouble Shooting 11.1 Internet connection Symptom: You cannot access the router’s web-configuration interface from a PC on your LAN. Recommended action: 1. Check the Ethernet connection between the PC and the router. 2. Ensure that your PC’s IP address is on the same subnet as the router. If you are using the recommended addressing scheme, your PC’s address should be in the range 192.168.10.2 to 192.168.10.254. 3. Check your PC’s IP address.
Unified Services Router User Manual Symptom: Router cannot access the Internet. Possible cause: If you use dynamic IP addresses, your router may not have requested an IP address from the ISP. Recommended action: 1. Launch your browser and go to an external site such as www.google.com. 2. Access the firewall’s configuration main menu at http://192.168.10.1. 3. Select Monitoring > Router Status . 4. Ensure that an IP address is shown for the WAN port. If 0.0.0.
Unified Services Router User Manual Symptom: Router can obtain an IP address, but PC is unable to load Internet pages. Recommended action: 1. Ask your ISP for the addresses of its designated Domain Name System (DNS) servers. Configure your PC to recognize those addresses. For details, see your operating system documentation. 2. On your PC, configure the router to be its TCP/IP gateway. 11.2 Date and time Symptom: Date shown is January 1, 1970.
Unified Services Router User Manual 4. Observe the display: • If the path is working, you see this message sequence: Pinging with 32 bytes of data Reply from : bytes=32 time=NN ms TTL=xxx • If the path is not working, you see this message sequence: Pinging with 32 bytes of data Request timed out 5.
Unified Services Router User Manual • Verify that the network (subnet) address of your PC is different from the network address of the remote device. • Verify that the cable or DSL modem is connected and functioning. • Ask your ISP if it assigned a hostname to your PC. If yes, select Network Configuration > WAN Settings > Ethernet ISP Settings and enter that hostname as the ISP account name. • Ask your ISP if it rejects the Ethernet MAC addresses of all but one of your PCs.
Chapter 12. Credits Microsoft, Windows are registered trademarks of Microsoft Corp. Linux is a registered trademark of Linus Torvalds. UNIX is a registered trademark of The Open Group.
Unified Services Router User Manual Appendix A. Glossary ARP Address Resolution Protocol. Broadcast protocol for mapping IP addresses to MAC addresses. CHAP Challenge-Handshake Authentication Protocol. Protocol for authenticating users to an ISP. DDNS Dynamic DNS. System for updating domain names in real time. Allows a domain name to be assigned to a device with a dynamic IP address. DHCP Dynamic Host Configuration Protocol.
Unified Services Router User Manual PPPoE Point-to-Point Protocol over Ethernet. Protocol for connecting a network of hosts to an ISP without the ISP having to manage the allocation of IP addresses. PPTP Point-to-Point Tunneling Protocol. Protocol for creation of VPNs for the secure transfer of data from remote clients to private servers over the Internet. RADIUS Remote Authentication Dial-In User Service. Protocol for remote user authentication and accounting.
Appendix B. Factory Default Settings Feature Description Default Setting Device login User login URL http://192.168.10.1 User name (case sensitive) admin Login password (case sensitive) admin WAN MAC address Use default address WAN MTU size 1500 Port speed Autosense IP address 192.168.10.1 IPv4 subnet mask 255.255.255.0 RIP direction None RIP version Disabled RIP authentication Disabled DHCP server Enabled DHCP starting IP address 192.168.10.2 DHCP ending IP address 192.168.
Unified Services Router User Manual Appendix C.
Unified Services Router User Manual Appendix D. Log Output Reference Facility: System (Networking) Log Message DBUpdate event: Table: %s opCode:%d rowId:%d networkIntable.txt not found sqlite3QueryResGet failed Interface is already deleted in bridge removing %s from bridge %s... %s adding %s to bridge %s... %s stopping bridge... stopping bridge... stopping bridge...
Unified Services Router nimfAdvOptSetWrap: user has changed MTU option nimfAdvOptSetWrap: MTU: %d nimfAdvOptSetWrap: old MTU size: %d nimfAdvOptSetWrap: old Port Speed Option: %d nimfAdvOptSetWrap: old Mac Address Option: %d nimfAdvOptSetWrap: MacAddress: %s Setting LED [%d]:[%d] For %s l2tpEnable: command string: %s nimfAdvOptSetWrap: handling reboot scenario nimfAdvOptSetWrap: INDICATOR = %d nimfAdvOptSetWrap: UpdateFlag: %d nimfAdvOptSetWrap: returning with status: %s nimfGetUpdateMacFlag: MacTable Flag
Unified Services Router User Manual %s:DBUpdate event: Table: %s opCode:%d rowId:%d %s:%d SIP ENABLE: %s sipTblHandler:failed to update ifStatic sipTblHandler:failed to update Configport DEBUG DEBUG DEBUG DEBUG %s:%d SIP DISABLE: %s DEBUG %s:%d SIP SET CONF: %s DEBUG Failed to open %s: %s Failed to start sipalg DEBUG DEBUG Failed to stop sipalg DEBUG Failed to get config info DEBUG Network Mask: 0x%x DEBUG RTP DSCP Value: 0x%x DEBUG Need more arguments DEBUG Invalid lanaddr DEBUG Inval
Unified Services Router pPrivSep: %s %s:DBUpdate event: Table: %s opCode:%d rowId:%d Re-Starting sshd daemon.... sshd re-started successfully. sshd stopped . failed query %s vlan disabled, not applying vlan configuration.. failed query %s failed query %s no ports present in this vlanId %d failed query %s vlan disabled, not applying vlan configuration.. disabling vlan enabling vlan vlan disabled, not applying vlan configuration..
Unified Services Router User Manual GetDnsFromIsp: %s IdleTimeOutFlag: %s IdleTimeOutValue: %d AuthMetho: %d executing %s ... %s removing %s from bridge%d... %s adding %s to bridge%d... %s DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG stopping bridge... restarting bridge...
Unified Services Router User Manual %s: buffer overflow %s: value of %s in %s table is: %s DEBUG DEBUG %s: returning with status: %s dnsResolverConfigure: addressFamily: %d dnsResolverConfigure: LogicalIfName: %s chap-secrets File found PID File for xl2tpd found DEBUG Failed to clear vlan for %d Failed to set vlan entry for vlan %d Failed to set vlan entries, while enabling \ Failed to execute vlanConfig binary for port number %d Failed to execute vlanConfig binary for vlanId %d Failed to enable vlan
Unified Services Router User Manual pppoeMgmtTblHandler: NetMask: %s pppoeMgmtTblHandler: AuthOpt: %d pppoeMgmtTblHandler: Satus: %d pppoeEnable: ppp dial string: %s pppoeMgmtDBUpdateHandler: returning with status: %s pptpMgmtTblHandler: MtuFlag: %d DEBUG DEBUG DEBUG DEBUG xl2tpdStop failed writing xl2tpd.conf failed writing options.
Unified Services Router User Manual l2tpMgmtTblHandler: UserName: %s DEBUG l2tpMgmtTblHandler: Password: %s DEBUG l2tpMgmtTblHandler: AccountName: %s DEBUG l2tpMgmtTblHandler: DomainName: %s l2tpMgmtTblHandler: Secret: not specified DEBUG l2tpMgmtTblHandler: Secret: %s l2tpMgmtTblHandler: dynamic MyIp configured DEBUG l2tpMgmtTblHandler: MyIp: %s l2tpMgmtTblHandler: ServerIp: %s l2tpMgmtTblHandler: StaticIp: %s l2tpMgmtTblHandler: NetMask: %s DEBUG DEBUG DEBUG DEBUG l2tpMgmtTblHandler: SplitTu
Unified Services Router User Manual ERROR dhcpcMgmtTblHandler: dhclient enable failed dhcpcMgmtTblHandler: dhcpc release failed dhcpcMgmtTblHandler: dhcpc disable failed dhcpcMgmtDBUpdateHandler: failed query: %s dhcpcMgmtDBUpdateHandler: error in executing " ERROR DHCPv6 Client start failed. ERROR ERROR ERROR DHCPv6 Client stop failed.
Unified Services Router User Manual Created EAP/PEAP context: OK DEBUG Deleted EAP/PEAP context: OK Upper EAP sent us: decision = %d method state = %d P2 decision=(%d); methodState=(%d) Writing message to BIO: ERROR. Encrypted (%d) bytes for P2 P2: sending fragment. P2: message size = %d P2: sending unfragmented message. DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG P1: Sending fragment. DEBUG P1: Total TLS message size = (%d) P1: sending unfragmented message.
Unified Services Router User Manual Error rcvd. opCode %d. pCtx NULL. TLS message len changed in the fragment, ignoring. no data to send while fragment ack received. TLS handshake successful. Created EAP/TTLS context: OK Deleted EAP/TTLS context: OK No more fragments in message. ERROR Upper EAP sent us: method state = %d; decision = %d P2: sending fragment.
Unified Services Router User Manual pFB->msgBuff is NULL. Error calculating binary. DEBUG DEBUG Error calculating binary. DEBUG adpDigestInit for SHA1 failed. adpDigestInit for SHA1 failed. DEBUG DEBUG E = %d DEBUG R = %d Could not initialize des-ecb DEBUG DEBUG adpDigestInit for MD4 failed. DEBUG adpDigestInit for SHA1 failed. adpDigestInit for SHA1 failed. Error converting received auth reponse to bin.
Unified Services Router User Manual password change is not allowed for this user DEBUG completed writing the policy DEBUG completed writing the SA DEBUG completed writing the proposal block DEBUG cmdBuf: %s X509_DEBUG : Invalid Certificate for the generated" DEBUG X590_ERROR : Failed to create File '%s' DEBUG x509TblHandler DEBUG pCertType: %s DEBUG pRowQueryStr: %s DEBUG x509SelfCertTblHandler pRowQueryStr: %s %s:DBUpdate event: Table: %s opCode:%d rowId:%d DEBUG DEBUG umiRegister fai
Unified Services Router pEapCtx == NULL or pPDU == NULL. received EAP pdu bigger than EAP_MTU_SIZE. received EAP pdu bigger than EAP_MTU_SIZE. state machine is in invalid state. unable to create method context. method ctxCreate failed. method profile set failed. state machine is in invalid state. Only StandAlone authenticator supported currently. state machine is in invalid state. BuildReq operation failed No method ops defined for current method Process operation failed state machine is in invalid state.
Unified Services Router User Manual Could not open database: %s CPU LOG File not found DEBUG DEBUG MEM LOG File not found cpuMemUsageDBUpdateHandler: update query: %s DEBUG Printing the whole list after inserting %s at %d(minute) %d(hour) %d(dayOfMonth) %d(month)" DEBUG adpCmdExec exited with return code=%d DEBUG %s op=%d row=%d DEBUG sqlite3_mprintf failed DEBUG sqlite3QueryResGet failed: query=%s Printing the whole list after delete %s at %d(minute) %d(hour) %d(dayOfMonth) %d(month)" DEBUG
Unified Services Router User Manual Adding Dictionary Attribute '%s' DEBUG Adding Dictionary Value %s DEBUG Receiving attribute: %s Processing attribute: %s Processing attribute: %s Processing attribute: %s Processing attribute: %s radConfGet: " Added Server %s:%d with " Added Server %s:%d with " Default Timeout Set to %d Default Retry Count Set to %d %s - %s : %d Deleting Server %s:%d with " Adding RowId:%d to Server %s:%d with " rowIds: %d - %d Deleting Server %s:%d with " RADIUS Deconfigured DEBUG
Unified Services Router User Manual Next Synchronization after" Next Synchronization after %d \ Primary is not available, " Secondary is not available, " DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Unable to set debug for radAuth. Unable to set debug level for radAuth. ERROR: option value not specified Unable to initialize radius Invalid username, challenge or response Unable to set debug for radAuth. Unable to set debug level for radAuth.
Unified Services Router User Manual timeout after semTake srcId=%d(%s) <-- destId=%d(%s) cmd=%d DEBUG memPartAlloc for %d size failed ERROR DEBUG ERROR Un-registerting component with Id %d failed to send ioctl request: dst(%d) <--src(%d) processed a reply dst(%d) <-- src(%d) request with no result option dst(%d) <-src(%d) DEBUG cmd = %s cmdstring is %s %s:%d Calling printerConfig binary ... DEBUG DEBUG DEBUG Calling unmount for USB ... DEBUG Calling mount for USB ...
Unified Services Router cpuMemUsageDBUpdateHandler: SQL error: %s unable to open the DB file %s umiInit failed unable to register to UMI Error Reading from the Database. short DB update event request! Error in executing DB update handler adpListNodeRemove : Returned with an error command too long. Try increasing " failed to allocate memory for CRON_NODE sqlite3QueryResGet failed There was an error while reading the schedules.
Unified Services Router User Manual wan traffic counters are restared DEBUG Traffic limit has been reached Traffic meter monthly limit has been changed to %d. Enabling traffic meter for only dowload. Enabling traffic meter for both directions. Enabling traffic meter with no limit. Email alert in traffic meter disabled. Email alert in traffic meter enabled.
Unified Services Router User Manual Enabling attack check for L2TP. Enabling attack check for UDP Flood. Enabling attack check for IPSec. Enabling attack check for PPTP. DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Updating BlockSites Keyword from \ Inserting BlockSites Keyword \ Deleting Trusted Domain \ Adding Trusted Domain \ Restarting Schedule Based Firewall Rules Enabling attack check for L2TP.
Unified Services Router User Manual Internet on port %d Enabling remote access management for IP address range" Enabling remote access management to only this PC. Disabling Management Access from Internet on port %d Disabling remote access management for IP address range" Disabling remote access management only to this PC. MAC Filtering %sabled for BLOCK and PERMIT REST. MAC Filtering %sabled for PERMIT and BLOCK REST. Enabling Content Filtering. Disabling Content Filtering.
Unified Services Router User Manual Update FirewallRules6 where ScheduleName = '%s' to New " DEBUG Dns proxy Restart failed DEBUG deleting interface to ifgroup failed adding interface to ifgroup failed deleting interface pVirtIface %s from ifgroup %d" adding interface pVirtIface %s to ifgroup %d failed DEBUG DEBUG Deleting IP address %s. DEBUG Adding new IP address %s. Updating old IP address %s to new IP address %s.
Unified Services Router User Manual Facility: Local0 (Wireless) Log Message (node=%s) setting %s to val = %d Custom wireless event: '%s' Wireless event: cmd=0x%x len=%d New Rogue AP (%02x:%02x:%02x:%02x:%02x:%02x) detected WPS session in progress, ignoring enrolle assoc request Severity DEBUG DEBUG DEBUG Log Message sqlite3QueryResGet failed sqlite3QueryResGet failed VAP(%s) set beacon interval failed Severity ERROR ERROR ERROR DEBUG VAP(%s) set DTIM interval failed ERROR DEBUG ERROR ran query %s
Unified Services Router Got PNAC_EVENT_PREAUTH_SUCCESS event for : %s event for non-existent node %s PNAC_EVENT_EAPOL_START event received PNAC_EVENT_EAPOL_LOGOFF event received PNAC_EVENT_REAUTH event received PNAC_EVENT_AUTH_SUCCESS event received PNAC_EVENT_PORT_STATUS_CHAN GED event received unsupported event %d from PNAC event for non-existent node %s. Create new node.
Unified Services Router sending EAPOL pdu to PNAC... creating pnac authenticator with values %d %d - %s Profile %s does not exist IAPP initialized.
Unified Services Router pnacRecvRtn: no corresponding pnac port pae found sending unicast key User Manual DEBUG DEBUG umiIoctl(UMI_COMP_IAPP,%d) failed Invalid IE.
Unified Services Router from pnacRecvMapi: pkt body len = %d, pktType = %d from pnacPDUProcess: received PNAC_EAP_PACKET User Manual from pnacPDUProcess: received " DEBUG from pnacPDUProcess: received " from pnacPDUProcess: received PNAC_EAPOL_KEY_PACKET DEBUG doing pnacTxCannedFail DEBUG doing pnacTxCannedSuccess doing pnacTxReqId DEBUG DEBUG doing pnacTxReq DEBUG doing pnacTxStart DEBUG doing pnacTxLogoff DEBUG doing pnacTxRspId: 1st cond DEBUG doing pnacTxRspId: entering 2nd cond from p
Unified Services Router from pnacBackAuthFail: calling pnacTxCannedFail %s returned ERROR pnacUmiIoctlHandler: cmd: %s(%d) %s not configured for 802.1x could not process PDU received from the wire pnacPDUForward: failed to foward the received PDU Creating PHY port with AUTH backend : %s SendRtn: %p RecvRtn:%p pnacUmiAuthConfig: %s not configured for 802.
Unified Services Router User Manual phyPort:%s pnacPortPaeDeconfig:kpnacPortPaeDec onfig failed pnacPortPaeDeconfig:kpnacPortPaeDec onfig failed WARN WARN pnacBackAuthSuccess: failed to notify the destination " WARN could not initialize MGMT framework ERROR umiInit failed ERROR iappInit failed ERROR could not initialize IAPP MGMT. ERROR dot11Malloc failed ERROR buffer length not specified Invalid length(%d) specified Failed to get information about authorized AP list.
Unified Services Router Failed to initiate PBC based enrolle association Invalid association mode.
Unified Services Router User Manual Invalid Cipher type %d Profile supports WEP stas,Group cipher must be WEP ERROR Profile %s does not exist ERROR Profile %s does not exist ERROR Profile %s does not exist invalid pairwise cipher type %d ERROR ERROR Cipher %s is already in the list. ERROR Profile %s does not exist ERROR Invalid Cipher type %d ERROR Cipher %s not found in the list.
Unified Services Router User Manual Error in executing DB update handler ERROR sqlite3QueryResGet failed ERROR: incomplete DB update information. old values result does not contain 2 rows ERROR ERROR ERROR sqlite3QueryResGet failed ERROR Error in executing DB update handler ERROR sqlite3QueryResGet failed.Query:%s ERROR sqlite3QueryResGet failed.Query:%s ERROR sqlite3QueryResGet failed.Query:%s ERROR sqlite3QueryResGet failed.
Unified Services Router User Manual Invalid config data ERROR Facility: Kernel Log Message DNAT: multiple ranges no longer supported DNAT: Target size %u wrong for %u ranges, DNAT: wrong table %s, tablename DNAT: hook mask 0x%x bad, hook_mask %s%d: resetting MPPC/MPPE compressor, Severity Log Message Severity DEBUG %s: %s%s:%d -> %s:%d %s, DEBUG DEBUG %s: %s%s:%d %s, %s: Failed to add WDS MAC: %s, dev>name, %s: Device already has WDS mac address attached, %s: Added WDS MAC: %s, dev>name, DEBUG
Unified Services Router User Manual %s%d: bad sequence number: %d, expected: %d, DEBUG PPPIOCDETACH file->f_count=%d, PPP: outbound frame not passed PPP: VJ decompression error PPP: inbound frame not passed PPP: reconstructed packet PPP: no memory for missed pkts %u..
Unified Services Router %s: mac_del %02X:%02X:%02X:%02X:%02X:%02X, dev->name, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5] %s: mac_kick %02X:%02X:%02X:%02X:%02X:%02X, dev->name, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5] %s: mac_undefined %02X:%02X:%02X:%02X:%02X:%02X, dev->name, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5] %s: addr_add %02X:%02X:%02X:%02X:%02X:%02X, dev->name, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5] %s: addr_del %02X:%02X:%02X:%02X:%02X:%02X, dev->nam
Unified Services Router %s: flow dst=%s, __FUNCTION__, XFRMSTRADDR(fl->fl6_dst, family) %s: flow src=%s, __FUNCTION__, XFRMSTRADDR(fl->fl6_src, family) a guy asks for address mask. Who is it? icmp v4 hw csum failure) expire>> %u %d %d %d, expire, expire++ %u %d %d %d, expire, rt_cache @%02x: %u.%u.%u.%u, hash, rt_bind_peer(0) @%p, NET_CALLER(iph) ip_rt_advice: redirect to ip_rt_bug: %u.%u.%u.%u -> %u.%u.%u.%u, %s, UDP: short packet: From %u.%u.%u.%u:%u %d/%d to %u.%u.%u.%u:%u, UDP: bad checksum. From %d.%d.
Unified Services Router User Manual ip_rt_bug: %u.%u.%u.%u -> %u.%u.%u.%u, %s, UDP: short packet: From %u.%u.%u.%u:%u %d/%d to %u.%u.%u.%u:%u, UDP: bad checksum. From %d.%d.%d.%d:%d to %d.%d.%d.%d:%d ulen %d, REJECT: ECHOREPLY no longer supported. ipt_rpc: only valid for PRE_ROUTING, FORWARD, POST_ROUTING, LOCAL_IN and/or LOCAL_OUT targets. DEBUG ip_nat_init: can't setup rules. ip_nat_init: can't register in hook. DEBUG DEBUG ip_nat_init: can't register out hook.
Unified Services Router User Manual ipt_time unloaded ip_conntrack_irc: max_dcc_channels must be a positive integer ip_conntrack_irc: ERROR registering port %d, DEBUG ip_nat_h323: ip_nat_mangle_tcp_packet ip_nat_h323: ip_nat_mangle_udp_packet DEBUG ip_nat_h323: out of expectations DEBUG ip_nat_h323: out of RTP ports DEBUG ip_nat_h323: out of TCP ports ip_nat_q931: out of TCP ports DEBUG DEBUG ip_nat_ras: out of TCP ports ip_nat_q931: out of TCP ports ip_conntrack_core: Frag of proto %u.
Unified Services Router User Manual RES=0x%02x , (u8)(ntohl(tcp_flag_word(th) & TCP_RESERVED_BITS) >> 22) URGP=%u , ntohs(th->urg_ptr) DEBUG DEBUG TRUNCATED DEBUG %02X, op[i] DEBUG PROTO=UDP DEBUG INCOMPLETE [%u bytes] , DEBUG SPT=%u DPT=%u LEN=%u , DEBUG SPT=%u DPT=%u LEN=%u , PROTO=ICMP DEBUG DEBUG INCOMPLETE [%u bytes] , TYPE=%u CODE=%u , ich->type, ich>code DEBUG INCOMPLETE [%u bytes] , DEBUG ID=%u SEQ=%u , DEBUG PARAMETER=%u , DEBUG GATEWAY=%u.%u.%u.
Unified Services Router %02x%c, *p, NAT: no longer support implicit source local NAT NAT: packet src %u.%u.%u.%u -> dst %u.%u.%u.
Unified Services Router %02X, ((unsigned char *) m>msg_iov[i].iov_base)[j] %02X, skb->data[i] _lvl PPPOL2TP: _fmt, ##args %02X, ptr[length] %02X, ((unsigned char *) m>msg_iov[i].iov_base)[j] %02X, skb->data[i] KERN_EMERG THE value read is %d,value*/ KERN_EMERG Factory Reset button is pressed KERN_EMERG Returing error in INTR registration KERN_EMERG Initialzing Factory defaults modules Failed to allocate memory for pSipListNode SIPALG: Memeory allocation failed for pSipNodeEntryTbl pkt-err %s, pktInfo.
Unified Services Router User Manual const char *descr, krb5_keyblock *k) { test key, key DEBUG DEBUG pre-hashed key, key const char *descr, krb5_keyblock *k) { DEBUG DEBUG 128-bit AES key,&dk DEBUG 256-bit AES key, &dk WARNING: bwMonMultipathNxtHopSelect:: checking rates hop :%d dev:%s usableBwLimit = %d currBwShare = %d lastHopSelected = %d weightedHopPrefer = %d , DEBUG DEBUG %s: driver unloaded, dev_info %s: driver unloaded, dev_info wlan: %s backend registered, be>iab_name wlan: %s backend unr
Unified Services Router User Manual Failed to set AES encrypt key DEBUG Failed to set AES encrypt key DEBUG Failed to set AES encrypt key DEBUG Failed to set DES encrypt key[%d], i DEBUG Failed to set DES decrypt key[%d], i Failed to set DES encrypt key[%d], i Failed to set DES decrypt key[%d], i Failed to set DES encrypt key DEBUG DEBUG DEBUG DEBUG Failed to set DES decrypt key DEBUG Failed to set DES encrypt key DEBUG DEBUG DEBUG DEBUG mark: only supports 32bit mark DEBUG ipt_time: inva
Unified Services Router User Manual md5HardTest(0) ? Failed : Passed >natport) AES Software Test: %d iterations, iter DEBUG ** skb len %d, dlen %d,(*pskb)->len, AES Software Test Duration: %d:%d, DEBUG ********** Non linear skb AES Hardware Test: %d iterations, iter DEBUG End of sdp %p, nexthdr AES Hardware Test Duration: %d:%d, DEBUG %s: unknown pairwise cipher %d, 3DES Software Test: %d iterations, iter DEBUG %s: unknown group cipher %d, 3DES Software Test Duration: %d:%d, DEBUG %s: u
Unified Services Router User Manual %x REG Size == 64 Bit >sc_curmode DEBUG %u.%u.%u.%u sent an invalid ICMP REG Size is not in 8/16/32/64 Written Value = %x ::: At Page = %x : Addr = %x DEBUG dst cache overflow DEBUG Neighbour table overflow. bcm_ioctl :Unknown Ioctl Case : DEBUG host %u.%u.%u.%u/if%d ignores DEBUG martian destination %u.%u.%u.%u from DEBUG martian source %u.%u.%u.%u from DEBUG ll header: DEBUG %u.%u.%u.
Unified Services Router Error in ADD- no node available %s(): Channel capabilities do not match, chan flags 0x%x, %s: cannot map channel to mode; freq %u flags 0x%x, ic_get_currentCountry not initialized yet Country ie is %c%c%c, %s: wrong state transition from %d to %d, %s: wrong state transition from %d to %d, %s: wrong state transition from %d to %d, %s: wrong state transition from %d to %d, %s: wrong state transition from %d to %d, %s: wrong state transition from %d to %d, ieee80211_deliver_l2uf: no buf
Unified Services Router User Manual Adding entry for ifmedia_set: no match for 0x%x/0x%x, ifmedia_set: target ifmedia_set: setting to ifmedia_ioctl: switching %s to , dev>name ifmedia_match: multiple match for DEBUG DEBUG desc->ifmt_string DEBUG DEBUG mode %s, desc->ifmt_string DEBUG DEBUG %s, desc->ifmt_string %s%s, seen_option++ ? , : , %s%s, seen_option++ ? , : , DEBUG DEBUG DEBUG %s, seen_option ? > : DEBUG %s: %s, dev->name, buf %s: no memory for sysctl ta
Unified Services Router PKTLOG_TAG %s:allocation failed for pl_info, __FUNCTION__ PKTLOG_TAG %s:allocation failed for pl_info, __FUNCTION__ PKTLOG_TAG %s: create_proc_entry failed for %s, PKTLOG_TAG %s: sysctl register failed for %s, PKTLOG_TAG %s: page fault out of range, __FUNCTION__ PKTLOG_TAG %s: page fault out of range, __FUNCTION__ PKTLOG_TAG %s: Log buffer unavailable, __FUNCTION__ PKTLOG_TAG Logging should be disabled before changing bufer size %s:allocation failed for pl_info, __func__ %s: Unable t
Unified Services Router %s: unable to start recv logic, __func__ %s: unable to start recv logic, __func__ %s: unable to reset hardware; hal status %u, hardware error; reseting rx FIFO overrun; reseting %s: During Wow Sleep and got BMISS, __func__ AC\tRTS \tAggr Scaling\tMin Rate(Kbps)\tHBR \tPER LOW THRESHOLD BE\t%s\t\t%d\t%6d\t\t%s\t%d, BK\t%s\t\t%d\t%6d\t\t%s\t%d, VI\t%s\t\t%d\t%6d\t\t%s\t%d, VO\t%s\t\t%d\t%6d\t\t%s\t%d, --%d,%p,%lu:0x%x 0x%x 0x%p 0x%x 0x%x 0x%x 0x%x, bb state: 0x%08x 0x%08x, bbstate(sc,
Unified Services Router User Manual Radar found on channel %d (%d MHz), End of DFS wait period %s error allocating beacon, __func__ failed to allocate UAPSD QoS NULL tx descriptors: %d, error failed to allocate UAPSD QoS NULL wbuf %s: unable to allocate channel table, __func__ %s: unable to update h/w beacon queue parameters, ALREADY ACTIVATED %s: missed %u consecutive beacons, %s: busy times: rx_clear=%d, rx_frame=%d, tx_frame=%d, __func__, rx_clear, rx_frame, tx_frame %s: unable to obtain busy times, __
Unified Services Router User Manual MAX_NUM_PATTERN Pattern added to entry %d ,i Remove wake up pattern mask = %p pat = %p ,maskBytes,patternBytes mask = %x pat = %x ,(u_int32_t)maskBytes, (u_int32_t)patternBytes Pattern Removed from entry %d ,i DEBUG DEBUG Error : Pattern not found DEBUG PPM STATE ILLEGAL %x %x, forcePpmStateCur, afp->forceState FORCE_PPM %4d %6.6x %8.8x %8.8x %8.8x %3.3x %4.
Unified Services Router User Manual %p , buf axq_q: %s: unable to reset hardware; hal status %u, __func__, status DEBUG DEBUG ****ASSERTION HIT**** MacAddr=%s, DEBUG DEBUG TxBufIdx=%d, i DEBUG Tid=%d, tidno AthBuf=%p, tid->tx_buf[i] %s: unable to reset hardware; hal status %u, %s: unable to reset hardware; hal status %u, DEBUG DEBUG %s: unable to start recv logic, DEBUG _fmt, __VA_ARGS__ \ sample_pri=%d is a multiple of refpri=%d, sample_pri, refpri ===========ft>ft_numfilters=%u===========, ft>
Unified Services Router User Manual Can't allocate memory for ath_vap. DEBUG Unable to add an interface for ath_dev.
Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Europe – EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of conformity with the essential requirements of the R&TTE Directive 1999/5/EC: - EN 60950-1: 2006+A11:2009 Safety of information technology equipment - EN 300 328 V1.7.
Česky [Czech] [D-Link Corporation] tímto prohlašuje, že tento [DSR-500N] je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES. Dansk [Danish] Undertegnede [D-Link Corporation] erklærer herved, at følgende udstyr [DSR-500N] overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF.
Português [Portuguese] [D-Link Corporation] declara que este [DSR-500N]está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE. Slovensko [Slovenian] [D-Link Corporation] izjavlja, da je ta [DSR-500N] v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/ES. Slovensky [Slovak] [D-Link Corporation] týmto vyhlasuje, že [DSR-500N] spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES.