Академический Документы
Профессиональный Документы
Культура Документы
Ver. 1.05
Small Business Gateway Solution
User Manual
Unified Services Router
D-Link Corporation
Copyright 2012.
http://www.dlink.com
User Manual
User Manual
DSR-150 / 150N /250 / 250N / DSR-500 / 500N / 1000 / 1000N
Unified Services Router
Version 1.05
Co p y rig h t 2012
Copyright Notice
Th is p u b licat io n , in clu d in g all p h o t o g rap h s , illu s t rat io n s an d s o ft ware, is p ro t ect ed u n d er
in t ern at io n al co p y rig h t laws , wit h all rig h t s res erv ed . Neit h er t h is man u al, n o r an y o f t h e
mat erial co n t ain ed h erein , may b e rep ro d u ced wit h o u t writ t en co n s en t o f t h e au t h o r.
Disclaimer
Th e in fo rmat io n in t h is d o cumen t is s ubject t o ch ange wit h o ut n o tice. Th e man u fact u rer makes
n o rep res ent at ions o r warran t ies wit h res p ect t o t h e co n t en t s h ereo f an d s p ecifically d is claim
an y imp lied warran t ies o f merch an t ab ilit y o r fit n es s fo r an y p art icu lar p u rp o s e. Th e
man u fact u rer res erv es t h e rig h t t o rev is e t h is p u b licat io n an d t o make ch an g es fro m t ime t o
t ime in t h e co n t ent h ereof wit h o ut o b lig at ion o f t h e man u factu rer t o n o t ify an y p ers o n o f s u ch
rev is io n o r ch an g es .
Limitations of Liability
UNDER NO CIRCUM STA NCES SHA LL D -LINK OR ITS SUPPLIERS BE LIA BLE FOR
DA M A GES OF A NY CHA RA CTER (E.G. DA M A GES FOR LOSS OF PROFIT, SOFTW A RE
RESTORA TION, W ORK STOPPA GE, LOSS OF SA VED DA TA OR A NY OTHER
COM M ERCIA L DA M A GES OR LOSSES) RESULTING FROM THE A PPLICA TION OR
IM PROPER USE OF THE D-LINK PRODUCT OR FA ILURE OF THE PRODUCT, EVEN IF
D-LINK IS INFORM ED OF THE POSSIBILITY OF SUCH DA M A GES. FURTHERM ORE, DLINK W ILL NOT BE LIA BLE FOR THIRD -PA RTY CLA IM S A GA INST CUSTOM ER FOR
LOSSES OR DA M A GES. D-LINK W ILL IN NO EVENT BE LIA BLE FOR A NY DA M A GES
IN EXCESS OF THE A M OUNT D -LINK RECEIVED FROM THE END-USER FOR THE
PRODUCT.
User Manual
Table of Contents
Chapter 1. Introduction.......................................................................................................................................... 11
1.1
About this User Manual .................................................................................................... 12
1.2
Typographical Conventions ............................................................................................. 12
Chapter 2. Configuring Your Network: LAN Setup ...................................................................................... 13
2.1
LAN Configuration .............................................................................................................. 13
2.1.1 LAN DHCP Reserved IPs ................................................................................................ 16
2.1.2 LAN DHCP Leas ed Clients.............................................................................................. 17
2.1.3 LAN Configuration in an IP v6 Network ........................................................................ 18
2.1.4 Configuring IP v6 Router Advertisements ................................................................... 21
2.2
VLAN Configuration ........................................................................................................... 23
2.2.1 Associating VLANs to ports ............................................................................................. 24
2.2.2 Multiple VLA N Subnets ..................................................................................................... 26
2.2.3 VLAN configuration ............................................................................................................ 27
2.3
2.4
2.5
2.6
3.4
3.4.1
3.4.2
3.4.3
3.5
3.5.1
3.5.2
3.5.3
3.5.4
3.5.5
3.5.6
3.5.7
3.6
3.7
3.8
User Manual
4.5
4.6
4.7
WMM ....................................................................................................................................... 79
Wireless distribution system (WDS) ............................................................................. 80
Advanced Wireless Settings ........................................................................................... 81
4.8
5.4
5.4.1
5.5
5.6
5.7
5.8
5.9
5.9.1
5.9.2
5.9.3
5.9.4
5.10
5.11
5.12
6.4
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
User Manual
9.4
9.4.1
9.4.2
9.4.3
9.5
9.6
9.7
9.8
9.9
9.9.1
9.9.2
9.9.3
9.9.4
9.10
User Manual
11.4
User Manual
List of Figures
Figure 1: Setup page for LA N TCP/IP settings ................................................................................................. 15
Figure 2: LAN DHCP Reserved IPs ..................................................................................................................... 17
Figure 3: LAN DHCP Leased Clients ................................................................................................................... 18
Figure 4: IP v6 LA N and DHCP v6 configuration ............................................................................................... 19
Figure 5: Configuring the Router Advertisement Daemon ........................................................................... 22
Figure 6: IP v6 Advertisement Prefix settings .................................................................................................... 23
Figure 7: Adding VLAN memberships to the LAN ........................................................................................... 24
Figure 8: Port VLAN list ............................................................................................................................................ 25
Figure 9: Configuring VLAN membership for a port........................................................................................ 26
Figure 10: Multiple VLAN Subnets........................................................................................................................ 27
Figure 11: VLA N Configuration .............................................................................................................................. 28
Figure 12: DMZ configuration ................................................................................................................................. 29
Figure 13: UP nP Configuration .............................................................................................................................. 30
Figure 14: Active Runtime sessions ..................................................................................................................... 32
Figure 15: Captive Port al Setup............................................................................................................................. 33
Figure 16: Customized Captive Portal Setup .................................................................................................... 34
Figure 17: Internet Connection Setup Wizard ................................................................................................... 35
Figure 18: Manual WAN configuration ................................................................................................................. 38
Figure 19: PPPoE configuration for standard ISPs ......................................................................................... 39
Figure 20: WAN configuration for Japanese Multiple PPPoE (part 1) ...................................................... 40
Figure 21: WAN configuration for Multiple PPPoE (part 2) .......................................................................... 41
Figure 22: Russia L2TP ISP configuration ......................................................................................................... 42
Figure 23: Russia Dual access PPPoE configuration .................................................................................... 43
Figure 24: IP v6 WAN Setup page ......................................................................................................................... 44
Figure 25: Connection Status information for both WAN ports ................................................................... 46
Figure 26: List of Configured Bandwidth Profiles ............................................................................................ 47
Figure 27: Bandwidth Profile Configuration page ............................................................................................ 48
Figure 28: Traffic Selector Configuration ............................................................................................................ 49
Figure 29: Load Balancing is available when multiple WAN ports are configured and Protocol
Bindings have been defined ............................................................................................................... 52
Figure 30: Protocol binding setup to associate a service and/or LAN source to a WAN and/or
destination network ................................................................................................................................ 53
Figure 31: Routing Mode is used to configure traffic routing between WAN and LAN, as well as
Dynamic routing (RIP) .......................................................................................................................... 55
Figure 32: Static route configuration fields......................................................................................................... 58
User Manual
User Manual
Figure 65: Two trusted domains added to the Approved URLs List ....................................................... 104
Figure 66: One keyword added to the block list ............................................................................................. 105
Figure 67: Export Approved URL list ................................................................................................................. 106
Figure 68: The following example binds a LAN hosts MAC Address to an IP address served by
DSR. If there is an IP/MAC Binding violation, the violating packet will be dropped and
logs will be capt ured............................................................................................................................ 107
Figure 69: Intrusion Prevention features on the router ................................................................................ 108
Figure 70: Protecting the router and LAN from internet attacks ............................................................... 109
Figure 71: Example of Gateway-to-Gateway IPsec VPN tunnel using two DSR routers connected
to the Internet......................................................................................................................................... 111
Figure 72: Example of three IPsec client connections to the internal network through the DSR
IPsec gateway ....................................................................................................................................... 112
Figure 73: VPN Wizard launch screen .............................................................................................................. 113
Figure 74: IPsec policy configuration ................................................................................................................. 116
Figure 75: IPsec policy configuration continued (Auto policy via IKE) ................................................... 117
Figure 76: IPsec policy configuration continued (Auto / Manual Phas e 2) ........................................... 119
Figure 77: PP TP tunnel configuration PP TP Client................................................................................... 121
Figure 78: PP TP VPN connection status.......................................................................................................... 121
Figure 79: PP TP tunnel configuration PP TP Server ................................................................................. 122
Figure 80: L2TP tunnel configuration L2TP Server................................................................................... 123
Figure 81: OpenVP N configuration ..................................................................................................................... 125
Figure 82: OpenVP N Remote Network ............................................................................................................. 126
Figure 83: OpenVP N Authentication .................................................................................................................. 127
Figure 84: Example of clientless SSL VPN connections to the DS R ...................................................... 130
Figure 85: List of groups ......................................................................................................................................... 131
Figure 86: User group configuration ................................................................................................................... 132
Figure 87: SSLVPN Settings................................................................................................................................. 133
Figure 88: Group login policies options ............................................................................................................. 134
Figure 89: Browser policies options ................................................................................................................... 135
Figure 90: IP policies options................................................................................................................................ 136
Figure 91: A vailable Users with login status and associated Group ....................................................... 137
Figure 92: User configuration options ................................................................................................................ 138
Figure 93: List of SSL VPN polices (Global filter) .......................................................................................... 139
Figure 94: SSL VPN policy configuration ......................................................................................................... 140
Figure 95: List of configured resources, which are available to assign to SSL VPN policies ........ 142
Figure 96: List of A vailable Applications for SSL Port Forwarding .......................................................... 144
Figure 97: SSL VPN client adapter and access configuration .................................................................. 145
User Manual
Figure 98: Configured client routes only apply in split tunnel mode........................................................ 146
Figure 99: List of configured SSL VPN portals. The configured portal can then be associated with
an aut hentication domain .................................................................................................................. 147
Figure 100: SSL VPN Portal configuration ....................................................................................................... 149
Figure 101: USB Device Detection ..................................................................................................................... 151
Figure 102: USB SharePort................................................................................................................................... 152
Figure 103: SMS Service Send SMS ............................................................................................................. 153
Figure 104: SMS Service Receive SMS ....................................................................................................... 154
Figure 105: Certificate summary for IPsec and HTTPS management ................................................... 155
Figure 106: Advanced Switch Settings.............................................................................................................. 156
Figure 107: User Login policy configuration .................................................................................................... 157
Figure 108: Admin Settings ................................................................................................................................... 158
Figure 109: Remote Management from the WAN ......................................................................................... 159
Figure 110: SNMP Users, Traps, and Access Control ................................................................................ 160
Figure 111: SNMP system information for this router .................................................................................. 161
Figure 112: Date, Time, and NTP server setup ............................................................................................. 162
Figure 113: Facility settings for Logging ........................................................................................................... 164
Figure 114: Log configuration options for traffic through router ................................................................ 166
Figure 115: IP v6 Log configuration options for traffic through router ..................................................... 167
Figure 116: E-mail configuration as a Remote Logging option ................................................................. 168
Figure 117: Syslog server configuration for Remote Logging (continued)............................................ 169
Figure 118: VPN logs displayed in GUI event viewer .................................................................................. 170
Figure 119: Restoring configuration from a saved file will result in the current configuration being
overwritten and a reboot .................................................................................................................... 171
Figure 120: Firmware version information and upgrade option ................................................................ 172
Figure 121: Firmware upgrade and configuration restore/backup via USB .......................................... 173
Figure 122: Dynamic DNS configuration .......................................................................................................... 174
Figure 123: Router diagnostics tools available in the GUI ......................................................................... 175
Figure 124: Sample trace route out put .............................................................................................................. 176
Figure 125: Localization ......................................................................................................................................... 177
Figure 126: Device Status display ...................................................................................................................... 179
Figure 127: Device Status display (continued) ............................................................................................... 180
Figure 128: Resource Utilization statistics ....................................................................................................... 181
Figure 129: Resource Utilization data (continued) ........................................................................................ 182
Figure 130: Resource Utilization data (continued) ........................................................................................ 183
Figure 131: Physical port statistics ..................................................................................................................... 184
User Manual
10
User Manual
Chapter 1. Introduction
D-Lin k Un ified Serv ices Ro u t ers o ffer a s ecu re, h ig h p erforman ce n et wo rkin g s o lu t io n
t o ad d ress t h e g rowin g n eed s o f s mall an d med iu m b u s in es s es . In t eg rat ed h ig h -s p eed
IEEE 802.11n an d 3G wireles s t ech n o lo g ies o ffer co mp arab le p erfo rman ce t o
t rad it io n al wired n et wo rks , b u t wit h fewer limit at io n s . Op t imal n et wo rk s ecu rit y is
p ro v id ed v ia feat u res s u ch as v irt u al p riv at e n et wo rk (VPN) t u n n els , IP Secu rit y
(IPs ec ), Po in t -t o -Poin t Tu n nelin g Pro t ocol (PPTP), Lay er 2 Tu n n elin g Pro t ocol (L2TP),
an d Secu re So cket s Lay er (SSL). Emp o wer y o u r ro ad warrio rs wit h clien t les s remo t e
acces s an y wh ere an d an y t ime u s in g SSL VPN t u n n els .
W it h t h e D-Lin k Un ified Serv ices Ro u t er y o u are ab le t o exp erien ce a d iv ers e s et o f
b en efit s :
User Manual
Imp o rt an t n o t e
12
Pas s wo rd : admi n
User Manual
1. In the LAN Setup page, enter the following information for your router:
Primary an d Seco n d ary DNS s erv ers : If co n fig u red d o main n ame s y s t em
(DNS) s erv ers are av ailab le o n t h e LA N en t er t h eir IP ad d res s es h ere.
14
User Manual
15
User Manual
16
User Manual
17
User Manual
LAN Settings
Th e d efau lt IPv 6 LA N ad d ress fo r t h e ro u ter is fec0 ::1 . Yo u can ch ang e t h is 128 b it
IPv 6 ad d res s b ased o n y o ur n et wo rk req u iremen t s . Th e o t h er field t h at d efin es t h e
LA N s et t in g s fo r t h e ro u t er is t h e p refix len g t h . Th e IPv 6 n et wo rk (s u b n et ) is
id en t ified b y t h e in it ial b it s o f t h e ad d res s called t h e p refix. By d efau lt t h is is 6 4
b it s lo n g . A ll h o s ts in t h e n etwo rk h av e co mmo n in it ial b it s fo r t h eir IPv 6 ad d res s ;
t h e n u mb er o f co mmo n in it ial b it s in t h e n et wo rks ad d res s es is s et b y t h e p refix
len g t h field .
18
User Manual
19
User Manual
Th e DNS s erv er d et ails can b e man u ally en t ered h ere (p rimary / s eco n d ary
o p t io n s . A n alt ern at iv e is t o allo w t h e LA N DHCP clien t t o receiv e t h e DNS
s erv er d et ails fro m t h e ISP d irect ly . By s elect in g Us e DNS p ro xy , t h is ro u t er
act s as a p ro xy fo r all DNS req u es t s an d co mmu n icat es wit h t h e ISPs DNS
s erv ers (a W A N co n fig u ra t io n p aramet er).
Primary an d Seco n d ary DNS s erv ers : If t h ere is co n fig u red d o main n ame
s y s t em (DNS) s erv ers av ailab le o n t h e LA N en t er t h e IP ad d res s es h ere.
Prefix Delegation
Th e fo llo win g s et t in g s are u s ed t o co n fig u re t h e Prefix Deleg at io n :
20
User Manual
RADVD
Advanced > IPv6 > IPv6 LAN > Router Advertisement
To s u p p ort s tateless IPv 6 au t o co nfig uratio n o n t h e LA N, s et t h e RA DVD s t at u s t o
En ab le. Th e fo llo win g s et t in g s are u s ed t o co n fig u re RA DVD:
A d v ert ise In t erv al: W h en ad vert isemen ts are u n s o licit ed mu lt icas t p acket s ,
t h is in t erv al s et s t h e maximu m t ime b et ween ad v ert is emen t s fro m t h e
in t erface. Th e act u al d u rat io n b et ween ad v ert is emen t s is a ran d o m v alu e
b et ween o n e t h ird o f t h is field an d t h is field . Th e d efau lt is 30 s eco n d s .
Ro u t er Preferen ce : t h is
21
User Manual
Advertisement Prefixes
Advanced > IPv6 > IPv6 LAN > Advertisement Prefixes
Th e ro u t er ad v ert isemen ts co nfig ured wit h ad v ert is emen t p refixes allo w t h is ro u t er
t o in fo rm h o s t s h o w t o p erfo rm s t at eles s ad d res s au t o co n fig u rat io n . Ro u t er
ad v ert is emen ts co n t ain a lis t o f s u b n et p refixes t h at allo w t h e ro u t er t o d et ermin e
n eig h b o u rs an d wh et h er t h e h o s t is o n t h e s ame lin k as t h e ro u t er .
Th e fo llo win g p refix o p t io n s are av ailab le fo r t h e ro u t er ad v ert is emen t s :
22
User Manual
User Manual
User Manual
Co n fig u red
will b e
d is p lay ed
on
t h e VLA N
25
User Manual
26
User Manual
27
User Manual
28
User Manual
Figure 12 : DM Z configuratio n
29
User Manual
30
User Manual
31
User Manual
32
User Manual
33
User Manual
34
User Manual
35
User Manual
PPPo E Pro file Name. Th is men u lis t s co n fig u red PPPo E p ro files , p art icu larly
u s efu l wh en co n fig u rin g mu lt ip le PPPo E co n n ect i o n s (i.e. fo r Jap an ISPs t h at
h av e mu lt ip le PPPo E s u p p o rt ).
Us er Name
Pas s wo rd
M PPE En cry p t io n: Fo r PPTP lin ks , y o u r ISP may req u ire y o u t o en able M icro so ft
Po in t -t o -Po in t En cry p t io n (M PPE).
If s p lit t u n n el is en abled, DSR wo n t exp ect a d efau lt ro u t e fro m t h e ISP s erv er. In
s u ch case, u ser h as t o t ake care o f ro u t ing man u ally b y co nfig u ring t he ro u tin g from
St at ic Ro u t in g p ag e.
36
User Manual
3.2.3 DHCP W AN
Fo r DHCP clien t co n n ect io n s , y o u can ch o o s e t h e M A C ad d res s o f t h e ro u t er t o
reg is t er wit h t h e ISP. In s o me cas es y o u may n eed t o clo n e t h e LA N h o s t s M A C
ad d res s if t h e ISP is reg is t ered wit h t h at LA N h o s t .
37
User Manual
3.2.4 PPPoE
Setup > Internet Settings
Th e PPPo E ISP s et t in g s are d efin ed o n t h e W A N Co n fig u rat io n p age. Th ere are t wo
t y p es o f PPPo E ISPs s u p p o rt ed b y t h e DSR: t h e s t an d ard u s ern ame/ p as s wo rd
PPPo E an d Jap an M u lt ip le PPPo E.
38
User Manual
M o s t PPPo E ISPs u s e a s in g le co nt rol an d d ata co nnect ion , an d req u ire u s ern ame /
p as s wo rd cred en t ials t o lo g in an d au t h en t icat e t h e DSR wit h t h e ISP. Th e ISP
co n n ect io n t y p e fo r t h is cas e is PPPo E (Us ern ame/ Pas s wo rd ). Th e GUI will
p ro mp t y o u fo r au t h en ticatio n, s erv ice, an d co nnect io n s et tin gs in o rd er t o es t ab lis h
t h e PPPo E lin k.
Fo r s o me ISPs , mo s t p o p u lar in Jap an , t h e u s e o f Jap an es e M u lt ip le PPPo E is
req u ired in o rd er t o es t ablis h co n cu rren t p rimary an d s eco ndary PPPo E co n n ect io n s
b et ween t h e DSR an d t h e ISP. Th e Primary co n n ect ion is u s ed fo r t h e b u lk o f d at a
an d in t ern et t raffic an d t h e Seco n d ary PPPo E co n n ect io n carries ISP s p ecific (i.e.
co n t ro l) t raffic b et ween t h e DSR an d t h e ISP.
39
User Manual
Each s es sio n h as a DNS s erv er s ou rce fo r d o main n ame lo o ku p , t h is can b e assig ned b y
t h e ISP o r co n fig u red t h ro u g h t h e GUI
40
User Manual
W h en Jap anese mu lt ip le PPPo E is co n fig u red an d s eco ndary con nect ion is u p , so me p red efin ed
ro u t es are ad ded o n t hat in t erface. Th ese ro u tes are n eeded t o access t he in t ern al d o main o f t h e
ISP wh ere h e h o s t s v ario us s erv ices . Th es e ro u t es can ev en b e co n fig u red t h ro u g h t h e s t at ic
ro u t in g p ag e as well.
41
User Manual
42
User Manual
43
User Manual
Prefix Deleg at io n : Select t his o pt ion t o req uest ro ut er ad v ert isemen t p refix fro m an y
av ailab le DHCPv 6 s erv ers a vailab le o n t h e ISP, t h e o b tain ed p refix is u p d at ed t o t he
ad v ert is ed p refixes o n t h e LA N s id e. Th is o pt ion can b e s elect ed o n ly in St at es les s
A d d res s A u t o Co n fig u rat io n mo d e o f DHCPv 6 Clien t .
User Manual
A u t h ent icat ion Ty pe: Th e t y pe o f A u t hent icatio n in u se b y t he p ro file: A u to Neg o t iat e/ PA P/ CHA P/ M S-CHA P/ M S-CHA Pv 2.
Seco n d ary DNS Serv er: En t er a v alid s eco n d ary DNS Serv er IP A d d res s .
Co n n ect io n t y p e: Dy n amic IP o r St at ic IP
45
User Manual
46
User Manual
47
User Manual
Advanced > Advanced Network > Traffic Management > Traffic Selectors
On ce a p ro file h as b een creat ed it can t h en b e as s o ciat ed wit h a t raffic flo w fro m t h e
LA N t o W A N. To creat e a t raffic s elect o r, click A d d o n t h e Traffic Select o rs p ag e.
Traffic s elect or co n fig uratio n b in d s a b an d wid t h p ro file t o a t y p e o r s o u rce o f LA N
t raffic wit h t h e fo llo win g s et t in g s :
Custom Services p age. To h ave t h e p ro file ap p ly t o all s erv ices , s elec t A NY.
48
User Manual
49
User Manual
A u t o -Ro llo v er u s in g W A N p o rt
Failo v er Det ect io n Set tin gs: To ch eck co nn ectiv it y o f t h e p rimary in t ern et lin k, o n e
o f t h e fo llo win g failu re d et ect io n met h o d s can b e s elect ed :
50
User Manual
51
User Manual
User Manual
53
User Manual
54
User Manual
55
User Manual
56
User Manual
57
User Manual
3.5.4 OSPFv 2
Advanced > Routing > OSPF
OSPF is an in t erio r g at eway p ro t ocol t h at ro u tes In ternet Pro t o col (IP) p acket s s o lely
wit h in a s in g le ro u t ing d omain . It g at h ers lin k s t at e in fo rmat io n fro m av ailab le ro uters
an d co n s t ru ct s a t o p o lo g y map o f t h e n et wo rk.
OSPF v ers io n 2 is a ro u t in g p ro to co l wh ich d es crib ed in RFC2328 - OSPF Vers io n 2.
OSPF is IGP (In t erio r Gat eway Pro t o co ls ).OSPF is wid ely u s ed in larg e n et wo rks
s u ch as ISP b ackb o n e an d en t erp ris e n et wo rks .
58
User Manual
59
User Manual
3.5.5 OSPFv 3
Advanced > IPv6 > OSPF
Op en Sh o rt es t Pat h Firs t v ers io n 3 (OSPFv 3) s u p p o rt s IPv 6 . To en ab le an OSPFv 3
p ro ces s o n a ro u t er, y o u n eed t o en ab le t h e OS PFv 3 p ro ces s g lo b ally , as s ig n t h e
OSPFv 3 p ro ces s a ro u t er ID, an d en ab le t h e OSPFv 3 p ro ces s o n relat ed in t erfaces
60
User Manual
61
User Manual
62
User Manual
63
User Manual
64
User Manual
Do main n ame s erv ers (DNS) co n v ert In t ern et n ames s u ch as www.d lin k.co m, t o
IP ad d res s es t o ro u t e t raffic t o t h e co rrect res o u rces o n t h e In t ern et . If y o u
co n fig u re y o u r ro u t er t o g et an IP ad d res s d y n amically fro m t h e ISP, t h en y o u
n eed t o s p ecify t h e DNS s erv er s o u rce in t h is s ect io n .
Seco n d ary DNS Serv er: En t er a v alid s eco n d ary DNS Serv er IP A d d res s .
W A N: If t h is o p t io n is s elect ed , co n fig u re t h e W A N 3. Th e W A N M o d e
o p t io n s are n o w av ailab le as t h ere are t wo W A N p o rt s fo r t h e g at eway .
65
User Manual
Cellu lar 3G in t ern et acces s is av ailab le o n W A N 3 v ia a 3G USB mo d em fo r DSR1000 an d DSR-1000N. Th e cellu lar ISP t h at p ro v id es t h e 3G d at a p lan will p ro v id e
t h e au t h enticatio n req u iremen ts t o establis h a co n n ect io n . Th e d ial Nu mb er an d A PN
are s p ecific t o t h e cellu lar carriers . On ce t he co nnectio n t y pe s et t in g s are co n f ig u red
an d s av ed, n avig ate t o t h e W AN s t at us p age ( Setup > Internet Settings > WAN 3
Status ) an d En ab le t h e W A N3 lin k t o es t ab lis h t h e 3G co n n ect io n .
66
User Manual
67
User Manual
68
User Manual
69
User Manual
70
User Manual
4.2.1 W EP Security
If W EP is t h e ch o sen s ecurit y o pt ion , y ou mu s t s et a u n iq u e s t at ic key t o b e s h ared
wit h clien t s t h at wis h t o access t h is s ecu red wireles s n etwo rk. Th is s t at ic key can b e
g en erat e d fro m an eas y -to -rememb er p as sphrase and t h e s elected en cryp t io n len g t h .
71
User Manual
72
User Manual
73
User Manual
Th e Timeo u t an d Ret ries field s are u sed t o eit h er mo v e t o a s econ dary s erver
if t h e p rimary can n o t b e reached, o r t o g iv e u p t h e RA DIUS au t h en t icat io n
at t emp t if co mmu n icat io n wit h t h e s erv er is n o t p o s s ib le.
74
User Manual
75
User Manual
76
User Manual
77
User Manual
Th e rat ified 802.11n s u p po rt o n t h is rad io req uires s electin g t h e ap prop riate b ro adcast
(NA o r NG et c.) mo d e, an d t h en d efinin g t h e ch an n el s p acin g an d co n t ro l s id e b an d
fo r 802.11n t raffic. Th e d efau lt s et t in g s are ap p ro p riat e fo r mo s t n et wo rks . Fo r
examp le, ch an g in g t h e ch an n el s p acin g t o 40 M Hz can imp ro v e b an d wid t h at t h e
exp en s e o f s u p p o rt in g earlier 802.11n clien t s .
Th e av ailab le t ran smis sio n ch ann els are g o v ern ed b y reg u latory co nst rain t s b as ed o n
t h e reg io n s et t in g o f t h e ro u t er. Th e maximu m t ran s mis s io n p o wer is s imilarly
g o v ern ed b y reg u lat o ry limit s ; y o u h av e t h e o p t io n t o d ecreas e fro m t h e d efau lt
maximu m t o red u ce t h e s ig n al s t ren g t h o f t raffic o u t o f t h e rad io .
78
User Manual
4.5 WMM
Setup > Wireless Settings > WMM
W i-Fi M u lt imed ia (W M M ) p ro v id es b as ic Qu alit y o f s erv ice ( Qo S) feat u res t o IEEE
802.11 n et wo rks . W M M p rio rit izes t raffic accordin g t o fo u r A ccess Cat ego ries (A C) v o ice, v id eo , b es t effo rt , an d b ackg ro u n d .
Profi l e Name :
Th is field allo ws y o u t o s elect t h e a v ailab le p ro files in wireles s s et t in g s .
Enabl e WMM:
Th is field allo ws y o u t o en ab le W M M t o imp ro v e mu lt imed ia t ran s mis s io n .
Defaul t Cl as s Of S ervi ce :
Th is field allo ws y o u t o s elect t h e av ailab le A cces s Cat eg o ries (v o ice, v id eo , b es t
effo rt , an d b ackg ro u n d ).
79
User Manual
User Manual
81
User Manual
Pus h B utton Confi g urati on (PB C): fo r wireles s d ev ices t h at s u p p o rt PBC, p res s
an d h o ld d o wn o n t his b ut to n an d wit h in 2 min u t es click t h e PBC co n n ect b u t t o n .
Th e A P will d et ect t h e wireles s d ev ice an d es t ab lis h a lin k t o t h e clien t .
82
User Manual
83
Yo u can , fo r examp le, es t ab lis h res t rict ed -acces s p o licies b as ed o n t ime -o f-d ay , web
ad d res ses, an d web ad d ress key wo rd s . Yo u can b lo ck In t ern et acces s b y ap p licat io n s
an d s erv ices o n t h e LA N, s u ch as ch at ro o ms o r g ames . Yo u can b lo ck ju s t cert ain
g ro u p s o f PCs o n y o u r n et wo rk fro m b ein g acces s ed b y t h e W A N o r p u b lic DM Z
n et wo rk.
User Manual
A ll s ch ed ules will fo llo w t h e t ime in t h e ro u t ers con fig ured t ime zo n e. Refer t o t h e
s ect io n o n ch o o s in g y o u r Time Zo n e an d co n fig u rin g NTP s erv ers fo r mo re
in fo rmat io n .
86
User Manual
1. View the existing rules in the List of Available Firewall Rules table.
2. To edit or add an outbound or inbound services rule, do the following:
3. Chose the From Zone to be the source of originating traffic: either the secure LAN, public
DMZ, or insecure WAN. For an inbound rule WAN should be selected as the From Zone.
4. Choose the To Zone to be the destination of traffic covered by this rule. If the From Zone
is the WAN, the to Zone can be the public DMZ or secure LAN. Similarly if the From
Zone is the LAN, then the To Zone can be the public DMZ or insecure WAN.
87
User Manual
So u rce & Des t in at io n u sers: Fo r each relev an t cat ego ry, s elect t he u sers
t o wh ich t h e ru le ap p lies :
A n y (all u s ers )
6. Inbound rules can use Destination NAT (DNAT) for managing traffic from the WAN.
Destination NAT is available when the To Zone = DMZ or secure LAN.
User Manual
7. Outbound rules can use Source NAT (SNAT) in order to map (bind) all LAN/DMZ traffic
matching the rule parameters to a specific WAN interface or external IP address (usually
provided by your ISP).
On ce t h e n ew o r mo d ified ru le p aramet ers are s av ed , it ap p ears in t h e mas t er lis t o f
firewall ru les . To en ab le o r d is ab le a ru le, click t h e ch eckb o x n ext t o t h e ru le in t h e
lis t o f firewall ru les an d ch o o s e En ab le o r Dis ab le.
89
User Manual
90
User Manual
Figure 55 : The fire wal l rule configuratio n page allows you to de fine the
To/From zone , s e rvice , action, s che dule s , and s pe cify
s ource /de s tination IP addre s s e s as ne e de d.
91
User Manual
Figure 56 : The IPv6 fire wall rule configuratio n page allows you to de fine
the To/From zone , s e rvice , action, s che dule s , and s pe cify
s ource /de s tination IP addre s s e s as ne e de d.
92
User Manual
V alu e
From Zone
Insecure (WAN1/WAN2/WAN3)
To Zone
Public (DMZ)
Service
HTTP
Action
Destination Users
Any
Log
Never
93
User Manual
V alu e
From Zone
Insecure (WAN1/WAN2/WAN3)
To Zone
Secure (LAN)
Service
CU-SEEME:UDP
Action
192.168.10.11
Destination Users
Address Range
From
132.177.88.2
To
134.177.88.254
Yes (enabled)
W A N IP ad d res s : 10.1.0.118
Par am eter
V alu e
From Zone
Insecure (WAN1/WAN2/WAN3)
To Zone
Public (DMZ)
Service
HTTP
Action
Destination Users
Single Address
94
User Manual
10.1.0.52
x
WAN
a Users
m
Log
p
l e 4 : Blo c
Any
Never
1. Setup a schedule:
95
User Manual
2. Since we are trying to block HTTP requests, it is a service with To Zone: Insecure
(WAN1/WAN2/WAN3) that is to be blocked according to schedule Weekend.
96
User Manual
3. Select the Action to Block by Schedule, otherwise allow. This will take a predefined
schedule and make sure the rule is a blocking rule during the defined dates/times. All
other times outside the schedule will not be affected by this firewall blocking rule
5. We want to block the IP range assigned to the marketing group. Lets say they have IP
192.168.10.20 to 192.168.10.30. On the Source Users dropdown, select Address Range
and add this IP range as the from and To IP addresses.
6. We want to block all HTTP traffic to any services going to the insecure zone. The
Destination Users dropdown should be any.
7. We dont need to change default QoS priority or Logging (unless desired) clicking apply
will add this firewall rule to the list of firewall rules .
8. The last step is to enable this firewall rule. Select the rule, and click enable below the
list to make sure the firewall rule is active
97
User Manual
User Manual
the
99
User Manual
100
User Manual
User Manual
Th e ap p licat io n ru le s t atus p age will lis t an y act iv e ru les , i.e. in co min g p o rt s t h at are
b ein g t rig g ered b a s ed o n o u t b o u n d req u es t s fro m a d efin ed o u t g o in g p o rt .
102
User Manual
103
User Manual
104
User Manual
105
User Manual
106
User Manual
107
User Manual
108
User Manual
Figure 70 : Prote cting the route r and LAN from inte rne t attack s
109
User Manual
110
User Manual
Remo t e Clien t (clien t -t o -g at eway VPN t u n n el): A remo t e clien t in it iat es a VPN
t u n n el as t h e IP ad d res s o f t h e remo t e PC clien t is n o t kn o wn in ad v an ce. Th e
g at eway in t h is cas e act s as a res p o n d er.
Figure 71 : Example of Gate way-to - Gate way IPs e c VPN tunne l us ing two
DSR route rs conne cte d to the Inte rne t
111
User Manual
Figure 72 : Example of thre e IPs e c clie nt conne ctions to the inte rnal
ne twork through the DSR IPs e c gate way
112
User Manual
113
User Manual
2. Configure Remote and Local WAN address for the tunnel endpoints
3. Configure the Secure Connection Remote Accessibility fields to identify the remote
network:
Exchange Mode
ID Type
FQDN
Local WAN ID
Remote WAN ID
Encryption Algorithm
3DES
Authentication Algorithm
SHA-1
Authentication Method
Pre-shared Key
PFS Key-Group
24 hours
8 hours
114
User Manual
Par am eter
Exchange Mode
ID Type
FQDN
Local WAN ID
Remote WAN ID
Encryption Algorithm
3DES
Authentication Algorithm
SHA-1
Authentication Method
Pre-shared Key
PFS Key-Group
24 hours
NETBIOS
115
User Manual
116
User Manual
Th e VPN p o licy is o n e h alf o f t h e IKE/ VPN p o licy p air req u ired t o est ab lis h an A u t o
IPs ec VPN t u n n el. Th e IP ad d res s es o f t h e mach in e o r mach in es o n t h e t wo VPN
en d p o in ts are co nfig u red h ere, alo n g wit h t h e p o licy p aramet ers req u ired t o s ecure t he
t u n n el
Figure 75 : IPs e c policy configurat ion continue d (Auto policy via IKE)
User Manual
118
User Manual
119
User Manual
120
User Manual
121
User Manual
122
User Manual
123
User Manual
En cry p t io n A lg orit hm: Th e cip h er wit h wh ich t h e p ackets are en cry pt ed . Ex:
BF-CBC, A ES-128,A ES-192 an d A ES-256. BF-CBC is t h e d efau lt
Has h alg o rit h m: M es sage d ig est alg orit hm u s ed t o au t hen t icat e p acket s . Ex:
SHA 1, SHA 256 an d SHA 512. SHA 1 is t h e d efau lt .
En ab le Tls A u t h ent icat ion Key : En ab lin g t h is ad ds Tls au th ent icat io n wh ich
ad d s an ad dit io nal lay er o f au t henticatio n. Can b e ch ecked o n ly wh en t h e t ls
key is u p lo ad ed . Dis ab led b y d efau lt .
124
ad d res s
to
wh ich
the
clien t
User Manual
125
User Manual
126
User Manual
127
User Manual
Figure 84 : Example of clie ntle s s SSL VPN conne ctions to the DSR
130
User Manual
Click A d d t o creat e a g ro u p .
Click Ed it t o u p d at e an exis t in g g ro u p .
131
User Manual
132
User Manual
Log i n Pol i ci es
To s et lo g in p o licies fo r t h e g ro u p , s elect t h e co rres p o n d in g g ro u p click Lo g in
p o licies . Th e fo llo win g p aramet ers are co n fig u red :
133
User Manual
Den y Lo g in fro m Defin ed Bro ws ers : Th e lis t o f d efin ed b ro ws ers b elo w will
b e u s ed t o p revent t h e u sers o f t h is g ro up fro m lo g g in g in t o t h e ro u t ers GUI.
A ll n o n -d efin ed b ro ws ers will b e allo wed fo r lo g in fo r t h is g ro u p .
A llo w Lo g in fro m Defin ed Bro ws ers : Th e lis t o f d efin ed b ro ws ers b elo w will
b e u s ed t o allo w t h e u s ers o f t h is g ro u p fro m lo g g in g in t o t h e ro u t ers GUI.
A ll n o n -d efin ed b ro ws ers will b e d en ied fo r lo g in fo r t h is g ro u p .
Defin ed Bro ws ers :Th is lis t d is plays t h e web b ro ws ers t h at h ave b een add ed t o
t h e Defin ed Bro ws ers lis t , u p o n wh ich g ro u p lo g in p o licies can b e d efin ed .
(Ch eck Bo x A t Firs t Co lu mn Head er): Select s all t h e d efin ed b ro ws ers in t h e
t ab le.
Yo u can ad d t o t h e lis t o f Defin ed Bro ws ers b y s elect ing a clien t b ro wser fro m the
d ro p d o wn men u an d clickin g A d d. Th is b rows er will t h en ap p ear in t h e ab ov e list
o f Defin ed Bro ws ers .
134
User Manual
Pol i cy by IP
To s et p o licies b ye IP fo r t h e g ro u p , select t h e co rres p o n d in g g ro u p click Po licy b y
IP. Th e fo llo win g p aramet ers are co n fig u red :
Den y Lo g in fro m Defin ed Bro ws ers : Th e lis t o f d efin ed b ro ws ers b elo w will
b e u s ed t o p revent t h e u sers o f t h is g ro up fro m lo g g in g in t o t h e ro u t ers GUI.
A ll n o n -d efin ed b ro ws ers will b e allo wed fo r lo g in fo r t h is g ro u p .
A llo w Lo g in fro m Defin ed Bro ws ers : Th e lis t o f d efin ed b ro ws ers b elo w will
b e u s ed t o allo w t h e u s ers o f t h is g ro u p fro m lo g g in g in t o t h e ro u t ers GUI.
A ll n o n -d efin ed b ro ws ers will b e d en ied fo r lo g in fo r t h is g ro u p .
Defin ed Bro ws ers :Th is lis t d is plays t h e web b ro ws ers t h at h ave b een add ed t o
t h e Defin ed Bro ws ers lis t , u p o n wh ich g ro u p lo g in p o licies can b e d efin ed .
(Ch eck Bo x A t Firs t Co lu mn Head er): Select s all t h e d efin ed b ro ws ers in t h e
t ab le.
Yo u can ad d t o t h e lis t o f Defin ed Bro ws ers b y s elect ing a clien t b ro wser fro m the
d ro p d o wn men u an d clickin g A d d. Th is b rows er will t h en ap p ear in t h e ab ov e list
o f Defin ed Bro ws ers .
135
User Manual
136
User Manual
137
User Manual
138
User Manual
139
User Manual
140
User Manual
Serv ice: Th e SSL VPN s erv ice co rres p o n d in g t o t h e res o u rce (VPN t u n n el,
Po rt Fo rward in g o r A ll).
141
User Manual
Po r t Num ber
20
21
SSH
22
Telnet
23
25
HTTP (w eb)
80
110
123
Citrix
1494
Terminal Services
3389
5900 or 5800
142
User Manual
143
User Manual
Th e IP ad d res ses o f t h e clien ts n et work in t erfaces (Et h ern et, W ireless, et c.) canno t
b e id en t ical t o t h e ro u t ers IP ad d res s o r a s erv er o n t h e co rp o rat e LA N t h at is
b ein g acces s ed t h ro u g h t h e SSL VPN t u n n el.
144
User Manual
Seco n d ary DNS Serv er: Seco n d ary DNS s erv er IP ad d res s t o s et o n t h e
n et wo rk ad ap t o r creat ed o n t h e clien t h o s t . Th is co n fig u rat io n is o p t io n al.
145
User Manual
Setup > VPN Settings > SSL VPN Client > Configured Client Routes
If t h e SSL VPN clien t is as s ig n ed an IP ad d res s in a d ifferen t s u b n et t h an t h e
co rp o rat e n et work, a clien t ro u t e mu s t b e ad d ed t o allo w acces s t o t h e p riv at e LA N
t h ro u g h t h e VPN t u n n el. A s well a s t at ic ro u t e o n t h e p riv at e LA Ns firewall
(t y p ically t h is ro u ter) is n eed ed t o fo rward p riv ate t raffic t h rou gh t h e VPN Firewall t o
t h e remo t e SSL VPN clien t . W h en s plit t u n nel mo d e is en ab led , t he u ser is req uired to
co n fig u re ro u t es fo r VPN t u n n el clien t s :
146
User Manual
d efau lt
p o rt al
Th e ro u t er ad min is t rator creat es an d ed it s p o rtal lay o uts fro m t h e co n fig u rat ion p ages
in t h e SSL VPN men u . Th e p o rt al n ame, t it le, b an n er n ame, an d b an n er co n t en t s are
all cu s t o mizab le t o t h e in t en ded u sers fo r t h is p o rtal. Th e p o rtal n ame is ap p en d ed t o
147
User Manual
HTTP met a t ag s fo r cache co nt rol: Th is s ecu rity featu re p rev en ts exp ired web
p ag es an d d at a fro m b ein g s t o red in t h e clien t s web b ro ws er cach e. It is
reco mmen d ed t h at t h e u s er s elect s t h is o p t io n .
148
User Manual
149
User Manual
USB Prin t er: Th e DSR can p ro v id e t h e LA N wit h acces s t o p rin t ers co n n ect ed
t h ro u g h t h e USB. Th e p rin t er d riv er will h av e t o b e in s t alled o n t h e LA N h o s t
an d t raffic will b e ro u t ed t h ro u g h t h e DSR b et ween t h e LA N an d p rin t er.
Rig h t click an d s elect 'ad d p rin t er' o r click o n 'A d d p rin t er' p res en t at t h e left
men u .
Select t h e 'Net wo rk Prin t er' rad io b u t t on an d click n ext (s elect " d evice is n't lis t ed
in cas e o f W in d o ws 7" ).
Select t h e 'Co n n ect t o p rin ter u sin g URL' rad io b u t t o n ('Select a s hared p rin t er b y
n ame in cas e o f W in d o ws 7) an d g iv e t h e fo llo win g URL h t t p :/ / <Ro u t er's LA N
IP ad d res s>:631/ p rin ters / <M o d el Name> (M o d el Name can b e fo u n d in t h e USB
s t at u s p ag e o f ro u t er's GUI).
Click 'n ext ' an d s elect t h e ap p ro p riat e d riv er fro m t h e d is p lay e d lis t .
150
User Manual
151
User Manual
US B -1 :
En ab le USB Prin t er: Select t h is o p t io n t o allo w t h e USB p rin t er co n n ect ed t o t h e
ro u t er t o b e s h ared acro s s t h e n et wo rk.
Th e USB p rin t er can b e acces s ed o n an y LA N h o s t (wit h ap p ro p riat e p rin t er d riv er
in s t alled ) co n nected t o t h e ro u t er b y u s in g t h e fo llo win g co mman d in t h e h o s t 's ad d
p rin t ers win d o w
h t t p :/ / <Ro uter's IP:631>/ p rin t ers/ <Device M od el> (Dev ice M o d el can b e fo u n d in t h e
USB s et t in g s p ag e).
En ab le Sh arin g : Select t h is o p tio n t o allo w t h e USB s t o rag e d ev ice co n n ect ed t o t h e
ro u t er t o b e s h ared acro s s t h e n et wo rk.
US B -2 :
En ab le USB Prin t er: Select t h is o p t io n t o allo w t h e USB p rin t er co n n ect ed t o t h e
ro u t er t o b e s h ared acro s s t h e n et wo rk.
Th e USB p rin t er can b e acces s ed o n an y LA N h o s t ( wit h ap p ro p riat e p rin t er d riv er
in s t alled ) co n nected t o t h e ro u t er b y u s in g t h e fo llo win g co mman d in t h e h o s t 's ad d
p rin t ers win d o w
h t t p :/ / <Ro uter's IP:631>/ p rin t ers/ <Device M od el> (Dev ice M o d el can b e fo u n d in t h e
USB s et t in g s p ag e).
152
User Manual
User Manual
User Manual
Exp iry Time: Th e d at e aft er wh ich t h is s ig n ed cert ificat e b eco mes in v alid y o u
s h o u ld ren ew t h e cert ificat e b efo re it exp ires .
155
User Manual
156
User Manual
157
User Manual
158
User Manual
159
User Manual
160
User Manual
A ccu rat e d at e an d t ime o n t h e ro u ter is crit ical fo r firewall s ch ed u les , W i -Fi p o wer
s av in g s u p p o rt t o d is ab le A Ps at cert ain t imes o f t h e d ay , an d accu rat e lo g g in g .
1. Select the routers time zone, relative to Greenwich Mean Time (GMT).
2. If supported for your region, click to Enable Daylight Savings.
3. Determine whether to use default or custom Network Time Protocol (NTP) servers. If
custom, enter the server addresses or FQDN.
161
User Manual
162
User Manual
Sy s t em: Th is refers t o ap plicat ion an d man ag emen t lev el feat ures av ailab le o n this
ro u t er, in clu d in g SSL VPN an d ad min is t rat o r ch an g es fo r man ag in g t h e u n it .
EM ERGENC Y: s y s t em is u n u s ab le
ERROR: erro r co n d it io n s
W A RNING: warn in g co n d it io n s
163
User Manual
User Manual
165
User Manual
166
User Manual
Figure 115 : IPv6 Log configuratio n options for traffi c through route r
167
User Manual
User Manual
Figure 117 : Sys log s e rve r configuratio n for Re mote Logging (continue d)
169
User Manual
1. To save a copy of your current settings, click the Backup button in the Save Current
Settings option. The browser initiates an export of the configuration file and prompts to
save the file on your host.
170
User Manual
2. To restore your saved settings from a backup file, click Browse then locate the file on the
host. After clicking Restore, the router begins importing the files saved configuration
settings. After the restore, the router reboots automatically with the restored settings.
3. To erase your current settings and revert to factory default settings, click the Default
button. The router will then restore configuration settings to factory defaults and will
reboot automatically. (See Appendix B for the factory default parameters for the router).
Figure 119 : Re s toring configuratio n from a s ave d file will re s ult in the
curre nt configurat io n be ing ove rwritte n and a re boot
171
User Manual
172
User Manual
Figure 121 : Firmware upgrade and configurat io n re s tore /back up via USB
173
User Manual
174
User Manual
9.9.1 Ping
Th is u t ilit y can b e u s ed t o t est co n nect ivit y b et ween t h is ro u t er an d an o t h er d ev ice
o n t h e n et wo rk co n n ect ed t o t h is ro u t er. En t er an IP ad d res s an d click PING. Th e
co mman d o u t p u t will a p p ear in d icat in g t h e ICM P ech o req u es t s t at u s .
175
User Manual
176
User Manual
9.10 Localization
Tools > Set Language
Th e ro u t er h as b u ilt in t o o ls t o allo w ch an g e t h e d efau lt lan g u ag e (En g lis h ) t o fo u r
d ifferen t lan g u ag es . (Fren ch , Deu t s ch e , Sp an is h an d It alian )
177
User Manual
178
User Manual
179
User Manual
User Manual
181
User Manual
182
User Manual
183
User Manual
184
User Manual
185
User Manual
186
User Manual
187
User Manual
De s cription
Policy Name
Endpoint
Tx (KB)
Tx (Packets)
State
188
User Manual
De s cription
User Name
The SSL VPN user that has an active tunnel or port forwarding session to this
router.
IP Address
Connect Status
Status of the SSL connection betw een this router and the remote VPN client: Not
Connected or Connected.
189
User Manual
3. Check your PCs IP address. If the PC cannot reach a DHCP server, some versions of
Windows and Mac OS generate and assign an IP address. These auto-generated addresses
are in the range 169.254.x.x. If your IP address is in this range, check the connection from
the PC to the firewall and reboot your PC.
4. If your routers IP address has changed and you dont know what it is, reset the router
configuration to factory defaults (this sets the firewalls IP address to 192.168.10.1).
5. If you do not want to reset to factory default settings and lose your configuration, reboot
the router and use a packet sniffer (such as Ethereal) to capture packets sent during the
reboot. Look at the Address Resolution Protocol (ARP) packets to locate the routers LAN
interface address.
6. Launch your browser and ensure that Java, JavaScript, or ActiveX is enabled. If you are
using Internet Explorer, click Refresh to ensure that the Java applet is loaded. Close the
browser and launch it again.
7. Ensure that you are using the correct login information. The factory default login name is
admin and the password is password. Ensure that CAPS LOCK is off when entering this
information.
S ymptom: Ro u t er d o es n o t s av e co n fig u rat io n ch an g es .
Recommended acti on:
1. When entering configuration settings, click Apply before moving to another menu or tab;
otherwise your changes are lost.
2. Click Refresh or Reload in the browser. Your changes may have been made, but the
browser may be caching the old configuration.
190
User Manual
1. Ask your ISP if it requires a login program PPP over Ethernet (PPPoE) or some other
type of login.
2. If yes, verify that your configured login name and password are correct.
3. Ask your ISP if it checks for your PC's hostname.
4. If yes, select Network Configuration > WAN Settings > Ethernet ISP
Settings and set the account name to the PC hostname of your ISP account.
5. Ask your ISP if it allows only one Ethernet MAC address to connect to the Internet, and
therefore checks for your PCs MAC address.
6. If yes, inform your ISP that you have bought a new network device, and ask them to use
the firewalls MAC address.
7. Alternatively, select Network Configuration > WAN Settings > Ethernet ISP
Settings and configure your router to spoof your PCs MAC address.
191
User Manual
1. Ask your ISP for the addresses of its designated Domain Name System (DNS) servers.
Configure your PC to recognize those addresses. For details, see your operating system
documentation.
1. If you have just configured the router, wait at least 5 minutes, select Administration >
Time Zone , and recheck the date and time.
2. Verify your Internet access settings.
S ymptom: Time is o ff b y o n e h o u r.
Pos s i bl e caus e : Th e ro ut er d o es n ot au tomat ically ad ju s t fo r Day lig h t Sav in g s Time.
Recommended acti on:
1. Select Administration > Time Zone and view the current date and time settings.
2. Click to check or uncheck Automatically adjust for Daylight Savings Time, then click
Apply.
3. Click OK.
192
User Manual
5. If the path is not working, Test the physical connections between PC and router
If t h e LA N p o rt LED is o ff, g o t o t h e LED d is p lay s s ectio n o n p age B 1 an d fo llo w in s t ru ct io n s fo r LA N o r In t ern et p o rt LEDs are n o t lit .
3. Click OK and then observe the display (see the previous procedure).
4. If the path is not working, do the following:
User Manual
M an y b ro adb an d ISPs res trict acces s b y allo win g t raffic fro m t h e M A C ad d res s o f
o n ly y o u r b ro adb and mo d em; b u t so me ISPs ad d it ion ally res trict access t o t h e M A C
ad d res s o f ju s t a s in g le PC co n n ect ed t o t h at mo d em. If t h is is t h e cas e, co n fig u re
y o u r firewall t o clo n e o r s p o o f t h e M A C ad d res s fro m t h e au t h o rized PC.
If n o , d o t h e fo llo win g :
2. If the router does not restart automatically; manually restart it to make the default settings
effective.
3. After a restore to factory defaults whether initiated from the configuration interface or
the Reset button the following settings apply:
LA N IP ad d res s : 192.168.10.1
Pas s wo rd : ad min
194
User Manual
Appendix A. Glossary
ARP
Address Resolution Protocol. Broadcast protocol for mapping IP addresses to MAC address es.
CHAP
DDNS
Dynamic DNS. System for updating domain names in real time. Allow s a domain name to be
assigned to a device w ith a dynamic IP address.
DHCP
Dynamic Host Configuration Protocol. Protocol for allocating IP addresses dynamically so that
addresses can be reused w hen hosts no longer need them.
DNS
Domain Name System. Mechanism for translating H.323 IDs, URLs, or e-mail IDs into IP
addresses. Also used to assist in locating remote gatekeepers and to map IP addresses to
hostnames of administrative domains.
FQDN
Fully qualified domain name. Complete domain name, including the host portion. Example:
serverA.companyA.com.
FTP
File Transfer Protocol. Protocol for transferring files between network nodes.
HTTP
Hypertext Transfer Protocol. Protocol used by w eb browsers and web servers to transfer files.
IKE
Internet Key Exchange. Mode for securely exchanging encryption keys in ISAKMP as part of
building a VPN tunnel.
IPsec
ISAKMP
Internet Key Exchange Security Protocol. Protocol for establishing security associations and
cryptographic keys on the Internet.
ISP
MAC Address
MTU
Maximum transmission unit. Size, in bytes, of the largest packet that can be passed on. The
MTU for Ethernet is a 1500-byte packet.
NAT
Netw ork Address Translation. Process of rewriting IP addresses as a packet passes through a
router or firew all. NAT enables multiple hosts on a LAN to access the Internet using the single
public IP address of the LANs gatew ay router.
NetBIOS
Microsoft Window s protocol for file sharing, printer sharing, messaging, authentication, and
name resolution.
NTP
Netw ork Time Protocol. Protocol for synchronizing a router to a single clock on the netw ork,
know n as the clock master.
PAP
Passw ord Authentication Protocol. Protocol for authenticating users to a remote access server
or ISP.
196
User Manual
PPPoE
Point-to-Point Protocol over Ethernet. Protocol for connecting a netw ork of hosts to an ISP
w ithout the ISP having to manage the allocation of IP addresses.
PPTP
Point-to-Point Tunneling Protocol. Protocol for creation of VPNs for the secure transfer of data
from remote clients to private servers over the Internet.
RADIUS
Remote Authentication Dial-In User Service. Protocol for remote user authentication and
accounting. Provides centralized management of usernames and passw ords.
RSA
TCP
Transmission Control Protocol. Protocol for transmitting data over the Internet w ith guaranteed
reliability and in-order delivery.
UDP
User Data Protocol. Protocol for transmitting data over the Internet quickly but w ith no
guarantee of reliability or in-order delivery.
VPN
Virtual private netw ork. Netw ork that enables IP traffic to travel securely over a public TCP/IP
netw ork by encrypting all traffic from one netw ork to another. Uses tunneling to encrypt all
information at the IP level.
WINS
Window s Internet Name Service. Service for name resolution. Allow s clients on different IP
subnets to dynamically resolve addresses, register themselves, and browse the network without
sending broadcasts.
XAUTH
IKE Extended Authentication. Method, based on the IKE protocol, for authenticating not just
devices (which IKE authenticates) but also users. User authentication is performed after device
authentication and before IPsec negotiation.
197
Device login
Internet
Connection
Firew all
De s cription
De f au lt Setting
http://192.168.10.1
admin
admin
1500
Port speed
Autosense
IP address
192.168.10.1
255.255.255.0
RIP direction
None
RIP version
Disabled
RIP authentication
Disabled
DHCP server
Enabled
192.168.10.2
192.168.10.100
Time zone
GMT
Disabled
SNMP
Disabled
Remote management
Disabled
Enabled (all)
Disabled
Stealth mode
Enabled
User Manual
ICM P-TYPE-8
RLOGIN
A IM
ICM P-TYPE-9
RTELNET
BGP
ICM P-TYPE-10
RTSP:TCP
BOOTP_ CLIENT
ICM P-TYPE-11
RTSP:UDP
BOOTP_ SERVER
ICM P-TYPE-13
SFTP
CU-SEEM E:UDP
ICQ
SM TP
CU-SEEM E:TCP
IM A P2
SNM P:TCP
DNS:UDP
IM A P3
SNM P:UDP
DNS:TCP
IRC
FINGER
NEW S
FTP
NFS
SQL-NET
HTTP
NNTP
SSH:TCP
HTTPS
PING
SSH:UDP
ICM P-TYPE-3
POP3
STRM W ORKS
ICM P-TYPE-4
PPTP
TA CA CS
ICM P-TYPE-5
RCM D
TELNET
ICM P-TYPE-6
TFTP
ICM P-TYPE-7
REXEC
VDOLIVE
200
User Manual
Severity
Severity
DEBUG
DEBUG
DEBUG
Log Message
BridgeConfig: too few arguments to
command %s
BridgeConfig: too few arguments to
command %s
sqlite3QueryResGet failed.Query:%s
ddnsDisable failed
DEBUG
DEBUG
sqlite3QueryResGet failed.Query:%s
sqlite3QueryResGet failed.Query:%s
ERROR
ERROR
stopping bridge...
stopping bridge...
stopping bridge...
%s:DBUpdate event: Table: %s
opCode:%d rowId:%d
Wan is not up
%s:DBUpdate event: Table: %s
opCode:%d rowId:%d
doDNS:failed
DEBUG
DEBUG
DEBUG
ddnsDisable failed
failed to call ddns enable
ddnsDisable failed
ERROR
ERROR
ERROR
DEBUG
DEBUG
sqlite3QueryResGet failed.Query:%s
Error in executing DB update handler
ERROR
ERROR
DEBUG
DEBUG
sqlite3QueryResGet failed.Query:%s
Illegal invocation of ddnsView (%s)
ERROR
ERROR
doDNS:failed
doDNS:Result = FAILED
doDNS:Result SUCCESS
Write Old Entry: %s %s %s: to %s
DEBUG
DEBUG
DEBUG
DEBUG
sqlite3QueryResGet failed.Query:%s
sqlite3QueryResGet failed.Query:%s
ddns: SQL error: %s
Illegal operation interface got deleted
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
sqlite3QueryResGet failed.Query:%s
sqlite3QueryResGet failed.Query:%s
ERROR
ERROR
DEBUG
sqlite3QueryResGet failed.Query:%s
ERROR
DEBUG
DEBUG
ddnsDisable failed
ddns: SQL error: %s
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
sqlite3QueryResGet failed.Query:%s
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ddnsDisable failed
ddns: SQL error: %s
ERROR
ERROR
DEBUG
DEBUG
sqlite3QueryResGet failed.Query:%s
Failed to call ddns enable
ERROR
ERROR
nimfAdvOptSetWrap: MacAddress: %s
nimfAdvOptSetWrap: old Mtu Flag: %d
DEBUG
DEBUG
ERROR
ERROR
DEBUG
201
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
ddnsDisable failed
ERROR
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
ddnsDisable failed
ERROR
DEBUG
ERROR
nimfAdvOptSetWrap: INDICATOR = %d
nimfAdvOptSetWrap: UpdateFlag: %d
nimfAdvOptSetWrap: returning with
status: %s
nimfGetUpdateMacFlag: MacTable Flag
is: %d
DEBUG
DEBUG
ERROR
ERROR
DEBUG
sqlite3QueryResGet failed.Query:%s
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
nimfMacGet: MacAddress: %s
nimfMacGet: MacAddress: %s
DEBUG
DEBUG
ERROR
ERROR
nimfMacGet: MacAddress: %s
nimfMacGet: MacAddress: %s
nimfMacGet:Mac option Not changed \
nimfMacGet: MacAddress: %s
DEBUG
DEBUG
DEBUG
DEBUG
failed to open %s
failed to query networkInterface table
failed to query networkInterface table
sqlite3QueryResGet failed.Query:%s
ERROR
ERROR
ERROR
ERROR
nimfMacGet: MacAddress: %s
nimfMacGet: MacAddress: %s
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
DEBUG
failed to open %s
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
failed query %s
DEBUG
failed query %s
DEBUG
failed query %s
%s:DBUpdate event: Table: %s
opCode:%d rowId:%d
DEBUG
DEBUG
DEBUG
202
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
DEBUG
DEBUG
Failed to commit
ifStatusDBUpdate: Failed to begin "
%s: SQL error: %s
ERROR
ERROR
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
Invalid lanaddr
DEBUG
Invalid lanmask
DEBUG
Invalid option
DEBUG
DEBUG
Unknown option
DEBUG
sshdTblHandler
DEBUG
pPort: %s
DEBUG
pProtocol: %s
DEBUG
pListerAddr: %s
DEBUG
pKeyBits: %s
DEBUG
pRootEnable: %s
DEBUG
pRsaEnable: %s
DEBUG
pDsaEnable: %s
DEBUG
pPassEnable: %s
DEBUG
pEmptyPassEnable: %s
DEBUG
pSftpEnable: %s
DEBUG
pScpEnable: %s
DEBUG
pSshdEnable: %s
DEBUG
203
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
pPrivSep: %s
%s:DBUpdate event: Table: %s
opCode:%d rowId:%d
DEBUG
DEBUG
DEBUG
DEBUG
sqlite3QueryResGet failed.Query:%s
error executing the command %s
ERROR
ERROR
sshd stopped .
failed query %s
vlan disabled, not applying vlan
configuration..
DEBUG
DEBUG
ERROR
ERROR
failed query %s
failed query %s
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
sqlite3QueryResGet failed.Query:%s
sqlite3QueryResGet failed.Query:%s
Unable to Disable configurable port
from
configPortTblHandler has failed
ERROR
ERROR
ERROR
DEBUG
failed query %s
vlan disabled, not applying vlan
configuration..
DEBUG
sqlite3QueryResGet failed.Query:%s
Error in executing DB update handler
sqlite3QueryResGet failed
Failed to execute switchConfig for
port\
Failed to execute switchConfig for
port enable
Failed to execute ifconfig for port
enable
ERROR
DEBUG
adding %s to bridge%d... %s
DEBUG
restarting bridge...
[switchConfig] Ignoring event on port
number %d
DEBUG
sqlite3QueryResGet failed
ERROR
DEBUG
sqlite3_mprintf failed
ERROR
restarting bridge...
DEBUG
ERROR
executing %s ... %s
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
sqlite3QueryResGet failed
Failed to execute switchConfig for
port mirroring
Usage:%s <DB Name> <Entry
Name> <logFile> <subject>
sqlite3QueryResGet failed
Could not get all the required
variables to email the Logs.
runSmtpClient failed
DEBUG
getaddrinfo returned %s
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
IspName: %s
DEBUG
ERROR
DialNumber: %s
DEBUG
Apn: %s
DEBUG
No memory to allocate
Failed to Open SSHD Configuration
File
Ipaddress should be provided with
accessoption 1
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
204
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
GetDnsFromIsp: %s
IdleTimeOutFlag: %s
IdleTimeOutValue: %d
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
AuthMetho: %d
executing %s ... %s
DEBUG
DEBUG
sqlite3QueryResGet failed.Query:%s
Error in executing DB update handler
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
stopping bridge...
DEBUG
restarting bridge...
Could not configure 6to4 Tunnel
Interface
Could not de-configure 6to4 Tunnel
Interface
DEBUG
sqlite3_mprintf failed
Access port can be present only in
single vlan
Failed to execute vlanConfig binary
for vlanId %d
ERROR
DEBUG
ERROR
DEBUG
sqlite3QueryResGet failed
Error in executing DB update handler
DEBUG
DEBUG
ERROR
ERROR
sqlite3QueryResGet failed
Failed to remove vlan Interface for vlanId
\
DEBUG
ERROR
sqlite3QueryResGet failed
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
sqlite3QueryResGet failed
Failed to execute vlanConfig binary
for port number %d
Failed to execute vlanConfig binary
for vlanId %d
Failed to enable vlan
Failed to disable vlan
Failed to set vlanPort table entries,
while \
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
ERROR
DEBUG
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
205
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
ERROR
DEBUG
ERROR
DEBUG
pid: %d
options.xl2tpd file found
DEBUG
DEBUG
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
ERROR
DEBUG
threegEnable:spawning failed
threegDisable: unable to kill ppp
daemon
ERROR
DEBUG
DEBUG
DEBUG
threegMgmtHandler: Query: %s
threegMgmtHandler: error in
executing database update
Error in executing DB update handler
are we getting invoked twice ??
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
pppoeMgmtTblHandler: Password: %s
pppoeMgmtTblHandler: DNS specified:
%s
DEBUG
sqlite3QueryResGet failed.Query:%s
ERROR
DEBUG
sqlite3QueryResGet failed.Query:%s
ERROR
pppoeMgmtTblHandler: Service: %s
pppoeMgmtTblHandler: StaticIp: %s
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
206
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
pppoeMgmtTblHandler: NetMask: %s
DEBUG
xl2tpdStop failed
ERROR
pppoeMgmtTblHandler: AuthOpt: %d
pppoeMgmtTblHandler: Satus: %d
pppoeEnable: ppp dial string: %s
pppoeMgmtDBUpdateHandler: returning
with status: %s
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
xl2tpdStart failed
ERROR
pptpMgmtTblHandler: MtuFlag: %d
DEBUG
ERROR
pptpMgmtTblHandler: Mtu: %d
pptpMgmtTblHandler: IdleTimeOutFlag:
%d
pptpMgmtTblHandler: IdleTimeOutValue:
%d
pptpMgmtTblHandler: GetDnsFromIsp:
%d
DEBUG
sqlite3QueryResGet failed.Query:%s
writing Chap-secrets/Pap-Secrets
failed
DEBUG
xl2tpdStop failed
ERROR
DEBUG
xl2tpdStart failed
ERROR
DEBUG
ERROR
pptpMgmtTblHandler: UserName: %s
pptpMgmtTblHandler: Password: %s
pptpMgmtTblHandler: dynamic MyIp
configured
DEBUG
DEBUG
sqlite3QueryResGet failed.Query:%s
writing Chap-secrets/Pap-Secrets
failed
xl2tpdStop failed
DEBUG
xl2tpdStart failed
ERROR
pptpMgmtTblHandler: MyIp: %s
DEBUG
ERROR
pptpMgmtTblHandler: ServerIp: %s
pptpMgmtTblHandler: StaticIp: %s
DEBUG
DEBUG
sqlite3QueryResGet failed.Query:%s
writing Chap-secrets/Pap-Secrets
failed
Error in executing DB update handler
pptpMgmtTblHandler: NetMask: %s
pptpMgmtTblHandler:
MppeEncryptSupport: %s
DEBUG
ERROR
DEBUG
ERROR
pptpMgmtTblHandler: SplitTunnel: %s
pptpEnable: ppp dial string: %s
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
ERROR
DEBUG
pptpdStop failed
ERROR
DEBUG
ERROR
dhcpcMgmtTblHandler: MtuFlag: %d
dhcpcMgmtTblHandler: Mtu: %d
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
l2tpMgmtTblHandler: MtuFlag: %d
DEBUG
l2tpMgmtTblHandler: Mtu: %d
DEBUG
l2tpMgmtTblHandler: IspName: %s
DEBUG
pptpdStart failed
writing Chap-secrets/Pap-Secrets
failed
Error in executing DB update handler
pppStatsUpdate: unable to get default
MTU
pppoeMgmtInit: unable to open the
database file %s
pppoeDisable: unable to kill ppp
daemon
pppoeMultipleEnableDisable: pppoe
enable failed
pppoeMultipleEnableDisable: pppoe
disable failed
207
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
l2tpMgmtTblHandler: UserName: %s
DEBUG
l2tpMgmtTblHandler: Password: %s
DEBUG
l2tpMgmtTblHandler: AccountName: %s
DEBUG
l2tpMgmtTblHandler: DomainName: %s
l2tpMgmtTblHandler: Secret: not
specified
DEBUG
l2tpMgmtTblHandler: Secret: %s
l2tpMgmtTblHandler: dynamic MyIp
configured
DEBUG
l2tpMgmtTblHandler: MyIp: %s
l2tpMgmtTblHandler: ServerIp: %s
l2tpMgmtTblHandler: StaticIp: %s
DEBUG
DEBUG
DEBUG
l2tpMgmtTblHandler: NetMask: %s
DEBUG
l2tpMgmtTblHandler: SplitTunnel: %s
needToStartHealthMonitor: returning with
status: %s
DEBUG
DEBUG
l2tpEnable: command: %s
DEBUG
DEBUG
DEBUG
pid: %d
l2tpMgmtDBUpdateHandler: query string:
%s
l2tpMgmtDBUpdateHandler: returning
with status: %s
DEBUG
DEBUG
DEBUG
WARN
WARN
WARN
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
WARN
WARN
WARN
ERROR
ERROR
208
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
pptpEnable:spawning failed
pptpDisable: unable to kill ppp
daemon
pptpMgmtTblHandler: unable to get
current MTU Option
pptpMgmtTblHandler: unable to get
the Mtu
pptpMgmtTblHandler:
dbRecordValueGet failed for %s "
pptpMgmtTblHandler: pptp enable
failed
pptpMgmtTblHandler: pptp disable
failed
pptpMgmtDBUpdateHandler:
sqlite3QueryResGet "
pptpMgmtDBUpdateHandler: error in
executing "
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
ERROR
dhcpcMgmtTblHandler: dhclient
enable failed
dhcpcMgmtTblHandler: dhcpc release
failed
dhcpcMgmtTblHandler: dhcpc disable
failed
dhcpcMgmtDBUpdateHandler: failed
query: %s
dhcpcMgmtDBUpdateHandler: error
in executing "
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
sqlite3QueryResGet failed.Query:%s
ERROR
Log Message
%d command not supported by eapAuth
pCtx NULL.
Current cert subject name= %s
X509_STORE_CTX_get_ex_data failed.
Severity
DEBUG
DEBUG
DEBUG
DEBUG
Log Message
PEAP key derive: ERROR
PEAP context is NULL: ERROR
Constructing P2 response: ERROR
innerEapRecv is NULL: ERROR
Severity
ERROR
ERROR
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
BIO_write: Error
Decrypting: BIO reset failed
Encrypting BIO reset: ERROR
BIO_read: Error
EAP state machine changed from %s to
%s.
EAP state machine changed from %s to
%s.
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
DEBUG
Response ID %d
Response Method %d
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
209
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
DEBUG
DEBUG
ERROR
P2 decision=(%d); methodState=(%d)
Writing message to BIO: ERROR.
Encrypted (%d) bytes for P2
P2: sending fragment.
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
pCtx NULL.
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
EAPAUTH_MALLOC failed.
EAPAUTH_MALLOC failed.
NULL context created: Error
ERROR
ERROR
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
210
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
Error
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
DEBUG
EAPAUTH_MALLOC failed.
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
\tTLSMsgLen = 0x%x
Send req ptr = 0x%x; Send resp ptr =
0x%x
P2 decision=(%d); methodState=(%d)
Default EAP: method state = %d;
decision = %d
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
Got start
DEBUG
DEBUG
ERROR
DEBUG
DEBUG
Invalid Value-Size.
Invalid MS-Length. Got (%d), expected
(%d)
Error constructing response.
DEBUG
ERROR
DEBUG
DEBUG
EAPAUTH_MALLOC failed.
ERROR
DEBUG
tlsGlueCtxCreate failed.
client certificate must be set in the
profile.
received tls message length too big.
total frags len > initial total tls length.
ERROR
ERROR
pFB is NULL
pFB is NULL
DEBUG
DEBUG
DEBUG
DEBUG
EAPAUTH_MALLOC failed.
ERROR
pFB is NULL
TLS_FB* is NULL.
DEBUG
DEBUG
tlsGlueCtxCreate failed.
Context NULL: ERROR
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
211
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
pFB->msgBuff is NULL.
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
_eapCtxCreate failed.
%d authentication not enabled in the
system.
Initializing inner non-EAP auth plugin:
ERROR
DEBUG
ERROR
E = %d
DEBUG
R = %d
Could not initialize des -ecb
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
\tIdent = %d
\tLen = %d
DEBUG
DEBUG
ERROR
ERROR
\tType = %d
DEBUG
ERROR
\tOpCode = %d
\tMSID = %d
DEBUG
DEBUG
ERROR
ERROR
\tmsLen = %d
\tvalSize = %d
Frag Buffer bytes left = (%d)
Stripped username=(%s)
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
digestLen = %d.
ClearText =
DEBUG
DEBUG
ERROR
ERROR
CipherText =
DEBUG
digestLen = %d.
DEBUG
digestLen1 = %d.
DEBUG
digestLen2 = %d.
DEBUG
EAPAUTH_MALLOC failed
User not found.
EAP-MD5 not enabled in system
configuration.
EAP-MSCHAPV2 not enabled in
system configuration.
EAP-TLS not enabled in system
configuration.
EAP-TTLS not enabled in system
configuration.
212
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
DEBUG
DEBUG
DEBUG
cmdBuf: %s
X509_DEBUG : Invalid Certificate for the
generated"
DEBUG
DEBUG
x509TblHandler
DEBUG
pCertType: %s
DEBUG
pRowQueryStr: %s
DEBUG
x509SelfCertTblHandler
pRowQueryStr: %s
%s:DBUpdate event: Table: %s
opCode:%d rowId:%d
DEBUG
DEBUG
umiRegister failed
eapAuthHandler: Invalid data received
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
EAPAUTH_MALLOC failed.
malloc failed.
BIO_new_mem_buf failed.
malloc failed.
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
BIO_new_mem_buf failed.
SSL_CTX_new (TLSv1_client_method)
failed.
unable to set user configured CIPHER
list %s
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
SSL_CTX_use_PrivateKey_file failed.
private key does not match public key
SSL_CTX_load_verify_locations failed
SSL_new failed.
Both SSL_VERIFY_PEER and
SSL_VERIFY_NONE set: Error
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
EAPAUTH_MALLOC failed.
ERROR
ERROR
EAPAUTH_MALLOC failed.
eapTimerCreate failed.
ERROR
ERROR
eapCtxDelete:pCtx == NULL
eapRole != EAP_ROLE_PEER or
EAP_ROLE_AUTHENTICATOR
ERROR
ERROR
ERROR
ERROR
213
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
.Query:%s
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
.Query:%s
Memory allocation failed
X509_ERROR : Failed to validate the
certficate "
Memory allocation failed
ERROR
.Query:%s
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
No Memory Available
Certificate Request Failed
ERROR
ERROR
tlsGlueCtxCreate failed
eapVars is NULL
Context NULL: ERROR
Initializing inner EAP auth: ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
File is Empty
Error in executing DB update handler
ERROR
ERROR
Severity
DEBUG
Log Message
unable to register to UMI
Severity
ERROR
ERROR
ERROR
ERROR
214
User Manual
DEBUG
sqlite3QueryResGet failed
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
%s op=%d row=%d
DEBUG
sqlite3_mprintf failed
DEBUG
DEBUG
radSendtoServer: socket: %s
radSendtoServer: bind() Failed: %s:
%s
radRecvfromServer: recvfrom() Failed:
%s
radRecvfromServer: Packet too small
from %s:%d: %s
radCheckMsgAuth: Invalid MessageAuthenticator length in"
radDictLoad: couldn't open dictionary
%s: %s
radBuildAndSendReq: Invalid Request
Code %d
radPairAssign: bad attribute value
length
radPairAssign: unknown attribute type
%d
DEBUG
ERROR
DEBUG
DEBUG
%s
Mail sent and the Database is reset.
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
Packing attribute: %s
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
Verified Message-Authenticator
Unloaded RADIUS Dictionary
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
215
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
Receiving attribute: %s
Processing attribute: %s
Processing attribute: %s
Processing attribute: %s
Processing attribute: %s
radConfGet: "
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
sqlite3QueryResGet failed
empty result. nRows=%d nCols=%d
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
sqlite3QueryResGet failed
empty result. nRows=%d nCols=%d
RADIUS Accounting Exchange Failed
Unable to set debug for radAcct.
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
RADIUS Configured
DEBUG
DEBUG
DEBUG
Host IP address: %s
Adding Packet for existing cookie:%p
DEBUG
DEBUG
radEapRecvTask: "
failed to initialize UMI
ERROR
ERROR
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
DEBUG
Filling State:
Filling EAP-Message:
Filling Service-Type: %d
Filling Framed-MTU: %d
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
216
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
status: %d
DEBUG
tz: %d
DayLightsaving: %d
pNtpControl>ServerNames[PRIMARY_SERVER]:
%s
pNtpControl>ServerNames[SECONDARY_SERVER]
: %s
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
DS: %d
DEBUG
pPriServ %s
pSecServ %s
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
umiRegister (%x,%x,%x,%x)
srcId=%d(%s) --> destId=%d(%s)
cmd=%d inLen=%d outLen=%d
DEBUG
DEBUG
adpMalloc failed
context with ID: %d already registered
Failed to allocate memory for creating
UMI context
Failed to create recvSem for UMI
context
Failed to create mutex locks for UMI
context
Failed to create mutex recvQLock for
UMI context
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
217
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
ERROR
DEBUG
ERROR
DEBUG
cmd = %s
cmdstring is %s %s:%d
DEBUG
DEBUG
DEBUG
ERROR
DEBUG
DEBUG
usbdevice is %d %s:%d
Query string: %s
DEBUG
DEBUG
ERROR
ERROR
sqlite3QueryResGet failed.Query:%s
%s: 1. usb is already disconnected for
old usb type. "
%s: 2.call disable for new usb type !
%s: 3. usb is already disconnected for
old usb type. "
%s: 4. Disabled old usb type . Now "
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
usbdevice is %d %s:%d
USB: failed to begin transaction: %s
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
Failed query: %s
Failed to execute usb database
update handler
Usage:%s <DBFile> <opType>
<tblName> <rowId>
Illegal invocation of snmpConfig (%s)
DEBUG
DEBUG
ERROR
ERROR
executing %s
%s returned status=%d
DEBUG
DEBUG
ERROR
ERROR
%s returned status=%d
snmpd.conf not found
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
WARN
WARN
ERROR
ERROR
WARN
sqlite3QueryResGet failed.Query:%s
ERROR
WARN
ERROR
ERROR
ERROR
DEBUG
DEBUG
DEBUG
218
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
cpuMemUsageDBUpdateHandler: SQL
error: %s
unable to open the DB file %s
umiInit failed
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
sqlite3QueryResGet failed.Query:%s
Failed to Open Snmp Configuration
File
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
malloc(DB_UPDATE_NODE) failed
short ifDev event request!
ERROR
ERROR
ERROR
ERROR
sqlite3_mprintf failed
ERROR
ERROR
no component id matching %s
umiIoctl (%s,
UMI_CMD_DB_UPDATE(%d)) failed.
ERROR
ERROR
sqlite3_mprintf failed
sqlite3_mprintf failed
no component id matching %s
umiIoctl (%s,
UMI_CMD_IFDEV_EVENT(%d)) failed.
klogctl(9) failed
ERROR
ERROR
ERROR
ERROR
ERROR
sqlite3QueryResGet failed.Query:%s
Error in executing DB update handler
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
sqlite3_mprintf failed
ERROR
%s failed. status=%d
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
Severity
Log Message
Severity
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
219
User Manual
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
220
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
User Manual
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
221
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
User Manual
Internet on port %d
Enabling remote access management
for IP address range"
Enabling remote access management to
only this PC.
Disabling Management Access from
Internet on port %d
Disabling remote access management
for IP address range"
Disabling remote access management
only to this PC.
MAC Filtering %sabled for BLOCK and
PERMIT REST.
MAC Filtering %sabled for PERMIT and
BLOCK REST.
Enabling Content Filtering.
Disabling Content Filtering.
Deleting rule, port triggering for protocol
TCP.
Deleting rule, port triggering for protocol
UDP.
Deleting rule, port triggering for protocol
TCP.
Deleting rule, port triggering for protocol
UDP.
Enabling rule, port triggering for protocol
TCP.
Enabling rule, port triggering for protocol
UDP.
Enabling rule, port triggering for protocol
TCP.
Enabling rule, port triggering for protocol
UDP.
%d:%d:%d:%d:%d
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
Stopping IPS...%s
IPS started.
DEBUG
DEBUG
Disabling DMZ
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
222
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
User Manual
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
RIPng enabled.
Disable IPv6 firewall rule.
Enable IPv6 firewall rule.
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
nimfBridgeTblHandler: \
ERROR
DEBUG
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
ripDisable failed
ripEnable failed
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
223
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
Severity
DEBUG
Log Message
sqlite3QueryResGet failed
Severity
ERROR
DEBUG
DEBUG
sqlite3QueryResGet failed
VAP(%s) set beacon interval failed
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
ran query %s
DBUpdate event: Table: %s opCode:%d
rowId:%d
%sing VAPs using profile %s
DEBUG
DEBUG
DEBUG
ERROR
ERROR
%sing VAP %s
ran query %s
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
APCtx Not-Found
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
iReq.i_val : %d
pIfName : %s
DEBUG
DEBUG
ERROR
ERROR
iReq.i_val : %d
DEBUG
setting mode: %d
DEBUG
DEBUG
224
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
225
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
DOT11_RX_EAPOL_KEYMSG:
unknown ifname %s
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
mic verification: OK
DEBUG
ERROR
DEBUG
DEBUG
wpaInit failed
dot11InstallProfile: unable to get
interface index
adpHmacInit(%s) failed
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
unsupported command %d
ERROR
DEBUG
ERROR
DEBUG
unsupported command %d
ERROR
DEBUG
dot11NodeAlloc failed
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
DEBUG
dot11NodeAlloc failed
ERROR
DEBUG
Invalid arguments.
ERROR
DEBUG
DEBUG
226
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
DEBUG
umiIoctl(UMI_COMP_IAPP,%d) failed
Invalid IE.
umiIoctl(UMI_COMP_KDOT11_VAP,
%d ) failed
umiIoctl(UMI_COMP_KDOT11,%d
,%d) failed
KDOT11_SET_PARAM:IEEE80211_I
OC_WME_CWMIN failed
KDOT11_SET_PARAM:IEEE80211_I
OC_WME_CWMAX failed
KDOT11_SET_PARAM:IEEE80211_I
OC_WME_AIFS failed
KDOT11_SET_PARAM:80211_IOC_
WME_TXOPLIMIT failed
KDOT11_SET_PARAM:IEEE80211_I
OC_WME_ACM failed
KDOT11_SET_PARAM:IEEE80211_I
OC_WME failed
ERROR
ERROR
ERROR
DEBUG
DEBUG
sending event %d to %d
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
DEBUG
umiIoctl(UMI_COMP_IAPP,%d) failed
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
dot11PnacIfCreate failed
ERROR
DEBUG
wpaPRF failed
ERROR
DEBUG
ERROR
DEBUG
received a pdu on %s
pnacRecvMapi: protoType: %04x
pPhyPort->authToASSendRtn:%p
DEBUG
dot11Malloc failed
ERROR
DEBUG
ERROR
DEBUG
dot11Malloc failed
eapolRecvKeyMsg: unknown
descType =%d
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
227
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
DEBUG
DEBUG
doing pnacTxCannedFail
DEBUG
doing pnacTxCannedSuccess
doing pnacTxReqId
DEBUG
DEBUG
doing pnacTxReq
DEBUG
doing pnacTxStart
DEBUG
doing pnacTxLogoff
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
invalid OUI %x %x %x
(%s) invalid OUI %x %x %x
ERROR
ERROR
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
dot11InstallKeys failed
group state machine entered into
WPA_AUTH_GTK_INIT
DEBUG
dot11Malloc failed
ERROR
DEBUG
DEBUG
dot11Malloc failed
dot11Malloc failed
ERROR
ERROR
Authenticator[%d]:
Auth PAE state = %s
Auth Reauth state = %s
DEBUG
DEBUG
DEBUG
aesWrap failed
unknown key descriptor version %d
dot11Malloc failed
ERROR
ERROR
ERROR
DEBUG
ERROR
Supplicant[%d]:
Supp Pae state = %s
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
228
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ASSendRtn: %p ASToAuthRecv: %p
adpRand failed:unable to generate
random unicast key
using group key as unicast key
Integrity check failed more than once in
last 60 secs.
MIC failed twice in last 60 secs, taking
countermeasures
DEBUG
WARN
WARN
WARN
ERROR
WARN
ERROR
WARN
WARN
WARN
WARN
WARN
ERROR
WARN
ERROR
DEBUG
DEBUG
DEBUG
WARN
WARN
WARN
WARN
WARN
From
WARN
229
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
phyPort:%s
WARN
ERROR
umiInit failed
ERROR
iappInit failed
ERROR
ERROR
dot11Malloc failed
ERROR
ERROR
pnacRadXlateRadPktIntegrityChk: no
corresponding "
Error from
pnacRadXlateRadPktIntegrityChk: no
message "
Error from
pnacRadXlateRadPktIntegrityChk: "
From
pnacRadXlateRadChalPktHandle: no
encapsulated eap "
Error from
pnacRadXlateRadChalPktHandle:
malloc for eap "
Error from
pnacEapDemoSuppUserInfoRegister:
invalid "
Error from pnacEapDemoSuppRecv:
received null EAP pkt
Error from pnacEapDemoSuppRecv:
send ptr to pnac supplicant"
From pnacEapDemoSuppRecv: user
info not entered yet
Error from pnacEapDemoSuppRecv:
couldn't "
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
invalid aruments
pnacIfNameToIndex failed
pnacPhyPortParamSet: device invalid
%s%d
pnacPhyPortParamSet: EIOCGADDR
ioctl failed
pnacPhyPortParamSet: multicast addr
add ioctl failed
pnacPhyPortParamUnset: multicast
addr del ioctl failed
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
pnacPortPaeDeconfig:kpnacPortPaeDec
onfig failed
pnacPortPaeDeconfig:kpnacPortPaeDec
onfig failed
WARN
WARN
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
230
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
pnacKeyInfoGet:failed to allocate
buffer
PNAC user comp id not set. dropping
EAPOL key pkt
pnacUmiPortPaeParamSet: invalid
buffer received
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
pnacPhyPortCreate failed
kpnacPhyPortCreate failed
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
invalid argument
pnacAuthConfig: maxAuth limit
reached
pnacAuthConfig: malloc failed
Error from pnacAuthConfig: pAsArg
cannot be NULL
Error from pnacAuthConfig: receive
routine hook "
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
Invalid arguments
Error from pnacSuppConfig: malloc
failed
Error from pnacSuppConfig: receive
routine hook "
Error from pnacSuppConfig:
pnacSuppInit failed
ERROR
ERROR
dot11Malloc failed
ERROR
ERROR
kpnacPortPaeConfig failed
pnacAuthDeconfig failed: pPortPae
NULL
Error from pnacPhyPortDestroy: port
not configured
pnacPhyPortDestroy: Failed to
deconfigure port
ERROR
dot11Malloc failed
ERROR
ERROR
ERROR
ERROR
pnacPhyPortParamUnset FAILED
Error from pnacPhyPortCreate: malloc
failed
Error from pnacPhyPortCreate:
pnacPhyPortParamSet"
error from pnacPhyPortCreate: malloc
failed
Error from pnacAuthInit:
pnacPortTimersInit failed
Error from pnacAuthInit:
pnacAuthPAEInit failed
ERROR
ERROR
ERROR
231
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
hmac_md5:adpHmacInit failed
pnacUmiIoctlHandler: invalid cmd: %d
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
232
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
ERROR
sqlite3QueryResGet failed
ERROR: incomplete DB update
information.
ERROR
pnacEapRadAuthSend: Invalid
arguments
pnacEapRadAuthSend: failed to
allocate inbuffer
ERROR
ERROR
ERROR
ERROR
sqlite3QueryResGet failed
ERROR
ERROR
sqlite3QueryResGet failed.Query:%s
ERROR
sqlite3QueryResGet failed.Query:%s
ERROR
sqlite3QueryResGet failed.Query:%s
ERROR
sqlite3QueryResGet failed.Query:%s
ERROR
ERROR
ERROR
ERROR
sqlite3QueryResGet failed
ERROR
ERROR
sqlite3QueryResGet failed
ERROR
ERROR
sqlite3QueryResGet failed
ERROR
sqlite3QueryResGet failed
ERROR
sqlite3QueryResGet failed
ERROR
sqlite3QueryResGet failed
ERROR
sqlite3QueryResGet failed
no VAP rows returned. expected one
multiple VAP rows returned. expected
one
ERROR
ERROR
ERROR
sqlite3QueryResGet failed
ERROR
ERROR
ERROR
sqlite3QueryResGet failed
ERROR
ERROR
ERROR
ERROR
ERROR
233
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
Invalid config data
ERROR
Facility: Kernel
Log Message
DNAT: multiple ranges no longer
supported
DNAT: Target size %u wrong for %u
ranges,
Severity
Log Message
Severity
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
WEP
AES
DEBUG
DEBUG
DEBUG
AES_CCM
DEBUG
DEBUG
CKIP
DEBUG
DEBUG
TKIP
DEBUG
PPPIOCDETACH file->f_count=%d,
PPP: outbound frame not passed
PPP: VJ decompression error
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ifmedia_set: target
DEBUG
DEBUG
ifmedia_set: setting to
DEBUG
DEBUG
DEBUG
DEBUG
234
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
User Manual
DEBUG
PPPIOCDETACH file->f_count=%d,
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
desc->ifmt_string
mode %s, desc->ifmt_string
<unknown subtype>
%s, desc->ifmt_string
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
%s%s, seen_option++ ? , : ,
DEBUG
DEBUG
%s%s, seen_option++ ? , : ,
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
%03d:, i
%02x, ((u_int8_t *)p)[i]
first difference at byte %u, i
%s: , t->name
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
%03d:, i
DEBUG
235
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
User Manual
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
%s: , t->name
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ip_rt_advice: redirect to
ip_rt_bug: %u.%u.%u.%u ->
%u.%u.%u.%u, %s,
DEBUG
%03d:, i
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
enmic botch
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
236
DEBUG
DEBUG
User Manual
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
%s, buf
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
rt_bind_peer(0) @%p,
DEBUG
DEBUG
DEBUG
_fmt, __VA_ARGS__
%s: Warning, using only %u entries in
%u key cache,
%s: TX99 support enabled, dev->name
%s:grppoll Buf allocation failed
,__func__
ip_rt_advice: redirect to
ip_rt_bug: %u.%u.%u.%u ->
%u.%u.%u.%u, %s,
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
%02x, hk->kv_val[i]
mac %s, ether_sprintf(mac)
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
237
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
User Manual
DEBUG
txmic
DEBUG
DEBUG
%02x, hk->kv_txmic[i]
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
238
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
User Manual
%s: failed to register sysctls!, sc>sc_dev->name
%s: mac %d.%d phy %d.%d, dev>name,
5 GHz radio %d.%d 2 GHz radio
%d.%d,
radio %d.%d, ah->ah_analog5GhzRev
>> 4,
radio %d.%d, ah->ah_analog5GhzRev
>> 4,
ipt_time loading
DEBUG
ipt_time unloaded
ip_conntrack_irc: max_dcc_channels
must be a positive integer
ip_conntrack_irc: ERROR registering
port %d,
ip_nat_h323:
ip_nat_mangle_tcp_packet
ip_nat_h323:
ip_nat_mangle_udp_packet
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
Broadcast packet!
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
xlr8NatSoftCtxEnqueue: Calling
xlr8NatIpFinishOutput () .., status
xlr8NatSoftCtxEnqueue:
xlr8NatIpFinishOutput () returned [%d],
status
icmpExceptionHandler: Exception!
fragExceptionHandler: Exception!
DEBUG
DEBUG
algExceptionHandler: Exception!
dnsExceptionHandler: Exception!
DEBUG
DEBUG
%s , LAN
DEBUG
IPsecExceptionHandler: Exception!
DEBUG
DEBUG
DEBUG
%s , WAN
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
_fmt, __VA_ARGS__
xlr8NatIpFinishOutput: Err.. skb2 ==
NULL !
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
TRUNCATED
SRC=%u.%u.%u.%u
DST=%u.%u.%u.%u ,
LEN=%u TOS=0x%02X
PREC=0x%02X TTL=%u ID=%u ,
FRAG:%u , ntohs(ih->frag_off) &
IP_OFFSET
DEBUG
TRUNCATED
DEBUG
PROTO=TCP
DEBUG
xlr8NatConntrackPreHook: We found
the valid context,
xlr8NatConntrackPreHook: Not a
secured packet.
xlr8NatConntrackPreHook: isr=[%p],
pIsr
xlr8NatConntrackPreHook:
secure=[%d], secure
Context found for ESP %p,pFlowEntry>post.pIsr[0]
xlr8NatConntrackPreHook: New
connection.
DEBUG
xlr8NatConntrackPostHook:
postSecure=[%d] postIsr=[%p %p],
DEBUG
SPT=%u DPT=%u ,
SEQ=%u ACK=%u ,
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
239
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
User Manual
WINDOW=%u , ntohs(th->window)
RES=0x%02x ,
(u8)(ntohl(tcp_flag_word(th) &
TCP_RESERVED_BITS) >> 22)
URGP=%u , ntohs(th->urg_ptr)
DEBUG
TRUNCATED
DEBUG
%02X, op[i]
DEBUG
PROTO=UDP
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
PROTO=AH
DEBUG
DEBUG
SPI=0x%x , ntohl(ah->spi)
DEBUG
PROTO=ESP
DEBUG
DEBUG
DEBUG
PROTO=%u , ih->protocol
UID=%u , skb->sk->sk_socket->file>f_uid
<%d>%sIN=%s OUT=%s , loginfo>u.log.level,
level_string
DEBUG
%sIN=%s OUT=%s ,
%s , prefix == NULL ? loginfo->prefix :
prefix
DEBUG
IN=
OUT=
PHYSIN=%s , physindev->name
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
IPsec
DEBUG
IPsec
DEBUG
IPsec
DEBUG
IPsec
DEBUG
IPsec
DEBUG
IPsec
DEBUG
DEBUG
DEBUG
%02x, *p
. %u.%u.%u.%u, NIPQUAD(trt>rt_dst)
%02x, *p
. %u.%u.%u.%u, NIPQUAD(trt>rt_dst)
DEBUG
%02x, *p
unable to register vIPsec kernel comp
to UMI
unregistering VIPSECK from UMI ....
in vIPsecKIoctlHandler cmd - %d, cmd
DEBUG
240
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
User Manual
PHYSOUT=%s , physoutdev->name
DEBUG
MAC=
DEBUG
%02x%c, *p,
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
version
offset_before=%d, offset_after=%d,
correction_pos=%u, x->offset_before, x>offset_after, x->correction_pos
DEBUG
ip_ct_h323:
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
INFO
INFO
INFO
INFO
INFO
INFO
DEBUG
DEBUG
IPT_ACCOUNT_NAME : checkentry()
wrong network/netmask.
account: Wrong netmask given by
netmask parameter (%i). Valid is 32 to
0., netmask
DEBUG
IPT_ACCOUNT_NAME : checkentry()
failed to create procfs entry.
INFO
DEBUG
DEBUG
IPT_ACCOUNT_NAME : checkentry()
failed to register match.
failed to create procfs entry .
INFO
INFO
DEBUG
MPPE/MPPC encryption/compression
module registered
INFO
DEBUG
DEBUG
MPPE/MPPC encryption/compression
module unregistered
PPP generic driver version
PPP_VERSION
DEBUG
MPPE/MPPC encryption/compression
module registered
INFO
DEBUG
MPPE/MPPC encryption/compression
module unregistered
INFO
DEBUG
INFO
DEBUG
DEBUG
INFO
INFO
DEBUG
DEBUG
INFO
INFO
%02X, ptr[length]
%02X, ((unsigned char *) m -
DEBUG
DEBUG
INFO
INFO
241
INFO
INFO
INFO
INFO
User Manual
>msg_iov[i].iov_base)[j]
%02X, skb->data[i]
_lvl PPPOL2TP: _fmt, ##args
%02X, ptr[length]
%02X, ((unsigned char *) m >msg_iov[i].iov_base)[j]
DEBUG
DEBUG
DEBUG
De initializing by \
kernel UMI module loaded
kernel UMI module unloaded
INFO
INFO
INFO
DEBUG
INFO
%02X, skb->data[i]
_lvl PPPOL2TP: _fmt, ##args
%02X, ptr[length]
%02X, ((unsigned char *) m >msg_iov[i].iov_base)[j]
DEBUG
DEBUG
DEBUG
INFO
INFO
INFO
DEBUG
INFO
%02X, skb->data[i]
KERN_EMERG THE value read is
%d,value*/
KERN_EMERG Factory Reset button is
pressed
DEBUG
DEBUG
INFO
DEBUG
INFO
DEBUG
INFO
DEBUG
Loading mii
INFO
DEBUG
Unloading mii
INFO
DEBUG
DEBUG
INFO
INFO
INFO
DEBUG
DEBUG
DEBUG
DEBUG
End
CVM_MOD_EXP_BASE MISMATCH
cmd=%x base=%x, cmd,
DEBUG
%s, tmpbuf
INFO
DEBUG
VLAN2
INFO
DEBUG
DEBUG
VLAN3
VLAN4 <%d %d>,
INFO
INFO
DEBUG
DEBUG
DEBUG
DEBUG
INFO
INFO
INFO
INFO
kmalloc failed
DEBUG
INFO
kmalloc failed
kmalloc failed
kmalloc Failed
kmalloc failed
unknown cyrpto ioctl cmd received %x,
cmd
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
INFO
DEBUG
INFO
DEBUG
DEBUG
INFO
INFO
242
INFO
INFO
INFO
INFO
INFO
INFO
INFO
INFO
User Manual
DEBUG
INFO
DEBUG
DEBUG
DEBUG
DEBUG
INFO
INFO
INFO
INFO
DEBUG
INFO
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
INFO
DEBUG
INFO
DEBUG
INFO
DEBUG
INFO
DEBUG
INFO
INFO
INFO
INFO
INFO
INFO
DEBUG
INFO
DEBUG
DEBUG
INFO
INFO
DEBUG
DEBUG
INFO
INFO
DEBUG
DEBUG
DEBUG
DEBUG
INFO
INFO
INFO
INFO
DEBUG
DEBUG
INFO
INFO
DEBUG
INFO
DEBUG
INFO
%s, msg
%02x%s, data[i],
DEBUG
DEBUG
INFO
INFO
DEBUG
DEBUG
ICMP: %u.%u.%u.%u:
ICMP: %u.%u.%u.%u: Source
Wrong address mask %u.%u.%u.%u
from
Redirect from %u.%u.%u.%u on %s
about
DEBUG
DEBUG
243
INFO
INFO
INFO
INFO
User Manual
DEBUG
ICMP: %u.%u.%u.%u:
INFO
DEBUG
INFO
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
./Logs_kernel.txt:45:KERN_WARNING
DEBUG
DEBUG
DEBUG
./Logs_kernel.txt:59:KERN_WARNING
ipt_LOG: not logging via system
console
%s: wrong options length: %u, fname,
opt_len
%s: options rejected: o[0]=%02x,
o[1]=%02x,
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
244
INFO
INFO
INFO
INFO
INFO
INFO
INFO
INFO
INFO
INFO
INFO
INFO
INFO
INFO
INFO
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
User Manual
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
try_module_get failed
DEBUG
DEBUG
try_module_get failed
DEBUG
try_module_get failed
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
./pnac/src/pnac/linux/kernel/xcalibur.c:2
09:#define DEBUG_PRINTK printk
DEBUG
DEBUG
try_module_get failed
DEBUG
DEBUG
DEBUG
DEBUG
245
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
User Manual
DEBUG
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ll header:
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ll header:
DEBUG
DEBUG
IC Name: %s,ic->ic_dev->name
DEBUG
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
DEBUG
WARNIN
G
DEBUG
DEBUG
DEBUG
DEBUG
ll header:
martian destination %u.%u.%u.%u
from
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
246
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
G
WARNIN
User Manual
from
G
WARNIN
G
WARNIN
G
ERROR
DEBUG
DEBUG
DEBUG
ll header:
Unable to create ip_set_list
DEBUG
ERROR
DEBUG
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
247
ERROR
ERROR
ERROR
ERROR
User Manual
[%d]\tMacAddr\t%s, j,
[%d]\tDescp\t\t%s, j, ni>node_trace[i].descp
[%d]\tValue\t\t%llu(0x%llx), j, ni>node_trace[i].value,
ifmedia_add: null ifm
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
ifmedia_set: target
DEBUG
ifmedia_set: setting to
ifmedia_ioctl: switching %s to , dev>name
DEBUG
ERROR
DEBUG
ERROR
<unknown type>
desc->ifmt_string
DEBUG
DEBUG
DEBUG
<unknown subtype>
DEBUG
%s, desc->ifmt_string
%s%s, seen_option++ ? , : ,
DEBUG
DEBUG
%s%s, seen_option++ ? , : ,
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
248
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
__FUNCTION__
%s: failed to register sysctls!,
proc_name
PKTLOG_TAG %s: proc_mkdir failed,
__FUNCTION__
PKTLOG_TAG %s: pktlog_attach failed
for %s,
PKTLOG_TAG %s:allocation failed for
pl_info, __FUNCTION__
PKTLOG_TAG %s:allocation failed for
pl_info, __FUNCTION__
PKTLOG_TAG %s: create_proc_entry
failed for %s,
PKTLOG_TAG %s: sysctl register failed
for %s,
PKTLOG_TAG %s: page fault out of
range, __FUNCTION__
PKTLOG_TAG %s: page fault out of
range, __FUNCTION__
PKTLOG_TAG %s: Log buffer
unavailable, __FUNCTION__
DEBUG
ERROR
DEBUG
ppp_decompress_frame: no memory
ppp_mp_reconstruct bad seq %u <
%u,
ERROR
ERROR
ERROR
DEBUG
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
ERROR
PKTLOG_TAG
Logging should be disabled before
changing bufer size
%s:allocation failed for pl_info, __func__
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
249
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
BK\t%s\t\t%d\t%6d\t\t%s\t%d,
VI\t%s\t\t%d\t%6d\t\t%s\t%d,
DEBUG
DEBUG
ERROR
ERROR
VO\t%s\t\t%d\t%6d\t\t%s\t%d,
--%d,%p,%lu:0x%x 0x%x 0x%p 0x%x
0x%x 0x%x 0x%x,
bb state: 0x%08x 0x%08x, bbstate(sc,
4ul), bbstate(sc, 5ul)
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
250
ERROR
ERROR
ERROR
ERROR
User Manual
,__func__
int)len
DEBUG
%03d:, i
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
Inteference detected
rx_clear=%d, rx_frame=%d,
tx_frame=%d,
%s: resume beacon xmit after %u
misses,
%s: stuck beacon; resetting (bmiss
count %u),
DEBUG
DEBUG
DEBUG
ERROR
DEBUG
ERROR
EMPTY QUEUE
SWRInfo: seqno %d isswRetry %d
retryCnt %d,wh ? (*(u_int16_t *)&wh>i_seq[0]) >> 4 : 0, bf->bf_isswretry,bf>bf_swretries
Buffer #%08X --> Next#%08X
Prev#%08X Last#%08X,bf,
TAILQ_NEXT(bf,bf_list),
Stas#%08X flag#%08X
Node#%08X, bf->bf_status, bf>bf_flags, bf->bf_node
Descr #%08X --> Next#%08X
Data#%08X Ctl0#%08X Ctl1#%08X, bf>bf_daddr, ds ->ds_link, ds->ds_data,
ds->ds_ctl0, ds->ds_ctl1
Ctl2#%08X Ctl3#%08X
Sta0#%08X Sta1#%08X,ds ->ds_hw[0],
ds->ds_hw[1], lastds ->ds_hw[2], lastds >ds_hw[3]
Error entering wow mode
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
251
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
User Manual
>ifName
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
DEBUG
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
Multicast Q:
%p , buf
buf flags - 0x%08x --------- , buf>bf_flags
DEBUG
DEBUG
DEBUG
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
ERROR
DEBUG
252
ERROR
ERROR
ERROR
ERROR
User Manual
0x%08x 0x%08x,
0x%08x 0x%08x 0x%08x 0x%08x,
DEBUG
sc_txq[%d] : , i
DEBUG
DEBUG
DEBUG
%p , buf
axq_q:
%s: unable to reset hardware; hal status
%u, __func__, status
DEBUG
DEBUG
****ASSERTION HIT****
MacAddr=%s,
DEBUG
DEBUG
TxBufIdx=%d, i
DEBUG
Tid=%d, tidno
AthBuf=%p, tid->tx_buf[i]
%s: unable to reset hardware; hal status
%u,
%s: unable to reset hardware; hal status
%u,
DEBUG
DEBUG
DEBUG
_fmt, __VA_ARGS__ \
sample_pri=%d is a multiple of
refpri=%d, sample_pri, refpri
===========ft>ft_numfilters=%u===========, ft>ft_numfilters
filter[%d] filterID = %d
rf_numpulses=%u; rf->rf_minpri=%u; rf>rf_maxpri=%u; rf->rf_threshold=%u; rf>rf_filterlen=%u; rf->rf_mindur=%u; rf>rf_maxdur=%u,j, rf->rf_pulseid,
NOL
DEBUG
ERROR
ERROR
DEBUG
DEBUG
ERROR
DEBUG
DEBUG
ERROR
ERROR
DEBUG
DEBUG
DEBUG
CRITICAL
CRITICAL
CRITICAL
DEBUG
CRITICAL
DEBUG
CRITICAL
DEBUG
DEBUG
CRITICAL
DEBUG
DEBUG
CRITICAL
CRITICAL
DEBUG
DEBUG
DEBUG
253
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
ERROR
CRITICAL
User Manual
DEBUG
DEBUG
DEBUG
DEBUG
mac 00-00-00-00-00-00
DEBUG
%02x, hk->kv_mic[i]
DEBUG
txmic
DEBUG
%02x, hk->kv_txmic[i]
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
DEBUG
CRITICAL
CRITICAL
CRITICAL
CRITICAL
CRITICAL
CRITICAL
CRITICAL
DEBUG
DEBUG
DEBUG
ESP-BAD: %p %p,sav,m
CRITICAL
DEBUG
DEBUG
DEBUG
Bug in ip_route_input_slow().
Bug in ip_route_input_slow().
Bug in ip_route_input \
CRITICAL
CRITICAL
CRITICAL
DEBUG
Bug in ip_route_input_slow().
AH: Assigning the secure flags for sav
:%p,sav
ESP: Assigning the secure flags for
sav :%p skb:%p src:%x
dst:%x,sav,skb,ip->ip_src.s_addr,ip>ip_dst.s_addr
%s Buffer %d mtu %d path mtu %d
header %d trailer
%d,__func__,bufMgrLen(pBufMgr),mtu
,dst_mtu(pDst->path),pDst>header_len,pDst->trailer_len
CRITICAL
DEBUG
DEBUG
254
CRITICAL
CRITICAL
CRITICAL
CRITICAL
CRITICAL
CRITICAL
CRITICAL
CRITICAL
CRITICAL
CRITICAL
CRITICAL
User Manual
Adapter
RJ-45 PIN
DB-9 PIN
CTS
NC
NC
NC
DTR
NC
NC
NC
TxD
RxD
GND
GND
GND
GND
RxD
TxD
DSR
NC
NC
NC
RTS
NC
NC
NC
Signal
Signal
255
User Manual
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
The antennas used for this transmitter must be installed to provide a spectrum distance of at least 20cm
from all persons and must not be co-located or operating in conjunction with any other antenna or
transmitter.
This transmitter is restricted to indoor use in the 5150MHz to 5250MHz frequency range.
Non-modification Statement
Use only the integral antenna supplied by the manufacturer when operating this device. Unauthorized
antennas, modifications, or attachments could damage the TI Navigator access point and violate FCC
regulations. Any changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate this equipment.
256
User Manual
This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member
states and EFTA countries under the following conditions and/or with the following restrictions:
- In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain
authorization to use the device for setting up outdoor radio links and/or for supplying public access to
telecommunications and/or network services.
- This device may not be used for setting up outdoor radio links in France and in some areas the RF output
power may be limited to 10 mW EIRP in the frequency range of 2454 2483.5 MHz. For detailed
information the enduser should contact the national spectrum authority in France.
This device is a 5 GHz wideband transmission system (transceiver), intended for use in all EU member
states and EFTA countries under the following conditions and/or with the following restrictions:
- This device may only be used indoors in the frequency bands 5150 5250 MHz.
- In France and Luxembourg a limited implementation of the frequency bands 5150 5250 MHz and 5250
5350 MHz. In Luxermbourg it is not allowed to make use of the frequency band 5470 5725 MHz. Endusers are encouraged to contact the national spectrum authorities in France and Luxembourg in order to
obtain the latest information about any restrictions in the 5 GHz frequency band(s).
257
User Manual
esky
[Czech]
Dansk
[Danish]
Deutsch
[German]
Eesti
[Estonian]
English
Hereby, [D-Link Corporation], declares that this [DSR-1000N] is in compliance with the
essential requirements and other relevant provisions of Directive 1999/5/EC.
Espaol
[Spanish]
Por medio de la presente [D-Link Corporation] declara que el [DSR-1000N] cumple con
los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la
Directiva 1999/5/CE.
[Greek]
[D-Link
Corporation] [DSR-1000N]
1999/5/.
Franais
[French]
Par la prsente [D-Link Corporation] dclare que l'appareil [DSR-1000N] est conforme
aux exigences essentielles et aux autres dispositions pertinentes de la directive
1999/5/CE.
Italiano
[Italian]
Latviski
[Latvian]
Lietuvi
[Lithuanian]
Nederlands
[Dutch]
Malti
[Maltese]
Magyar
[Hungarian]
Polski
[Polish]
258
Portugus
[Portuguese]
Slovensko
[Slovenian]
Slovensky
[Slovak]
User Manual
Suomi
[Finnish]
Svenska
[Swedish]
259
User Manual
2.DSR-500N
Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses, and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference to
radio communications. However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by
one or more of the following measures:
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
The antennas used for this transmitter must be installed to provide a spectrum distance of at least 20cm
from all persons and must not be co-located or operating in conjunction with any other antenna or
transmitter.
This transmitter is restricted to indoor use in the 5150MHz to 5250MHz frequency range.
Non-modification Statement
Use only the integral antenna supplied by the manufacturer when operating this device. Unauthorized
antennas, modifications, or attachments could damage the TI Navigator access point and violate FCC
regulations. Any changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate this equipment.
Canadian Department of Communications Industry Canada (IC) Notice
This Class B digital apparatus complies with Canadian ICES-003 and RSS-210. Cet appareil numrique de
la classe B est conforme la norme NMB-003 et CNR-210 du Canada.
Industry Canada Statement
This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two
conditions:
1) This device may not cause harmful interference, and
2) This device must accept any interference received, including interference that may cause
undesired operation.
IMPORTANT NOTE: Radiation Exposure Statement
This equipment complies with IC radiation expos ure limits set forth for an uncontrolled environment.
End users must follow the specific operating instructions for satisfying RF exposure compliance.
To maintain compliance with IC RF exposure compliance requirements, please follow operation instruction
as documented in this manual.
260
User Manual
261
User Manual
esky
[Czech]
Dansk
[Danish]
Deutsch
[German]
Hiermit erklrt [D-Link Corporation], dass sich das Gert [DSR-500N] in bereinstimmung
mit den grundlegenden Anforderungen und den brigen einschlgigen Bestimmungen der
Richtlinie 1999/5/EG befindet.
Eesti
[Estonian]
English
Espaol
[Spanish]
[Greek]
Franais
[French]
Hereby, [D-Link Corporation], declares that this [DSR-500N] is in compliance with the
essential requirements and other relevant provisions of Directive 1999/5/EC.
Por medio de la presente [D-Link Corporation] declara que el [DSR-500N] cumple con los
requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la
Directiva 1999/5/CE.
[D-Link Corporation] [DSR-500N]
1999/5/.
Par la prsente [D-Link Corporation] dclare que l'appareil [DSR-500N] est conforme aux
exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE.
Italiano
[Italian]
Latviski
[Latvian]
Lietuvi
[Lithuanian]
Nederlands
[Dutch]
Malti
[Maltese]
Magyar
[Hungarian]
Polski
[Polish]
262
Portugus
[Portuguese]
Slovensko
[Slovenian]
Slovensky
[Slovak]
User Manual
Suomi
[Finnish]
Svenska
[Swedish]
263
User Manual
3.DSR-250N
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference to
radio communications. However, there is no guarantee that interference will not occ ur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by
one of the following measures:
FCC Caution:
Any changes or modifications not expressly approved by the party responsible for compliance could void the
user's authority to operate this equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1)
This device may not cause harmful interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation.
RSS-GEN 7.1.4:
User Manual for Transmitters with Detachable Antennas
The user manual of transmitter devices equipped with detachable antennas shall contain the following
information in a conspicuous location:
This device has been designed to operate with the antennas listed below, and having a maximum gain of
[1.8] dB. Antennas not included in this list or having a gain greater than [1.8] dB are strictly prohibited for use
with this device. The required antenna impedance is [50] ohms.
RSS-GEN 7.1.5
To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that
the equivalent isotropically radiated power (e.i.r.p.) is not more than that permitted for successful
communication.
Le prsent appareil est conforme aux CNR d'Industrie Canada appli cables aux appareils radio exempts de
licence. L'exploitation est autorise aux deux conditions suivantes : (1) l'appareil ne doit pas produire de
brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radiolectrique subi, mme si le
brouillage est susceptible d'en com Spromettre le fonctionnement.
Is herewith confirmed to comply with the requirements set out in the Council Directive on the Approximation
of the Laws of the Member States relating to Electromagnetic Compatibility (2004/108/EC), Low-voltage
Directive (2006/95/EC), the procedures given in European Council Directive 99/5/EC and 2004/104/EC.
The equipment was passed. The test was performed according to the following European standards:
EN 300 328 V.1.7.1
EN 301 489-1 V.1. 8.1 / EN 301 489-17 V.2.1.1
EN 62311
EN 60950-1
264
User Manual
265
User Manual
4. DSR-150N
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
Part 15 of the FCC Rules. These limits are designed to provide reasonable protecti on against harmful
interference in a residential installation. This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference to
radio communications. However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is en couraged to try to correct the interference by
one of the following measures:
FCC Caution:
Any changes or modifications not expressly approved by the party responsible for compliance could void the
user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is
subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) this device must accept any interference received, including interference th at may cause undesired
operation.
IMPORTANT NOTE:
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This
equipment should be installed and operated with minimum distance 20cm between the radiator & your body.
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
The availability of some specific channels and/or operational frequency bands are country dependent and
are firmware programmed at the factory to match the intended destination. The firmware setting is not
accessible by the end user.
Note: The country code selection is for non-US model only and is not available to all US model. Per FCC
regulation, all WiFi product marketed in US must fixed to US operation channels only..
Europe EU Declaration of Conformity
This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following test
methods have been applied in order to prove presumption of conformity with the essential requirements of
the R&TTE Directive 1999/5/EC:
EN 60950-1:
Safety of Information Technology Equipment
EN50385 : (2002-08)
Product standard to demonstrate the compliance of radio base stations and fixed terminal stations for
wireless telecommunication systems with the basic restrictions or the reference levels related to human
exposure to radio frequency electromagnetic fields (110MHz - 40 GHz) - General public
EN 300 328 V1.7.1: (2006-10)
Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband Transmission systems; Data
transmission equipment operating in the 2,4 GHz ISM band and using spread spectrum modulation
techniques; Harmonized EN covering essential requirements under article 3.2 of the R& TTE Directive
EN 301 489-1 V1.8.1: (2008-04)
266
User Manual
Electromagnetic compatibility and Radio Spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC)
standard for radio equipment and services; Part 1: Common technical requirements
EN 301 489-17 V2.1.1 (2009-05)
Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC)
standard for radio equipment; Part 17: Specific conditions for Broadband Data Transmission Systems
This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member
states and EFTA countries, except in France and Italy where restrictive use applies.
In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain
authorization to use the device for setting up outdoor radio links and/or for supplying public access to
telecommunications and/or network services.
This device may not be used for setting up outdoor radio links in France and in some areas the RF output
power may be limited to 10 mW EIRP in the frequency range of 2454 2483.5 MHz. For detailed
information the end-user should contact the national spectrum authority in France.
esky
[Czech]
Dansk
[Danish]
Deutsch
[German]
Hiermit erklrt [Name des Herstellers], dass sich das Gert [Gertetyp] in
bereinstimmung mit den grundlegenden Anforderungen und den brigen einschlgigen
Bestimmungen der Richtlinie 1999/5/EG befindet.
Eesti
[Estonian]
English
Espaol
[Spanish]
[Greek]
Franais
[French]
Italiano
[Italian]
Con la presente [nome del costruttore] dichiara che questo [tipo di apparecchio]
conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva
1999/5/CE.
Latviski
[Latvian]
Lietuvi
[Lithuanian]
Nederlands
[Dutch]
Hierbij verklaart [naam van de fabrikant] dat het toestel [type van toestel] in
overeenstemming is met de essentile eisen en de andere relevante bepalingen van
richtlijn 1999/5/EG.
Malti
[Maltese]
Hawnhekk, [isem tal-manifattur], jiddikjara li dan [il-mudel tal-prodott] jikkonforma maltiijiet essenzjali u ma provvedimenti orajn relevanti li hemm fid -Dirrettiva 1999/5/EC.
Magyar
Alulrott, [gyrt neve] nyilatkozom, hogy a [... tpus] megfelel a vonatkoz alapvet
267
User Manual
[Hungarian]
Polski
[Polish]
Portugus
[Portuguese]
[Nome do fabricante] declara que este [tipo de equipamento] est conforme com os
requisitos essenciais e outras disposies da Directiva 1999/5/CE.
Slovensko
[Slovenian]
Slovensky
[Slovak]
[Meno vrobcu] tmto vyhlasuje, e [typ zariadenia] spa zkladn poiadavky a vetky
prslun ustanovenia Smernice 1999/5/ES.
Suomi
[Finnish]
Svenska
[Swedish]
268