Building Networks for People Unified Services Router User Manual DSR-150 / 150N / 250 / 250N / 500 / 500N / 1000 / 1000N Ver. 1.05 Small Business Gateway Solution User Manual Unified Services Router D-Link Corporation Copyright © 2012. http://www.dlink.com Unified Services Router User Manual User Manual DSR-150 / 150N /250 / 250N / DSR-500 / 500N / 1000 / 1000N Unified Services Router Version 1.05 Co p y rig h t © 2012 Copyright Notice Th is p u b licat io n , in clu d in g all p h o t o g rap h s , illu s t rat io n s an d s o ft ware, is p ro t ect ed u n d er in t ern at io n al co p y rig h t laws , wit h all rig h t s res erv ed . Neit h er t h is man u al, n o r an y o f t h e mat erial co n t ain ed h erein , may b e rep ro d u ced wit h o u t writ t en co n s en t o f t h e au t h o r. Disclaimer Th e in fo rmat io n in t h is d o cumen t is s ubject t o ch ange wit h o ut n o tice. Th e man u fact u rer makes n o rep res ent at ions o r warran t ies wit h res p ect t o t h e co n t en t s h ereo f an d s p ecifically d is claim an y imp lied warran t ies o f merch an t ab ilit y o r fit n es s fo r an y p art icu lar p u rp o s e. Th e man u fact u rer res erv es t h e rig h t t o rev is e t h is p u b licat io n an d t o make ch an g es fro m t ime t o t ime in t h e co n t ent h ereof wit h o ut o b lig at ion o f t h e man u factu rer t o n o t ify an y p ers o n o f s u ch rev is io n o r ch an g es . Limitations of Liability UNDER NO CIRCUM STA NCES SHA LL D -LINK OR ITS SUPPLIERS BE LIA BLE FOR DA M A GES OF A NY CHA RA CTER (E.G. DA M A GES FOR LOSS OF PROFIT, SOFTW A RE RESTORA TION, W ORK STOPPA GE, LOSS OF SA VED DA TA OR A NY OTHER COM M ERCIA L DA M A GES OR LOSSES) RESULTING FROM THE A PPLICA TION OR IM PROPER USE OF THE D-LINK PRODUCT OR FA ILURE OF THE PRODUCT, EVEN IF D-LINK IS INFORM ED OF THE POSSIBILITY OF SUCH DA M A GES. FURTHERM ORE, DLINK W ILL NOT BE LIA BLE FOR THIRD -PA RTY CLA IM S A GA INST CUSTOM ER FOR LOSSES OR DA M A GES. D-LINK W ILL IN NO EVENT BE LIA BLE FOR A NY DA M A GES IN EXCESS OF THE A M OUNT D -LINK RECEIVED FROM THE END-USER FOR THE PRODUCT. 1 Unified Services Router User Manual Table of Contents Chapter 1. Introduction.......................................................................................................................................... 11 1.1 About this User Manual .................................................................................................... 12 1.2 Typographical Conventions ............................................................................................. 12 Chapter 2. Configuring Your Network: LAN Setup ...................................................................................... 13 2.1 LAN Configuration .............................................................................................................. 13 2.1.1 LAN DHCP Reserved IPs ................................................................................................ 16 2.1.2 LAN DHCP Leas ed Clients.............................................................................................. 17 2.1.3 LAN Configuration in an IP v6 Network ........................................................................ 18 2.1.4 Configuring IP v6 Router Advertisements ................................................................... 21 2.2 VLAN Configuration ........................................................................................................... 23 2.2.1 Associating VLANs to ports ............................................................................................. 24 2.2.2 Multiple VLA N Subnets ..................................................................................................... 26 2.2.3 VLAN configuration ............................................................................................................ 27 2.3 2.4 2.5 Configurable Port: DMZ Setup ....................................................................................... 28 Universal Plug and Play (UP nP).................................................................................... 29 Captive Portal ....................................................................................................................... 31 2.6 Captive portal setup ........................................................................................................... 32 Chapter 3. Connecting to the Int ernet: WAN Setup .................................................................................... 35 3.1 3.2 3.2.1 3.2.2 3.2.3 3.2.4 3.2.5 3.2.6 3.2.7 3.2.8 3.3 Internet Setup Wizard........................................................................................................ 35 WAN Configuration............................................................................................................. 36 WAN Port IP address ........................................................................................................ 37 WAN DNS Servers ............................................................................................................. 37 DHCP WAN .......................................................................................................................... 37 PPPoE .................................................................................................................................... 38 Russia L2TP and PP TP WAN ........................................................................................ 41 Russia Dual Access PPPoE............................................................................................ 42 WAN Configuration in an IP v6 Network ...................................................................... 43 Checking WAN Status....................................................................................................... 45 Bandwidth Cont rols ............................................................................................................ 47 3.4 3.4.1 3.4.2 3.4.3 3.5 3.5.1 3.5.2 3.5.3 3.5.4 3.5.5 3.5.6 3.5.7 Features with Multiple WAN Links ................................................................................ 49 Auto Failover ........................................................................................................................ 49 Load Balancing .................................................................................................................... 50 Protocol Bindings ................................................................................................................ 52 Routing Configuration........................................................................................................ 53 Routing Mode ....................................................................................................................... 53 Dynamic Routing (RIP) ..................................................................................................... 56 Static Routing ....................................................................................................................... 57 OSPFv2 .................................................................................................................................. 58 OSPFv3 .................................................................................................................................. 60 6to4 Tunneling ..................................................................................................................... 62 ISA TAP Tunnels .................................................................................................................. 63 3.6 3.7 3.8 Configurable Port - WAN Option ................................................................................... 64 WAN 3 (3G) Configuration............................................................................................... 64 WAN Port Settings.............................................................................................................. 66 2 Unified Services Router User Manual Chapter 4. Wireless Access Point Setup ........................................................................................................ 68 4.1 Wireless Settings Wizard ................................................................................................. 68 4.1.1 Wireless Network Setup Wizard .................................................................................... 69 4.1.2 Add Wireless Device with WPS ..................................................................................... 69 4.1.3 Manual Wireless Net work Setup ................................................................................... 70 4.2 Wireless Profiles.................................................................................................................. 70 4.2.1 WEP Security ....................................................................................................................... 71 4.2.2 WPA or WPA2 with PSK .................................................................................................. 73 4.2.3 RADIUS Authentication .................................................................................................... 73 4.3 4.3.1 4.4 Creating and Using Access Points ............................................................................... 75 Primary benefits of Virtual APs: ..................................................................................... 77 Tuning Radio Specific Settings ...................................................................................... 78 4.5 4.6 4.7 WMM ....................................................................................................................................... 79 Wireless distribution system (WDS) ............................................................................. 80 Advanced Wireless Settings ........................................................................................... 81 4.8 Wi-Fi Protected Setup (WPS) ......................................................................................... 82 Chapter 5. Securing the Private Network ....................................................................................................... 85 5.1 5.2 5.3 Firewall Rules ....................................................................................................................... 85 Defining Rule Schedules .................................................................................................. 86 Configuring Firewall Rules ............................................................................................... 87 5.4 5.4.1 Configuring IP v6 Firewall Rules ..................................................................................... 92 Firewall Rule Configuration Examples......................................................................... 93 5.5 5.6 5.7 Security on Custom Servic es.......................................................................................... 97 ALG support .......................................................................................................................... 99 VPN Passthrough for Firewall ...................................................................................... 100 5.8 5.9 5.9.1 5.9.2 5.9.3 5.9.4 5.10 Application Rules .............................................................................................................. 101 Web Content Filtering...................................................................................................... 102 Cont ent Filtering ................................................................................................................ 102 Approved URLs ................................................................................................................. 103 Blocked Keywords ............................................................................................................ 104 Export Web Filter .............................................................................................................. 105 IP/MAC Binding ................................................................................................................. 106 5.11 5.12 Intrusion Prevention (IPS ).............................................................................................. 107 Protecting from Internet Attacks .................................................................................. 108 Chapter 6. IPsec / PPTP / L2TP VPN ............................................................................................................ 111 6.1 6.2 6.2.1 6.2.2 6.3 VPN Wizard ........................................................................................................................ 113 Configuring IPsec Policies ............................................................................................. 115 Extended Aut hentication (XAUTH) ............................................................................. 119 Internet over IPS ec tunnel ............................................................................................. 120 Configuring VPN clients .................................................................................................. 120 6.4 6.4.1 6.4.2 6.4.3 6.4.4 6.4.5 PPTP / L2TP Tunnels ...................................................................................................... 120 PPTP Tunnel Support ..................................................................................................... 120 L2TP Tunnel Support ...................................................................................................... 122 OpenVPN Support ............................................................................................................ 123 OpenVPN Remote Net work .......................................................................................... 125 OpenVPN Authentication ............................................................................................... 126 3 Unified Services Router User Manual Chapter 7. SSL VPN ............................................................................................................................................ 129 7.1 Groups and Users............................................................................................................. 131 7.1.1 Users and Passwords ..................................................................................................... 137 7.2 Using SSL VPN Policies ................................................................................................. 138 7.2.1 Using Network Res ourc es ............................................................................................. 141 7.3 Application Port Forwarding .......................................................................................... 142 7.4 SSL VPN Client Configuration...................................................................................... 144 7.5 7.5.1 User Portal .......................................................................................................................... 147 Creating Portal Layouts .................................................................................................. 147 Chapter 8. Advanced Configuration Tools ................................................................................................... 150 8.1 USB Device Setup ............................................................................................................ 150 8.2 USB share port .................................................................................................................. 151 8.3 8.4 8.5 SMS service........................................................................................................................ 153 Authentication Certificates ............................................................................................. 154 Advanced S witch Configuration ................................................................................... 156 Chapter 9. Administration & Management ................................................................................................... 157 9.1 Configuration Access Control ....................................................................................... 157 9.1.1 Admin Settings ................................................................................................................... 157 9.1.2 Remote Management ...................................................................................................... 158 9.1.3 CLI Access .......................................................................................................................... 159 9.2 9.3 SNMP Configuration ........................................................................................................ 159 Configuring Time Zone and NTP ................................................................................. 161 9.4 9.4.1 9.4.2 9.4.3 9.5 Log Configuration.............................................................................................................. 162 Defining What to Log ....................................................................................................... 162 Sending Logs to E-mail or Syslog ............................................................................... 167 E vent Log Viewer in GUI ................................................................................................ 169 Backing up and Restoring Configuration Settings ................................................. 170 9.6 9.7 9.8 Upgrading Router Firmware.......................................................................................... 171 Upgrading Router Firmware via USB......................................................................... 172 Dynamic DNS Setup ........................................................................................................ 173 9.9 9.9.1 9.9.2 9.9.3 9.9.4 Using Diagnostic Tools ................................................................................................... 174 Ping........................................................................................................................................ 175 Trace Route ........................................................................................................................ 175 DNS Lookup ....................................................................................................................... 176 Rout er Options ................................................................................................................... 176 9.10 Localization ......................................................................................................................... 177 Chapter 10. Rout er Status and Statistics ........................................................................................................ 178 10.1 System Overview .............................................................................................................. 178 10.1.1 Device Status ..................................................................................................................... 178 10.1.2 Resource Utilization ......................................................................................................... 180 10.2 Traffic Statistics ................................................................................................................. 183 10.2.1 Wired Port Statistics......................................................................................................... 183 10.2.2 Wireless Statistics............................................................................................................. 184 10.3 Active Connections........................................................................................................... 185 10.3.1 Sessions through the Router ........................................................................................ 185 4 Unified Services Router User Manual 10.3.2 Wireless Clients ................................................................................................................. 187 10.3.3 LAN Clients ......................................................................................................................... 187 10.3.4 Active VPN Tunnels ......................................................................................................... 188 Chapter 11. Trouble Shooting ............................................................................................................................. 190 11.1 11.2 11.3 11.3.1 11.3.2 Internet connection ........................................................................................................... 190 Date and time ..................................................................................................................... 192 Pinging to Test LAN Connectivity................................................................................ 192 Testing the LA N path from your P C to your router ................................................ 192 Testing the LA N path from your P C to a remote device ...................................... 193 11.4 Restoring factory-default configuration settings ..................................................... 194 Chapter 12. Credits ................................................................................................................................................. 195 Appendix A. Glossary ............................................................................................................................................. 196 Appendix B. Factory Default Settings................................................................................................................ 199 Appendix C. Standard Services A vailable for Port Forwarding & Firewall Configuration ................ 200 Appendix D. Log Output Reference ................................................................................................................... 201 Appendix E. RJ-45 Pin-outs.................................................................................................................................. 255 Appendix F. Product Statement .......................................................................................................................... 256 5 Unified Services Router User Manual List of Figures Figure 1: Setup page for LA N TCP/IP settings ................................................................................................. 15 Figure 2: LAN DHCP Reserved IPs ..................................................................................................................... 17 Figure 3: LAN DHCP Leased Clients ................................................................................................................... 18 Figure 4: IP v6 LA N and DHCP v6 configuration ............................................................................................... 19 Figure 5: Configuring the Router Advertisement Daemon ........................................................................... 22 Figure 6: IP v6 Advertisement Prefix settings .................................................................................................... 23 Figure 7: Adding VLAN memberships to the LAN ........................................................................................... 24 Figure 8: Port VLAN list ............................................................................................................................................ 25 Figure 9: Configuring VLAN membership for a port........................................................................................ 26 Figure 10: Multiple VLAN Subnets........................................................................................................................ 27 Figure 11: VLA N Configuration .............................................................................................................................. 28 Figure 12: DMZ configuration ................................................................................................................................. 29 Figure 13: UP nP Configuration .............................................................................................................................. 30 Figure 14: Active Runtime sessions ..................................................................................................................... 32 Figure 15: Captive Port al Setup............................................................................................................................. 33 Figure 16: Customized Captive Portal Setup .................................................................................................... 34 Figure 17: Internet Connection Setup Wizard ................................................................................................... 35 Figure 18: Manual WAN configuration ................................................................................................................. 38 Figure 19: PPPoE configuration for standard ISPs ......................................................................................... 39 Figure 20: WAN configuration for Japanese Multiple PPPoE (part 1) ...................................................... 40 Figure 21: WAN configuration for Multiple PPPoE (part 2) .......................................................................... 41 Figure 22: Russia L2TP ISP configuration ......................................................................................................... 42 Figure 23: Russia Dual access PPPoE configuration .................................................................................... 43 Figure 24: IP v6 WAN Setup page ......................................................................................................................... 44 Figure 25: Connection Status information for both WAN ports ................................................................... 46 Figure 26: List of Configured Bandwidth Profiles ............................................................................................ 47 Figure 27: Bandwidth Profile Configuration page ............................................................................................ 48 Figure 28: Traffic Selector Configuration ............................................................................................................ 49 Figure 29: Load Balancing is available when multiple WAN ports are configured and Protocol Bindings have been defined ............................................................................................................... 52 Figure 30: Protocol binding setup to associate a service and/or LAN source to a WAN and/or destination network ................................................................................................................................ 53 Figure 31: Routing Mode is used to configure traffic routing between WAN and LAN, as well as Dynamic routing (RIP) .......................................................................................................................... 55 Figure 32: Static route configuration fields......................................................................................................... 58 6 Unified Services Router User Manual Figure 33: OSPFv2 configured parameters ....................................................................................................... 59 Figure 34: OSPFv2 configuration .......................................................................................................................... 60 Figure 35: OSPFv3 configured parameters ....................................................................................................... 61 Figure 36: OSPFv3 configuration .......................................................................................................................... 62 Figure 37: 6 to 4 tunneling ....................................................................................................................................... 63 Figure 38: ISA TAP Tunnels Configuration ......................................................................................................... 64 Figure 39: WAN3 configuration for 3G internet ................................................................................................ 66 Figure 40: Physical WAN port settings ................................................................................................................ 67 Figure 41: Wireless Network Setup Wizards ..................................................................................................... 69 Figure 42: List of A vailable Profiles shows the options available to secure the wireless link .......... 71 Figure 43: Profile configuration to set network security ................................................................................. 73 Figure 44: RA DIUS server (External Authentication) configuration .......................................................... 75 Figure 45: Virtual AP configuration ....................................................................................................................... 76 Figure 46: List of configured access points (Virtual APs) shows one enabled access point on the radio, broadcasting its SSID ............................................................................................................... 77 Figure 47: Radio card configuration options ...................................................................................................... 78 Figure 48: Wi-Fi Multimedia .................................................................................................................................... 79 Figure 49: Wireless Distribution System ............................................................................................................. 80 Figure 50: Advanced Wireless communication settings ................................................................................ 82 Figure 51: WPS configuration for an AP with WPA/WPA2 profile ............................................................. 83 Figure 52: List of A vailable Firewall Rules ......................................................................................................... 86 Figure 53: List of A vailable Schedules to bind to a firewall rule ................................................................. 87 Figure 54: Example where an outbound SNAT rule is used to map an external IP address (209.156.200.225) to a private DMZ IP address (10.30.30.30) ............................................. 90 Figure 55: The firewall rule configuration page allows you to define the To/From zone, service, action, schedules, and specify source/destination IP addresses as needed. ................... 91 Figure 56: The IPv6 firewall rule configuration page allows you to define the To/From zone, service, action, schedules, and specify source/ destination IP addresses as needed. .. 92 Figure 57: List of A vailable IP v6 Firewall Rules ............................................................................................... 93 Figure 58: Schedule configuration for the above example. .......................................................................... 96 Figure 59: List of us er defined services. ............................................................................................................. 98 Figure 60: Custom Services configuration ......................................................................................................... 98 Figure 61: A vailable ALG support on the router. ........................................................................................... 100 Figure 62: Passthrough options for VPN tunnels .......................................................................................... 101 Figure 63: List of A vailable Application Rules showing 4 unique rules .................................................. 102 Figure 64: Content Filtering used to block access to proxy servers and prevent ActiveX controls from being downloaded...................................................................................................................... 103 7 Unified Services Router User Manual Figure 65: Two trusted domains added to the Approved URLs List ....................................................... 104 Figure 66: One keyword added to the block list ............................................................................................. 105 Figure 67: Export Approved URL list ................................................................................................................. 106 Figure 68: The following example binds a LAN host’s MAC Address to an IP address served by DSR. If there is an IP/MAC Binding violation, the violating packet will be dropped and logs will be capt ured............................................................................................................................ 107 Figure 69: Intrusion Prevention features on the router ................................................................................ 108 Figure 70: Protecting the router and LAN from internet attacks ............................................................... 109 Figure 71: Example of Gateway-to-Gateway IPsec VPN tunnel using two DSR routers connected to the Internet......................................................................................................................................... 111 Figure 72: Example of three IPsec client connections to the internal network through the DSR IPsec gateway ....................................................................................................................................... 112 Figure 73: VPN Wizard launch screen .............................................................................................................. 113 Figure 74: IPsec policy configuration ................................................................................................................. 116 Figure 75: IPsec policy configuration continued (Auto policy via IKE) ................................................... 117 Figure 76: IPsec policy configuration continued (Auto / Manual Phas e 2) ........................................... 119 Figure 77: PP TP tunnel configuration – PP TP Client................................................................................... 121 Figure 78: PP TP VPN connection status.......................................................................................................... 121 Figure 79: PP TP tunnel configuration – PP TP Server ................................................................................. 122 Figure 80: L2TP tunnel configuration – L2TP Server................................................................................... 123 Figure 81: OpenVP N configuration ..................................................................................................................... 125 Figure 82: OpenVP N Remote Network ............................................................................................................. 126 Figure 83: OpenVP N Authentication .................................................................................................................. 127 Figure 84: Example of clientless SSL VPN connections to the DS R ...................................................... 130 Figure 85: List of groups ......................................................................................................................................... 131 Figure 86: User group configuration ................................................................................................................... 132 Figure 87: SSLVPN Settings................................................................................................................................. 133 Figure 88: Group login policies options ............................................................................................................. 134 Figure 89: Browser policies options ................................................................................................................... 135 Figure 90: IP policies options................................................................................................................................ 136 Figure 91: A vailable Users with login status and associated Group ....................................................... 137 Figure 92: User configuration options ................................................................................................................ 138 Figure 93: List of SSL VPN polices (Global filter) .......................................................................................... 139 Figure 94: SSL VPN policy configuration ......................................................................................................... 140 Figure 95: List of configured resources, which are available to assign to SSL VPN policies ........ 142 Figure 96: List of A vailable Applications for SSL Port Forwarding .......................................................... 144 Figure 97: SSL VPN client adapter and access configuration .................................................................. 145 8 Unified Services Router User Manual Figure 98: Configured client routes only apply in split tunnel mode........................................................ 146 Figure 99: List of configured SSL VPN portals. The configured portal can then be associated with an aut hentication domain .................................................................................................................. 147 Figure 100: SSL VPN Portal configuration ....................................................................................................... 149 Figure 101: USB Device Detection ..................................................................................................................... 151 Figure 102: USB SharePort................................................................................................................................... 152 Figure 103: SMS Service – Send SMS ............................................................................................................. 153 Figure 104: SMS Service – Receive SMS ....................................................................................................... 154 Figure 105: Certificate summary for IPsec and HTTPS management ................................................... 155 Figure 106: Advanced Switch Settings.............................................................................................................. 156 Figure 107: User Login policy configuration .................................................................................................... 157 Figure 108: Admin Settings ................................................................................................................................... 158 Figure 109: Remote Management from the WAN ......................................................................................... 159 Figure 110: SNMP Users, Traps, and Access Control ................................................................................ 160 Figure 111: SNMP system information for this router .................................................................................. 161 Figure 112: Date, Time, and NTP server setup ............................................................................................. 162 Figure 113: Facility settings for Logging ........................................................................................................... 164 Figure 114: Log configuration options for traffic through router ................................................................ 166 Figure 115: IP v6 Log configuration options for traffic through router ..................................................... 167 Figure 116: E-mail configuration as a Remote Logging option ................................................................. 168 Figure 117: Syslog server configuration for Remote Logging (continued)............................................ 169 Figure 118: VPN logs displayed in GUI event viewer .................................................................................. 170 Figure 119: Restoring configuration from a saved file will result in the current configuration being overwritten and a reboot .................................................................................................................... 171 Figure 120: Firmware version information and upgrade option ................................................................ 172 Figure 121: Firmware upgrade and configuration restore/backup via USB .......................................... 173 Figure 122: Dynamic DNS configuration .......................................................................................................... 174 Figure 123: Router diagnostics tools available in the GUI ......................................................................... 175 Figure 124: Sample trace route out put .............................................................................................................. 176 Figure 125: Localization ......................................................................................................................................... 177 Figure 126: Device Status display ...................................................................................................................... 179 Figure 127: Device Status display (continued) ............................................................................................... 180 Figure 128: Resource Utilization statistics ....................................................................................................... 181 Figure 129: Resource Utilization data (continued) ........................................................................................ 182 Figure 130: Resource Utilization data (continued) ........................................................................................ 183 Figure 131: Physical port statistics ..................................................................................................................... 184 9 Unified Services Router User Manual Figure 132: AP specific statistics......................................................................................................................... 185 Figure 133: List of current Active Firewall Sessions ..................................................................................... 186 Figure 134: List of connected 802.11 clients per AP .................................................................................... 187 Figure 135: List of LAN hosts ............................................................................................................................... 188 Figure 136: List of current Active VPN Sessions ........................................................................................... 189 10 Unified Services Router User Manual Chapter 1. Introduction D-Lin k Un ified Serv ices Ro u t ers o ffer a s ecu re, h ig h p erforman ce n et wo rkin g s o lu t io n t o ad d ress t h e g rowin g n eed s o f s mall an d med iu m b u s in es s es . In t eg rat ed h ig h -s p eed IEEE 802.11n an d 3G wireles s t ech n o lo g ies o ffer co mp arab le p erfo rman ce t o t rad it io n al wired n et wo rks , b u t wit h fewer limit at io n s . Op t imal n et wo rk s ecu rit y is p ro v id ed v ia feat u res s u ch as v irt u al p riv at e n et wo rk (VPN) t u n n els , IP Secu rit y (IPs ec ), Po in t -t o -Poin t Tu n nelin g Pro t ocol (PPTP), Lay er 2 Tu n n elin g Pro t ocol (L2TP), an d Secu re So cket s Lay er (SSL). Emp o wer y o u r ro ad warrio rs wit h clien t les s remo t e acces s an y wh ere an d an y t ime u s in g SSL VPN t u n n els . W it h t h e D-Lin k Un ified Serv ices Ro u t er y o u are ab le t o exp erien ce a d iv ers e s et o f b en efit s : Co mp reh en s iv e M an ag emen t Cap ab ilit ies Th e DSR-500, DSR-500N, DSR-1000 an d DSR-1000N in clu d e d u al-W A N Gig ab it Et h ern et wh ich p ro v id es p o licy -b as ed s erv ice man ag emen t en s u rin g maximu m p ro d u ct iv it y fo r y o u r b u s in es s o p erat io n s . Th e failo v er feat u re main t ain s d at a t raffic wit h o ut d is conn ectin g wh en a lan d lin e co nnect io n is lo s t . Th e Ou t b o u nd Lo ad Balan cin g featu re ad ju sts o u tgo ing t raffic acro ss t wo W AN in t erfaces and o pt imizes t h e s ystem p erfo rman ce res u lt in g in h ig h av ailab ilit y . Th e s eco nd W AN p o rt can b e co n figu red as a DM Z p o rt allo win g y o u t o is o late s erv ers fro m y o u r LA N. DSR-150/ 150N/ 250 / 250N h av e a s in g le W A N in t erface, an d t h u s it d o es n o t s u p p o rt A u t o Failo v er an d Lo ad Balan cin g s cen ario s . Su p erio r W ireles s Perfo rman ce Des ig n ed t o d eliv er s u p erio r wireles s p erfo rman ce, t h e DSR -500N an d DSR1000N in clu d e 802.11 a/ b / g / n, allo win g fo r o p erat io n o n eit h er t h e 2.4 GHz o r 5 GHz rad io b an d s . M u lt ip le In M u lt ip le Ou t (M IM O) t ech n o lo g y allo ws t h e DSR-500N an d DSR-1000N t o p ro v id e h ig h d at a rat es wit h min imal “d ead s p o t s ” t h ro u g h o u t t h e wireles s co v erag e area. DSR-150N, 250N an d DSR-500N s u p p o rt s t h e 2.4GHz rad io b an d o n ly . Flexib le Dep lo y men t Op t io n s Th e DSR-1000 / 1000N s u p p o rt s Th ird Gen erat io n (3G) Net wo rks v ia an ext en d ab le USB 3G d o n g le. Th is 3G n et wo rk cap ab ilit y o ffers an ad d it io n al s ecu re d at a co n n ect io n fo r n et wo rks t h at p ro v id e crit ical s erv ices . Th e DSR 1000N can b e co n fig u red t o au t o mat ically s wit ch t o a 3G n et wo rk wh en ev er a p h y s ical lin k is lo s t . Ro b u s t VPN feat u res A fu lly feat u red v irt u al p riv at e n et wo rk (VPN) p ro v id es y o u r mo b ile wo rkers an d b ran ch o ffices wit h a s ecu re lin k t o y o u r n et wo rk. Th e DSR150/ 150N/ 250/ 250N, DSR-500/ 500N an d DSR-1000 / 1000N are cap ab le o f s imu lt an eo usly man ag in g 5, 5, 10, 20 Secu re So cket s Lay er (SSL) VPN t u n n els res p ectiv ely , emp o werin g y o u r mo b ile u s ers b y p ro v id in g remo t e acces s t o a 11 Unified Services Router User Manual cen t ral co rp o rat e d at ab as e. Sit e -t o -s it e VPN t u n n els u s e IP Secu rit y ( IPs ec ) Pro t o co l, Po in t -t o -Po in t Tu n n elin g Pro t o co l (PPTP), o r Lay er 2 Tu n n elin g Pro t o co l (L2TP) t o facilit at e b ran ch o ffice co n n ect iv it y t h ro u g h en cry p t ed v irt u al lin ks . Th e DSR-150/ 150N, DSR-250/ 250N, DSR-500/ 500N an d DSR1000/ 1000N s u p p o rt 10, 25, 35 an d 75 s imu lt an eo u s IPSec VPN t u n n els res p ect iv ely . Efficien t D-Lin k Green Tech n o lo g y A s a co n cern ed memb er o f t h e g lo b al co mmu n it y , D -Lin k is d ev o t ed t o p ro v id in g eco -frien d ly p ro d u ct s . D-Lin k Green W iFi an d D-Lin k Green Et h ern et s av e p o wer an d p rev en t was t e. Th e D -Lin k Green W LA N s ch ed u ler red u ces wireles s p o wer au t o mat ically d u rin g o ff-p eak h o u rs . Likewis e t h e DLin k Green Et h ern et p ro gram ad ju s ts p o wer u s ag e b ased o n t h e d et ect ed cab le len g t h an d lin k s t at u s . In ad d it io n , co mp lian ce wit h Ro HS (Res t rict io n o f Hazard o u s Su b stances) an d W EEE (W as t e Elect rical an d Elect ro ni c Eq u ip ment) d irect iv es make D-Lin k Green cert ified d ev ices t h e en viro nmen tally res ponsible ch o ice. Su p p o rt fo r t h e 3G wireles s W A N USB d o n g le is o n ly av ailab le fo r DSR-1000 an d DSR-1000N. 1.1 About this User Manual Th is d o cu men t is a h ig h lev el man u al t o allo w n ew D-Lin k Un ified Serv ices Ro u t er u s ers t o co n fig u re co n n ect iv it y , s et u p VPN t u n n els , es t ab lis h firewall ru les an d p erfo rm g en eral ad min is t rativ e t asks. Ty p ical d ep lo ymen t an d u se cas e s cen ario s are d es crib ed in each s ect io n . Fo r mo re d et ailed s et u p in s t ru ct io n s an d exp lan at io n s o f each co n fig u rat ion p aramet er, refer t o t h e o n lin e h elp t h at can b e acces s ed fro m each p ag e in t h e ro u t er GUI. 1.2 Typographical Conventions Th e fo llo win g is a lis t o f t h e v ario u s t erms , fo llo wed b y an examp le o f h o w t h at t erm is rep res en t ed in t h is d o cu men t : Pro d u ct Name – D-Lin k Un ified Serv ices Ro u t er. o M o d el n u mb ers DSR-500/ 500N/ 1000/ 1000N/ 250/ 250N/ 150/ 150N GUI M en u Pat h / GUI Nav ig at io n – Monitoring > Router Status Imp o rt an t n o t e – 12 Chapter 2. Configuring Your Network: LAN Setup It is as s umed t h at t h e u ser h as a mach in e fo r man ag emen t co nnected t o t h e LA N t o t h e ro u t er. Th e LA N co n n ectio n may b e t h ro u gh t h e wired Et h ern et p o rt s av ailab le o n t h e ro u t er, o r o n ce t h e in it ial s et up is co mp let e, t h e DSR may als o b e ma n ag ed t h ro u g h it s wireles s in t erface as it is b rid g ed wit h t h e LA N. A cces s t h e ro u t er’s g rap h ical u s er in t erface (GUI) fo r man ag emen t b y u s in g an y web b ro wser, s uch as M icro s o ft In t ern et Exp lo rer o r M o zilla Firefo x: Go t o http:/ / 1 9 2 .1 6 8 .1 0 .1 (d efau lt IP ad d res s ) t o d is p lay t h e ro u t er’s man ag emen t lo g in s creen . Defau lt lo g in cred en t ials fo r t h e man ag emen t GUI: Us ern ame: admi n Pas s wo rd : admi n If t h e ro u t er’s LA N IP ad d res s was ch ang ed, u s e t h at IP ad d res s in t h e n av ig at io n b ar o f t h e b ro ws er t o acces s t h e ro u t er’s man ag emen t UI. 2.1 LAN Configuration Setup > Network Settings > LAN Configuration By d efau lt , t h e ro u t er fu n ct io n s as a Dy n amic Ho s t Co n fig u rat io n Pro t o co l (DHCP) s erv er t o t h e h ost s o n t h e W LA N o r LA N n et wo rk. W it h DHCP, PCs an d o t h er LA N d ev ices can b e assig ned IP ad d resses as well as ad d resses fo r DNS s erv ers , W in d o ws In t ern et Name Serv ice (W INS) s erv ers , an d t h e d efau lt g at eway . W it h t h e DHCP s erv er en ab led t h e ro u t er’s IP ad d res s s erv es as t h e g at eway ad d res s fo r LA N an d W LA N clien t s . Th e PCs in t h e LA N are as s ig n ed IP ad d res s es fro m a p o o l o f ad d res ses s pecified in t h is p ro cedu re. Each p o o l ad dress is t ested b efore it is as sig ned t o av o id d u p licat e ad d res s es o n t h e LA N. Fo r mo s t ap p licat ion s t he d efault DHCP an d TCP/ IP s et t in g s are s at is fact o ry . If y o u wan t an o t h er PC o n y o u r n et wo rk t o b e t h e DHCP s erv er o r if y o u are man u ally co n fig u rin g t h e n et wo rk s et t in g s o f all o f y o u r PCs , s et t h e DHCP mo d e t o ‘n o n e’. DHCP relay can b e u s ed t o fo rward DHCP leas e in fo rmat io n fro m an o t h er LA N d ev ice t h at is t h e n et wo rk’s DHCP s erv er; t h is is p art icu larly u s efu l fo r wireles s clien t s . In s t ead o f u s in g a DNS s erv er, y o u can u s e a W in d o ws In t ern et Namin g Serv ice (W INS) s erv er. A W INS s erv er is t h e eq u iv alen t o f a DNS s erv er b u t u s es t h e Net BIOS p ro t o co l t o res o lv e h o s t n ames . Th e ro u t er in clu d es t h e W INS s erv er IP ad d res s in t h e DHCP co n fig u rat io n wh en ackn o wled g in g a DHCP req u es t fro m a DHCP clien t . Yo u can als o en able DNS p ro xy fo r t h e LA N. W h en t h is is e n abled t he ro u t er t h en as a p ro xy fo r all DNS req u es t s an d co mmu n icat es wit h t h e ISP’s DNS s erv ers . W h en d is ab led all DHCP clien t s receiv e t h e DNS IP ad d res s es o f t h e ISP. Unified Services Router User Manual To co n fig u re LA N Co n n ect iv it y , p leas e fo llo w t h e s t ep s b elo w: 1. In the LAN Setup page, enter the following information for your router: IP ad d res s (fact o ry d efau lt : 192.168.10.1). If y o u ch an g e t h e IP ad d res s an d click Sav e Set t in g s , t h e GUI will n o t res p o n d . Op en a n ew co n n ect io n t o t h e n ew IP ad d res s an d lo g in ag ain . Be s u re t h e LA N h o s t (t h e mach in e u sed t o man ag e t h e ro u t er) h as o b t ain ed IP ad d res s fro m n ewly as s ig n ed p o o l (o r h as a s t at ic IP ad d res s in t h e ro u t er’s LA N s u b n et ) b efo re acces s in g t h e ro u t er v ia ch an g ed IP ad d res s . Su b n et mas k (fact o ry d e fau lt : 255.255.255.0). 2. In the DHCP section, select the DHCP mode: No n e: t h e ro u t er’s DHCP s erv er is d is ab led fo r t h e LA N DHCP Serv er. W it h t h is o p tio n t h e ro u ter assig ns an IP ad d res s wit h in t h e s p ecified ran g e p lu s ad d it io n al s p ecified in fo rmat io n t o an y LA N d ev ice t h at req u es t s DHCP s erv ed ad d res s es . DHCP Relay : W it h t h is o p t io n en ab led , DHCP clien t s o n t h e LA N can receiv e IP ad d res s leas es an d co rres p o n d in g in fo rmat io n fro m a DHCP s erv er o n a d ifferen t s u b n et . Sp ecify t h e Relay Gat eway , an d wh en LA N clien t s make a DHCP req u es t it will b e p as s ed alo n g t o t h e s erv er acces s ib le v ia t h e Relay Gat eway IP ad d res s . If DHCP is b ein g en ab led , en t er t h e fo llo win g DHCP s erv er p aramet ers : St art in g an d En d in g IP A d d res s es : En t er t h e firs t an d las t co n t in u o u s ad d res ses in t h e IP ad d ress p o ol. A n y n ew DHCP clien t jo in in g t h e LA N is as s ig n ed an IP ad d res s in t h is ran g e. Th e d efau lt s t art in g ad d res s is 192.168.10.2. Th e d efau lt en d in g ad d res s is 192.168.1 0.100. Th es e ad d res ses s ho uld b e in t h e s ame IP ad d res s s u b n et as t h e ro u t er’s LA N IP ad d res s . Yo u may wis h t o s av e p art o f t h e s u b n et ran g e fo r d ev ices wit h s t at ically as s ig n ed IP ad d res s es in t h e LA N . Primary an d Seco n d ary DNS s erv ers : If co n fig u red d o main n ame s y s t em (DNS) s erv ers are av ailab le o n t h e LA N en t er t h eir IP ad d res s es h ere. W INS Serv er (o p t io n al): En t er t h e IP ad d res s fo r t h e W INS s erv er o r, if p res en t in y o u r n et wo rk, t h e W in d o ws Net Bio s s erv er. 14 Unified Services Router User Manual Leas e Time: En t er t h e t ime, in h o u rs , fo r wh ich IP ad d res s es are leas ed t o clien t s . Relay Gat eway : En t er t h e g at eway add res s . Th is is t h e o n ly co n fig u rat io n p aramet er req u ired in t h is s ect io n wh en DHCP Relay is s elect ed as it s DHCP mo d e 3. In the DNS Host Name Mapping section: Ho s t Name: Pro v id e a v alid h o s t n ame IP ad d res s : Pro v id e t h e IP ad d res s o f t h e h o s t n ame, 4. In the LAN proxy section: En ab le DNS Pro xy : To en ab le t h e ro u t er t o act as a p ro xy fo r all DNS req u es ts an d co mmu n icat e wit h t h e ISP’s DNS s erv ers , click t h e ch eckb o x. 5. Click Save Settings to apply all changes . Figure 1 : Se tup page for LAN TCP/IP s e ttings 15 Unified Services Router User Manual 2.1.1 LAN DHCP Reserv ed IPs Setup > Network Settings > LAN DHCP Reserved IPs Th is ro u t er DHCP s erv er can as sig n TCP/ IP co n fig urat io n s t o co mp u t ers in t h e LA N exp licit ly b y ad d in g clien t 's n etwo rk in t erface h ardware ad dress an d t he IP ad d ress t o b e as s ig ned t o t h at clien t in DHCP s erv er's d atabase. W h enever DHCP s erv er receiv es a req u est fro m c lien t , h ard ware ad dress o f t h at clien t is co mp ared wit h t h e h ard ware ad d res s lis t p res en t in t h e d at ab as e, if an IP ad d res s is alread y as s ig n ed t o t h at co mp u t er o r d ev ice in t h e d at ab as e , t h e cu s t o mized IP ad d res s is co n fig u red o t h erwis e an IP ad d ress is ass ig n ed t o t h e clien t au t o mat ically fro m t h e DHCP p o o l. Computer Name : Th e u s er d efin ed n ame fo r t h e LA N h o s t . IP Addres s es : Th e LA N IP ad d res s o f a h o s t t h at is res erv ed b y t h e DHCP s erv er. MAC Addres s es : Th e M A C ad d res s t h at will b e as s ig n ed t h e res e rv ed IP ad d res s wh en it is o n t h e LA N. As s oci ate wi th IP/ MAC B i ndi ng : W h en t h e u s er en ab les t h is o p t io n t h e Co mp u t er Name, IP an d M A C ad d res s es are as s o ciat ed wit h t h e IP/ M A C b in d in g . Th e act io n s t h at can b e t aken o n lis t o f res erv ed IP ad d res s es are: S el ect: Select s all t h e res erv ed IP ad d res s es in t h e lis t . Edi t: Op en s t h e LA N DHCP Res erv ed IP Co n fig u rat io n p ag e t o ed it t h e s elect ed b in d in g ru le. Del ete : Delet es t h e s elect ed IP ad d res s res erv at io n (s ) Add: Op en s t h e LA N DHCP Res erv ed IP Co n fig u rat io n p ag e t o ad d a n ew b in d in g ru le. 16 Unified Services Router User Manual Figure 2 : LAN DHCP Re s e rve d IPs 2.1.2 LAN DHCP Leased Clients Setup > Network Settings > LAN DHCP Leased Clients Th is p ag e p ro v id es t h e lis t o f clien t s co n n ect t o LA N DHCP s erv er. 17 Unified Services Router User Manual Figure 3 : LAN DHCP Le as e d Clie nts IP Addres s es : Th e LA N IP ad d res s o f a h o s t t h at mat ch es t h e res erv ed IP lis t . MAC Addres s es : Th e M A C ad d ress o f a LA N h o s t t h at h as a co n figu red IP ad d res s res erv at io n . 2.1.3 LAN Configuration in an IPv 6 Network Advanced > IPv6 > IPv6 LAN > IPv6 LAN Config (1) In IPv 6 mo d e, t h e LA N DHCP s erv er is en ab led b y d efau lt (s imilar t o IPv 4 mo d e). Th e DHCPv 6 s erv er will s erv e IPv 6 ad d resses fro m co n fig u red ad d res s p o o ls wit h t h e IPv 6 Prefix Len g t h as s ig n ed t o t h e LA N. IPv 4 / IPv 6 mo d e mu s t b e en ab led in t h e Advanced > IPv6 > IP mode t o en ab le IPv 6 co n fig u rat io n o p t io n s . LAN Settings Th e d efau lt IPv 6 LA N ad d ress fo r t h e ro u ter is fec0 ::1 . Yo u can ch ang e t h is 128 b it IPv 6 ad d res s b ased o n y o ur n et wo rk req u iremen t s . Th e o t h er field t h at d efin es t h e LA N s et t in g s fo r t h e ro u t er is t h e p refix len g t h . Th e IPv 6 n et wo rk (s u b n et ) is id en t ified b y t h e in it ial b it s o f t h e ad d res s called t h e p refix. By d efau lt t h is is 6 4 b it s lo n g . A ll h o s ts in t h e n etwo rk h av e co mmo n in it ial b it s fo r t h eir IPv 6 ad d res s ; t h e n u mb er o f co mmo n in it ial b it s in t h e n et wo rk’s ad d res s es is s et b y t h e p refix len g t h field . 18 Unified Services Router User Manual Figure 4 : IPv6 LAN and DHCPv6 configurat io n If y o u ch an g e t h e IP ad d res s an d click Sav e Set t in g s , t h e GUI will n o t res p o n d . Op en a n ew co n n ect io n t o t h e n ew IP ad d res s an d lo g in ag ain . Be s u re t h e LA N h o s t (t h e mach in e u sed t o man ag e t h e ro u t er) h as o b t ain ed IP ad d res s fro m n ewly as s ig n ed p o o l (o r h as a s t at ic IP ad d res s in t h e ro u t er’s LA N s u b n et ) b efo re acces s in g t h e ro u t er v ia ch an g ed IP ad d res s . 19 Unified Services Router User Manual A s wit h an IPv 4 LA N n et wo rk, t h e ro u t er h as a DHCPv 6 s erv er. If en ab led , t h e ro u t er as s ig n s an IP ad d res s wit h in t h e s p ecified ran g e p lu s ad d it io n al s p ecified in fo rmat io n t o an y LA N PC t h at req u es t s DHCP s erv ed ad d res s es . Th e fo llo win g s et t in g s are u s ed t o co n fig u re t h e DHCPv 6 s erv er: DHCP M o d e: Th e IPv 6 DHCP s erv er is eit h er s t at eless o r s t at efu l. If s t ateless is s elect ed an ext ern al IPv 6 DHCP s erv er is n o t req u ired as t h e IPv 6 LA N h o s t s are au t o -co nfig ured b y t h is ro u ter. In t h is case t h e ro u ter ad vertis emen t d aemo n (RA DVD) mu s t b e co n fig u red o n t h is d ev ice an d ICM Pv 6 ro u t er d is co v ery mes s ag es are u s ed b y t h e h o s t fo r au t o -co n fig u rat io n . Th ere are n o man ag ed ad d res ses t o s erv e t h e LA N n o d es. If s t at efu l is s elected t h e IPv 6 LA N h o s t will rely o n an ext ern al DHCPv 6 s erv er t o p ro v id e req u ired co n fig u rat io n s et t in g s Th e d o main n ame o f t h e DHCPv 6 s erv er is an o p t io n al s et t in g Serv er Preferen ce is u s ed t o in d icat e t h e p re feren ce lev el o f t h is DHCP s erv er. DHCP ad v ert is e mes s ag es wit h t h e h ig h es t s erv er p referen ce v alu e t o a LA N h o s t are p referred o v er o t h er DHCP s erv er ad v ert is e mes s ag es . Th e d efau lt is 255. Th e DNS s erv er d et ails can b e man u ally en t ered h ere (p rimary / s eco n d ary o p t io n s . A n alt ern at iv e is t o allo w t h e LA N DHCP clien t t o receiv e t h e DNS s erv er d et ails fro m t h e ISP d irect ly . By s elect in g Us e DNS p ro xy , t h is ro u t er act s as a p ro xy fo r all DNS req u es t s an d co mmu n icat es wit h t h e ISP’s DNS s erv ers (a W A N co n fig u ra t io n p aramet er). Primary an d Seco n d ary DNS s erv ers : If t h ere is co n fig u red d o main n ame s y s t em (DNS) s erv ers av ailab le o n t h e LA N en t er t h e IP ad d res s es h ere. Leas e/ Reb in d t ime s et s t h e d uratio n o f t h e DHCPv 6 leas e fro m t h is ro u t er to the LA N clien t . IPv6 Address Pools Th is feat u re allo ws y o u t o d efin e t h e IPv 6 d eleg at io n p refix fo r a ran g e o f IP ad d res ses t o b e s erv ed b y t h e g at eway ’s DHCPv 6 s erv er . Us in g a d eleg at io n p refix y o u can au t omat e t he p ro cess o f in fo rmin g o t h er n et workin g eq uip men t o n t h e LA N o f DHCP in fo rmat io n s p ecific fo r t h e as s ig n ed p refix. Prefix Delegation Th e fo llo win g s et t in g s are u s ed t o co n fig u re t h e Prefix Deleg at io n : Prefix Deleg at io n : Select t h is o p t io n t o en ab le p refix d eleg at io n in DHCPv 6 s erv er. Th is o p t io n can b e s elect ed o n ly in St at eles s A d d res s A u t o Co n fig u rat io n mo d e o f DHCPv 6 s erv er. 20 Unified Services Router User Manual Prefix A d d res s : IPv 6 p refix ad d res s in t h e DHCPv 6 s erv er p refix p o o l Prefix Len g t h : Len g t h p refix ad d res s 2.1.4 Configuring IPv 6 Router Adv ertisements Ro u t er A d v ertis emen ts are an alo go us t o IPv 4 DHCP as s ig nmen ts fo r LA N clien t s , in t h at t h e ro u t er will as s ig n an IP ad d res s an d s u p p o rt in g n et wo rk in fo rmat io n t o d ev ices t hat are co n fig ured t o accept s uch d etails. Ro u t er A dv ert isemen t is req u ired in an IPv 6 n et wo rk is req u ired fo r s t at eless au to con fig u rat io n o f t h e IPv 6 LA N. By co n fig u rin g t he Ro u ter A d vertisemen t Daemo n o n t h is ro u ter, t h e DSR will lis t en o n t h e LA N fo r ro u t er s o licit at io n s an d res p o n d t o t h es e LA N h o s t s wit h ro u t er ad v is emen t s . RADVD Advanced > IPv6 > IPv6 LAN > Router Advertisement To s u p p ort s tateless IPv 6 au t o co nfig uratio n o n t h e LA N, s et t h e RA DVD s t at u s t o En ab le. Th e fo llo win g s et t in g s are u s ed t o co n fig u re RA DVD: A d v ert ise M o de: Select Un solicit ed M u lt icast t o send ro ut er ad v ert is emen t s (RA ’s ) t o all in t erfaces in t h e mu lt icas t g ro u p . To res t rict RA ’s t o wellkn o wn IPv 6 ad d res s es o n t h e LA N, an d t h ereb y red u ce o v erall n et wo rk t raffic, s elect Un icas t o n ly . A d v ert ise In t erv al: W h en ad vert isemen ts are u n s o licit ed mu lt icas t p acket s , t h is in t erv al s et s t h e maximu m t ime b et ween ad v ert is emen t s fro m t h e in t erface. Th e act u al d u rat io n b et ween ad v ert is emen t s is a ran d o m v alu e b et ween o n e t h ird o f t h is field an d t h is field . Th e d efau lt is 30 s eco n d s . RA Flag s : Th e ro u t er ad vertis emen ts (RA ’s ) can b e s en t wit h o n e o r b o t h o f t h es e flag s. Ch o se M an ag ed t o u s e t h e ad min is t ered / s t a t efu l p ro t o co l fo r ad d res s au t o co n fig u rat io n . If t h e Ot h er flag is s elect ed t h e h o s t u s es ad min is t ered / s t at efu l p ro t o co l fo r n o n -ad d res s au t o co n fig u rat io n . Ro u t er Preferen ce : t h is lo w/ med iu m/ h ig h p aramet er d et ermin es t h e p referen ce asso ciat ed wit h t h e RA DVD p ro ces s o f t h e ro u t er. Th is is u s efu l if t h ere are o t h er RA DVD en ab led d ev ices o n t h e LA N as it h elp s av o id co n flict s fo r IPv 6 clien t s . M TU: Th e ro u t er ad v ert is emen t will s et t h is maximu m t ran s mis s io n u n it (M TU) v alu e fo r all n o d es in t h e LA N t h at are au t o co n fig ured b y t he ro uter. Th e d efau lt is 1500. Ro u t er Lifet ime : Th is v alu e is p res en t in RA ’s an d in d icat es t h e u s efu ln es s o f t h is ro u t er as a d efau lt ro u t er fo r t h e in t erface. Th e d efau lt is 3600 21 Unified Services Router User Manual s eco n ds. Up o n exp irat io n o f t h is v alu e, a n ew RA DVD exch an g e mu s t t ake p lace b et ween t h e h o s t an d t h is ro u t er. Figure 5 : Configu ri ng the Route r Adve rtis e me nt Dae mon Advertisement Prefixes Advanced > IPv6 > IPv6 LAN > Advertisement Prefixes Th e ro u t er ad v ert isemen ts co nfig ured wit h ad v ert is emen t p refixes allo w t h is ro u t er t o in fo rm h o s t s h o w t o p erfo rm s t at eles s ad d res s au t o co n fig u rat io n . Ro u t er ad v ert is emen ts co n t ain a lis t o f s u b n et p refixes t h at allo w t h e ro u t er t o d et ermin e n eig h b o u rs an d wh et h er t h e h o s t is o n t h e s ame lin k as t h e ro u t er . Th e fo llo win g p refix o p t io n s are av ailab le fo r t h e ro u t er ad v ert is emen t s : IPv 6 Prefix Ty p e : To en s u re h o s t s s u p p o rt IPv 6 t o IPv 4 t u n n el s elect t h e 6t o 4 p refix t y p e. Select in g Glo b al/ Lo cal/ ISA TA P will allo w t h e n o d es t o s u p p o rt all o t h er IPv 6 ro u t in g o p t io n s SLA ID: Th e SLA ID (Sit e -Lev el A g g reg at io n Id en t ifier) is av ailab le wh en 6t o 4 Prefixes are s elect ed . Th is s h o u ld b e t h e in t erface ID o f t h e ro u t er’s LA N in t erface u s ed fo r ro u t er ad v ert is emen t s . 22 Unified Services Router User Manual IPv 6 Prefix: W h en u s ing Glo b al/ Lo cal/ISA TAP p refixes , t h is field is u s ed to d efin e t h e IPv 6 n et wo rk ad v ert is ed b y t h is ro u t er. IPv 6 Prefix Len g t h : Th is v alu e in d icat e s t h e n u mb er co n t ig u o u s , h ig h er o rd er b it s o f t h e IPv 6 ad d res s t h at d efin e u p t h e n et wo rk p o rt io n o f t h e ad d res s . Ty p ically t h is is 64. Prefix Lifet ime: Th is d efin es t h e d u rat io n (in s eco n d s ) t h at t h e req u es t in g n o d e is allo wed t o u s e t h e adv ert is ed p refix. It is an alo g o u s t o DHCP leas e t ime in an IPv 4 n et wo rk. Figure 6 : IPv6 Adve rtis e me nt Pre fix s e ttings 2.2 VLAN Configuration Th e ro u t er s u p p o rt s v irt u al n et wo rk is o lat io n o n t h e LA N wit h t h e u s e o f VLA Ns . LA N d ev ices can b e co n fig u red t o co mmu n icat e in a s u b n et wo rk d efin ed b y VLA N id en t ifiers . LA N p o rt s can b e as s ig n ed u n iq u e VLA N IDs s o t h at t raffic t o an d fro m t h at p h y s ical p o rt can b e is o lat ed fro m t h e g en eral LA N. VLA N filt erin g is p art icu larly u s efu l t o limit b ro ad cas t p acket s o f a d ev ice in a larg e n et wo rk VLA N s u p p ort is d is abled b y d efault in t h e ro u ter. In t h e VLA N Co n fig u rat io n p ag e, en ab le VLA N s u p po rt o n t h e ro u ter a n d t h en p ro ceed t o t he n ext s ectio n t o d efin e t h e v irt u al n et wo rk. Setup > VLAN Settings > Available VLAN Th e A v ailab le VLA N p ag e s h o ws a lis t o f co n fig ured VLA Ns b y n ame an d VLA N ID. A VLA N memb ers h ip can b e creat ed b y clickin g t h e A d d b u t t o n b elo w t h e Lis t o f A v ailab le VLA Ns . A VLA N memb ers h ip en t ry co n s is t s o f a VLA N id en t ifier an d t h e n u merical VLA N ID wh ich is as s ig n ed t o t h e VLA N memb ers h ip . Th e VLA N ID v alu e can b e an y 23 Unified Services Router User Manual n u mb er fro m 2 t o 4091. VLA N ID 1 is res erv ed fo r t h e d efau lt VLA N, wh ich is u s e d fo r u n t ag ged frames receiv ed o n t h e in t erface. By en ab lin g In t er VLA N Ro u t in g , y o u will allo w t raffic fro m LA N h o s ts b elo ng ing t o t his VLA N ID t o p as s t h roug h t o o ther co n fig u red VLA N IDs t h at h av e In t er VLA N Ro u t in g en ab led . Figure 7 : Adding VLAN me mbe rs hips to the LAN 2.2.1 Associating VLANs to ports In o rd er t o t ag all t raffic t h ro u g h a s p ecific LA N p o rt wit h a VLA N ID, y o u can as s o ciat e a VLA N t o a p h y s ical p o rt . Setup > VLAN Settings > Port VLAN VLA N memb ers h ip p ro p ert ies fo r t h e LA N an d wireles s LA N are lis t ed o n t h is page. Th e VLA N Po rt t ab le d is p lay s t he p o rt id en tifier, t h e mo d e s ett ing fo r t h at p o rt an d VLA N memb ers h ip in fo rmat io n . Th e co n fig u rat io n p ag e is acces s ed b y s elect in g o n e o f t h e fo u r p h y s ical p o rt s o r a co n fig u r ed acces s p o in t an d clickin g Ed it . Th e ed it p ag e o ffers t h e fo llo win g co n fig u rat io n o p t io n s : M o d e: Th e mo d e o f t h is VLA N can b e Gen eral, A cces s , o r T ru n k. Th e d efau lt is acces s . In Gen eral mo d e t h e p o rt is a memb er o f a u s er s elect ab le s et o f VLA Ns . Th e p o rt s en ds an d receiv es d at a t h at is t ag g ed o r u n t ag g ed wit h a VLA N ID. If t h e d at a in t o t h e p ort is u n tagged, it is as sig n ed t h e d efin ed PVID. In t h e co n fig u rat io n fro m Fig u re 4, Po rt 3 is a Gen eral p o rt wit h PVID 3, s o u n t ag ged d at a in t o Po rt 3 will b e as s ig ned PVID 3. A ll t ag g ed d ata s ent o u t o f t h e p o rt wit h t h e s ame PVID will b e u n t ag ged. Th is is mo d e is t y p ically u s ed wit h IP Ph o n es t h at h ave d ual Et h ern et p o rts. Dat a co min g fro m p h o ne t o t h e s wit ch p o rt o n t h e ro u t er will b e t ag g ed . Dat a p as s in g t h ro u g h t h e p h o n e fro m a co n n ect ed d ev ice will b e u n t ag g ed . 24 Unified Services Router User Manual Figure 8 : Port VLAN lis t In A cces s mo d e t h e p o rt is a memb er o f a s in g le VLA N (an d o n ly o n e). A ll d at a g o in g in t o an d o u t o f t h e p o rt is u n t ag g ed . Traffic t h ro u g h a p o rt in acces s mo d e lo o ks like an y o t h er Et h ern et frame. In Tru n k mo d e t h e p o rt is a memb er o f a u s er s elect ab le s et o f VLA Ns . A ll d at a g o in g in t o an d o u t o f t h e p o rt is t ag ged. Un t agged co min g in t o t he p o rt is n o t fo rward ed , excep t fo r t h e d efau lt VLA N wit h PVID=1, wh ich is u n t ag ged. Tru n k p o rt s mu lt ip lex t raffic fo r mu lt ip le VLA Ns o v er t h e s ame p h y s ical lin k. Select PVID fo r t h e p o rt wh en t h e Gen eral mo d e is s elect ed . Co n fig u red VLA N memb ers h ip s will b e d is p lay ed on t h e VLA N M emb ers h ip Co n fig u rat io n fo r t h e p o rt . By s elect in g o n e mo re VLA N memb ers h ip o p t io n s fo r a Gen eral o r Tru n k p o rt , t raffic can b e ro u t ed b et ween t h e s elect ed VLA N memb ers h ip IDs 25 Unified Services Router User Manual Figure 9 : Configu ri ng VLAN me mbe rs hip for a port 2.2.2 Multiple VLAN Subnets Setup > VLAN Settings > Multi VLAN Settings Th is p ag e s ho ws a lis t o f av ailab le mu lt i-VLA N s u b n ets. Each co n fig u red VLA N ID can map d irect ly t o a s u b n et wit h in t h e LA N. Each LA N p o rt can b e as s ig n ed a u n iq u e IP ad d ress an d a VLA N s p ecific DHCP s erv er can b e co nfig ured t o ass ig n IP ad d res s leas es t o d ev ices o n t h is VLA N. VLAN ID: Th e PVID o f t h e VLA N t h at will h av e all memb er d ev ices b e p art o f t h e s ame s u b n et ran g e. IP Addres s : Th e IP ad d res s as s o ciat ed wit h a p o rt as s ig n ed t h is VLA N ID. S ubnet Mas k : Su b n et M as k fo r t h e ab o v e IP A d d res s 26 Unified Services Router User Manual Figure 10 : M ultiple VLAN Subne ts 2.2.3 VLAN configuration Setup > VLAN Settings > VLANconfiguration Th is p ag e allo ws en ab lin g o r d is ab lin g t h e VLA N fu n ct io n o n t h e ro u t er. Virt u al LA Ns can b e creat ed in t h is ro ut er t o p ro vid e seg men t at io n cap ab ilit ies fo r firewall ru les an d VPN p o licies . Th e LA N n et wo rk is co n s id ered t h e d efau lt VLA N. Ch eck t h e En ab le VLA N b o x t o ad d VLA N fu n ct io n alit y t o t h e LA N. 27 Unified Services Router User Manual Figure 11 : VLAN Configu rat ion 2.3 Configurable Port: DMZ Setup DSR-150/ 150N/ 250/ 250N d o es n o t h av e a co n fig u rab le p o rt – t h ere is n o DM Z s u p p o rt . Th is ro u t er s up port s o ne o f t h e p hy sical p o rt s t o b e co n fig u red as a s eco n d ary W A N Et h ern et p o rt o r a d ed icated DM Z p o rt . A DM Z is a s u b n et wo rk t h at is o p en t o t h e p u b lic b u t b eh ind t h e firewall. Th e DM Z ad d s an ad d it io n al lay er o f s ecu rit y t o t h e LA N, as s p ecific s erv ices/p ort s t h at are exp o s ed t o t h e in t ern et o n t h e DM Z d o n o t h av e t o b e exp o s ed o n t he LA N. It is reco mmen d ed t h at h osts t h at mu s t b e exp o sed t o t h e in t ern et (s u ch as web o r email s erv ers ) b e p laced in t h e DM Z n et wo rk. Firewall ru les can b e allo wed t o p ermit acces s s p ecific s erv ices / p o rt s t o t h e DM Z fro m b o t h t h e LA N o r W A N. In t h e ev en t o f an at t ack t o an y o f t h e DM Z n o d es , t h e LA N is n o t n eces s arily v u ln erab le as well. Setup > DMZ Setup > DMZ Setup Configuration DM Z co n fig u ratio n is id en tical t o t h e LA N co n fig u ratio n. Th ere are n o rest rictio ns on t h e IP ad d res s o r s u bnet as sign ed t o t h e DM Z p o rt , o t h er t h an t h e fact t h at it can n o t b e id en t ical t o t h e IP ad d res s g iv en t o t h e LA N in t erface o f t h is g at eway . 28 Unified Services Router User Manual Figure 12 : DM Z configuratio n In o rd er t o co n fig u re a DM Z p o rt , t h e ro u t er’s co n fig u rab le p o rt mu s t b e s et t o DM Z in t h e Setup > Internet Settings > Configurable Port p ag e. 2.4 Universal Plug and Play (UPnP) Advanced > Advanced Network > UPnP Un iv ers al Plu g an d Play (UPn P) is a feat u re t h at allo ws t h e ro u t er t o d is co v ery d ev ices o n t h e n et wo rk t h at can co mmu n icat e wit h t h e ro u t er an d allo w fo r au t o co n fig u ratio n . If a n et wo rk d ev ice is d etect ed b y UPn P, t h e ro u t er can o p en in t ern al o r ext ern al p o rt s fo r t h e t raffic p ro t o co l req u ired b y t h at n et wo rk d ev ice. On ce UPn P is en ab led , y o u can co n fig u re t h e ro u t er t o d et ect UPn P -s u p p o rt in g d ev ices o n t h e LA N (o r a co n fig u red VLA N). If d is ab led , t he ro u ter will n o t allo w fo r au t o mat ic d ev ice co n fig u rat io n . Co n fig u re t h e fo llo win g s et t in g s t o u s e UPn P: 29 Unified Services Router User Manual A d v ert is emen t Perio d : Th is is t h e freq u en cy t h at t h e ro u t er b ro ad cas t s UPn P in fo rmat io n o v er t h e n et wo rk. A larg e v alu e will min imize n et wo rk t raffic b u t cau s e d elay s in id en t ify in g n ew UPn P d ev ices t o t h e n et wo rk. A d v ert isemen t Time t o Liv e: Th is is exp res s ed in h o p s fo r each UPn P p acket . Th is is t h e n u mb er o f s t ep s a p acket is allo wed t o p ro p ag at e b efo re b ein g d is card ed . Small v alu es will limit t h e UPn P b ro ad cas t ran g e. A d efau lt o f 4 is t y p ical fo r n et wo rks wit h few s wit ch es . Figure 13 : UPnP Configuratio n UPn P Po rt map Tab le Th e UPn P Po rt map Tab le h as t h e d et ails o f UPn P d ev ices t hat res po nd t o t h e ro u ter’s ad v ert is emen t s . Th e fo llo win g in fo rmat io n is d is p lay ed fo r each d et ect ed d ev ice: A ct iv e: A y es /n o in d icatin g wh et her t he p o rt o f t h e UPn P d ev ice t hat es t ab lis h ed a co n n ect io n is cu rren t ly act iv e Pro t o co l: Th e n et wo rk p ro t o co l (i.e. HTTP, FTP, et c.) u s ed b y t h e DSR In t . Po rt (In t ern al Po rt ): Th e in t ern al p o rt s o p en ed b y UPn P (if an y ) Ext . Po rt (Ext ern al Po rt ): Th e ext ern al p o rt s o p en ed b y UPn P (if an y ) IP A d d res s : Th e IP ad d res s o f t h e UPn P d ev ice d et ect ed b y t h is ro u t er Click Refres h t o refres h t h e p o rt map t ab le an d s earch fo r an y n ew UPn P d ev ices . 30 Unified Services Router User Manual 2.5 Captive Portal DSR-150/ 150N/ 250/ 250N d o es n o t h av e s u p p o rt fo r t h e Cap t iv e Po rt al feat u re. LA N u s ers can g ain in t ern et acces s v ia web p o rt al au t h en t icat io n wit h t h e DSR. A ls o referred t o as Ru n -Time A u t h en t icat io n , a Cap t iv e Po rt al is id eal fo r a web café s cen ario wh ere u sers in it iat e HTTP c o n nectio n req uests fo r web acces s b u t are n o t in t eres t ed in acces s in g an y LA N s erv ices . Firewall p o licies u n d ern eat h will d efin e wh ich u s ers req u ire au t h en t icat io n fo r HTTP acces s , an d wh en a mat ch in g u s er req u est is mad e t h e DSR will in t ercep t t h e req ues t an d p ro mp t fo r a u s ern ame / p as s word . Th e lo g in cred en t ials are co mp ared ag ain s t t h e Ru n TimeA u t h u s ers in u s er d at ab as e p rio r t o g ran t in g HTTP acces s . Cap t iv e Po rt al is av ailab le fo r LA N u s ers o n ly an d n o t fo r DM Z h o s t s . Advanced > Captive Portal >Captive Portal Sessions Th e A ct iv e Ru n t ime in t ern et s essio ns t h rou g h t h e ro u t er’s firewall are lis t ed in t h e b elo w t ab le. Th es e u s ers are p resent in t h e lo cal o r ext ern al u s er d at ab ase an d h av e h ad t h eir lo g in cred en t ials ap p ro v ed fo r in t ern et acces s . A ‘Dis co n n ect ’ b u t t o n allo ws t h e DSR ad min t o s elect iv ely d ro p an au t h en t icat ed u s er. 31 Unified Services Router User Manual Figure 14 : Active Runtime s e s s ions 2.6 Captive portal setup Advanced > Captive Portal >Captive Portal Setup Cap t iv e Po rt al is a s ecu rit y mech an is m t o s elect iv ely p ro v id e au t h en t icat io n o n cert ain in t erfaces . Th is p ag e allo ws t o man ag e t h e Po licie s an d Pro files o f Cap t iv ePo rt al. 32 Unified Services Router User Manual Figure 15 : Captive Portal Se tup Cap t iv e Po rt al Po licie s : Th e Lis t o f A v ailab le Cap t iv ePo rt al Po licies are s h o wn in t h is t ab le. A u t h en t icat io n Ty p e : Th is allo ws in ch o o s in g t h e au t h en t icat io n mo d e, t y p e an d red irect io n t y p e . Lis t o f A v ailab le Pro files : A n y o n e o f t h ese p ro files can b e u s ed fo r Cap t iv e Po rt al Lo g in p ag e wh ile en ab lin g Cap t iv e Po rt al. 33 Unified Services Router User Manual Figure 16 : Cus tomize d Captive Portal Se tup Click “A d d ” in t h e Cap t iv e Po rtal s etu p p ag e t o allo w d efin in g cu s t o mized cap t iv e p o rt al lo g in p ag e in fo rmat io n ( Pag e Backg ro u n d Co lo r, Head er Det ails , Head er Cap t io n , Lo g in Sect io n Det ails, A d vertis emen t Det ails , Fo o t er Det ails an d Cap t iv e Po rt al Head er Imag e ). 34 Unified Services Router User Manual Chapter 3. Connecting to the Internet: WAN Setup Th is ro u t er h as t wo W A N p o rt s t h at can b e u s ed t o es t ab lis h a co n n ect io n t o t h e in t ern et . Th e fo llo win g ISP co n n ect io n t y p es are s u p p o rt ed : DHCP, St at ic, PPPo E, PPTP, L2TP, 3G In t ern et (v ia USB mo d em). It is as s u med t h at y o u h av e arran g ed fo r in t ern et s erv ice wit h y o u r In t ern et Serv ice Pro v id er (ISP). Pleas e co n tact y o ur ISP o r n et wo rk ad min is t rat o r fo r t h e co n fig u rat io n in fo rmat io n t h at will b e req u ired t o s et u p t h e ro u t er. 3.1 Internet Setup Wizard Setup > Wizard > Internet Th e In t ern et Co n nect io n Set u p W izard is av ailab le fo r u s ers n ew t o n et wo rkin g . By g o in g t h ro ug h a few s t raig ht forward co nfig uratio n p ag es y o u can t ake t h e in fo rmat io n p ro v id ed b y y o ur ISP t o g et y o u r W A N co nnectio n u p an d en ab le in t ern et acces s fo r y o u r n et wo rk. Figure 17 : Inte rne t Conne ction Se tup Wizard Yo u can s t art u sin g t h e W izard b y lo g g ing in wit h t h e ad min is trato r p as s wo rd fo r t h e ro u t er. On ce au t hent icat ed s et t h e t ime zo n e t h at y o u are lo cat ed in , an d t h en ch o o s e t h e t y p e o f ISP co n n ect io n t y p e: DHCP, St at ic, PPPo E, PPTP, L2TP. Dep en d in g o n t h e co n n ectio n t y p e a u s ername/ passwo rd may b e req u ired t o reg ister t h is ro u t er wit h t h e ISP. In mo s t cas es t h e d efault s ettin gs can b e u sed if t h e ISP d id n o t s p ecify t h at p aramet er. Th e las t s tep in t h e W izard is t o click t h e Co n n ect b u t t o n , wh ich co n firms t h e s et tin gs b y es tab lish ing a lin k wit h t h e ISP. On ce co n n ect ed , y ou can mo v e o n and co n fig u re o t h er feat u res in t h is ro u t er. 35 Unified Services Router User Manual 3G In t ern et acces s wit h a USB mo d em is s u p p o rt ed o n W A N 3. Th e In t ern et Co n n ect io n Set u p W izard as s is t s wit h t h e p rimary W A N p o rt (W A N1) co n fig u ratio n o n ly . 3.2 WAN Configuration Setup > Internet Settings > WAN1 Setup Yo u mu s t eit h er allo w t h e ro u t er t o d et ect W A N co n n ect io n t y p e au t o mat ically o r co n fig u re man u ally t h e fo llo win g b as ic s et t in g s t o en ab le In t ern et co n n ect iv it y : ISP Co n n ect io n t y p e: Bas ed o n t h e ISP y o u h av e s elect ed fo r t h e p rimary W A N lin k fo r t h is ro u t er, ch o o s e St at ic IP ad d res s , DHCP clien t , Po in t -t o -Po in t Tu n n elin g Pro t ocol (PPTP), Po in t -t o -Po int Pro t oco l o v er Et h ern et (PPPo E), Lay er 2 Tu n n elin g Pro t o co l (L2TP). Req u ired field s fo r t h e s elect ed ISP t y p e b eco me h ig h lig h t ed. En t er t h e fo llo win g in fo rmat ion as n eed ed an d as p ro v id ed b y y o u r ISP: PPPo E Pro file Name. Th is men u lis t s co n fig u red PPPo E p ro files , p art icu larly u s efu l wh en co n fig u rin g mu lt ip le PPPo E co n n ect i o n s (i.e. fo r Jap an ISPs t h at h av e mu lt ip le PPPo E s u p p o rt ). ISP lo g in in fo rmat io n . Th is is req u ired fo r PPTP an d L2TP ISPs . Us er Name Pas s wo rd Secret (req u ired fo r L2TP o n ly ) M PPE En cry p t io n: Fo r PPTP lin ks , y o u r ISP may req u ire y o u t o en able M icro so ft Po in t -t o -Po in t En cry p t io n (M PPE). Sp lit Tu n n el (s u ppo rted fo r PPTP an d L2TP co n n ectio n). Th is s et tin g allo ws y o u r LA N h o s t s t o access in t ernet s it es o v er t h is W A N lin k wh ile s t ill p ermit t in g VPN t raffic t o b e d irect ed t o a VPN co n fig u red o n t h is W A N p o rt . If s p lit t u n n el is en abled, DSR wo n ’t exp ect a d efau lt ro u t e fro m t h e ISP s erv er. In s u ch case, u ser h as t o t ake care o f ro u t ing man u ally b y co nfig u ring t he ro u tin g from St at ic Ro u t in g p ag e. Co n n ect iv it y Ty pe : To keep t h e co n n ect io n alway s o n , click Keep Co n n ect ed . To lo g o u t aft er t h e co nn ectio n is id le fo r a p erio d o f t ime (u s efu l if y o u r ISP co s t s are b as ed o n lo g o n t imes ), click Id le Timeo u t an d en t er t h e t ime, in min u t es , t o wait b efo re d is co n n ect in g in t h e Id le Time field . 36 Unified Services Router User Manual M y IP A d d res s : En t er t h e IP ad d res s as s ig n ed t o y o u b y t h e ISP. Serv er IP A d d res s : En t er t h e IP ad d res s o f t h e PPTP o r L2TP s erv er. DSR-150/ 150N/ 250/ 250N d o es n ’t h av e a d u al W A N s u p p o rt . 3.2.1 W AN Port IP address Yo u r ISP as s ig n s y o u an IP ad d res s t h at is eit h er d y n amic (n ewly g en erat ed each t ime y o u lo g in ) o r s t at ic (p erman ent). Th e IP A d d ress So u rce o p t io n allo ws y o u t o d efin e wh et h er t h e ad d ress is s t at ically p ro v id ed b y t h e ISP o r s h o u ld b e receiv ed d y n amically at each lo g in . If s t at ic, en t er y o ur IP ad d ress, IPv 4 s u b net mas k, and the ISP g at eway ’s IP ad d ress. PPTP an d L2TP ISPs als o can p ro v ide a s t at ic IP ad d res s an d s u b n et t o co n fig u re, h o wev er t h e d efau lt is t o receiv e t h at in fo rmat io n d y n amically fro m t h e ISP. 3.2.2 W AN DNS Serv ers Th e IP A d d res s es o f W A N Do main Name Serv ers (DNS) are t y p ically p ro v id ed d y n amically fro m t h e ISP b u t in s o me cas es y ou can d efin e t h e s tatic IP ad d resses of t h e DNS s erv ers . DNS s erv ers map In t ern et d o main n ames (examp le: www.g o o g le.co m) t o IP ad d res s es . Click t o in d icat e wh et h er t o g et DNS s erv er ad d res s es au t o mat ically fro m y o u r ISP o r t o u s e ISP -s p ecified ad d res s es . If it s lat t er, en t er ad d res s es fo r t h e p rimary an d s eco n d ary DNS s erv ers . To av o id co n n ect iv it y p ro b lems , en s u re t h at y o u en t er t h e ad d res s es co rrect ly . 3.2.3 DHCP W AN Fo r DHCP clien t co n n ect io n s , y o u can ch o o s e t h e M A C ad d res s o f t h e ro u t er t o reg is t er wit h t h e ISP. In s o me cas es y o u may n eed t o clo n e t h e LA N h o s t ’s M A C ad d res s if t h e ISP is reg is t ered wit h t h at LA N h o s t . 37 Unified Services Router User Manual Figure 18 : M anual WAN configuratio n 3.2.4 PPPoE Setup > Internet Settings Th e PPPo E ISP s et t in g s are d efin ed o n t h e W A N Co n fig u rat io n p age. Th ere are t wo t y p es o f PPPo E ISP’s s u p p o rt ed b y t h e DSR: t h e s t an d ard u s ern ame/ p as s wo rd PPPo E an d Jap an M u lt ip le PPPo E. 38 Unified Services Router User Manual Figure 19 : PPPoE configuratio n for s tandard ISPs M o s t PPPo E ISP’s u s e a s in g le co nt rol an d d ata co nnect ion , an d req u ire u s ern ame / p as s wo rd cred en t ials t o lo g in an d au t h en t icat e t h e DSR wit h t h e ISP. Th e ISP co n n ect io n t y p e fo r t h is cas e is “PPPo E (Us ern ame/ Pas s wo rd )”. Th e GUI will p ro mp t y o u fo r au t h en ticatio n, s erv ice, an d co nnect io n s et tin gs in o rd er t o es t ab lis h t h e PPPo E lin k. Fo r s o me ISP’s , mo s t p o p u lar in Jap an , t h e u s e o f “ Jap an es e M u lt ip le PPPo E” is req u ired in o rd er t o es t ablis h co n cu rren t p rimary an d s eco ndary PPPo E co n n ect io n s b et ween t h e DSR an d t h e ISP. Th e Primary co n n ect ion is u s ed fo r t h e b u lk o f d at a an d in t ern et t raffic an d t h e Seco n d ary PPPo E co n n ect io n carries ISP s p ecific (i.e. co n t ro l) t raffic b et ween t h e DSR an d t h e ISP. 39 Unified Services Router User Manual Figure 20 : WAN configurat io n for Japane s e M ultiple PPPoE (part 1) Th ere are a few key elemen t s o f a mu lt ip le PPPo E co n n ect io n : Primary an d s eco n d ary co n n ect io n s are co n cu rren t Each s es sio n h as a DNS s erv er s ou rce fo r d o main n ame lo o ku p , t h is can b e assig ned b y t h e ISP o r co n fig u red t h ro u g h t h e GUI Th e DSR act s as a DNS p ro xy fo r LA N u s ers On ly HTTP req u es ts t h at s pecifically id en t ify t h e s econd ary co nnectio n’s d o main n ame (fo r examp le * .flet s ) will u s e t h e s eco n d ary p ro file t o acces s t h e co n t en t av ailab le t h ro u g h t h is s econ dary PPPo E t ermin al. A ll o t h er HTTP / HTTPS req u es ts g o t h ro u g h t h e p rimary PPPo E co n n ect io n . 40 Unified Services Router User Manual W h en Jap anese mu lt ip le PPPo E is co n fig u red an d s eco ndary con nect ion is u p , so me p red efin ed ro u t es are ad ded o n t hat in t erface. Th ese ro u tes are n eeded t o access t he in t ern al d o main o f t h e ISP wh ere h e h o s t s v ario us s erv ices . Th es e ro u t es can ev en b e co n fig u red t h ro u g h t h e s t at ic ro u t in g p ag e as well. Figure 21 : WAN configurat io n for M ultiple PPPoE (part 2) 3.2.5 Russia L2TP and PPTP W AN Fo r Ru s s ia L2TP W A N co n n ect io n s , y o u can ch o o s e t h e ad d res s mo d e o f t h e co n n ect io n t o g et an IP ad d res s fro m t h e ISP o r co n fig u re a s t at ic IP ad d res s p ro v id ed b y t h e ISP. Fo r DHCP clien t co n n ect io n s , y o u can ch o o s e t h e M A C ad d res s o f t h e ro u t er t o reg ist er wit h t h e ISP. In s o me cas es y o u may n eed t o clo n e t h e LA N h o s t ’s M A C ad d res s if t h e ISP is reg is t er ed wit h t h at LA N h o s t . 41 Unified Services Router User Manual Figure 22 : Rus s ia L2TP ISP configurat io n 3.2.6 Russia Dual Access PPPoE Fo r Ru s s ia d u al access PPPo E co n n ectio ns, y o u can ch oose t h e ad dres s mo d e o f t h e co n n ect io n t o g et an IP ad d res s fro m t h e ISP o r co n fig u re a s t at ic IP ad d res s p ro v id ed b y t h e ISP. 42 Unified Services Router User Manual Figure 23 : Rus s ia Dual acce s s PPPoE configuratio n 3.2.7 W AN Configuration in an IPv 6 Network Advanced > IPv6 > IPv6 WAN1 Config Fo r IPv 6 W A N co n n ect io n s , t h is ro u t er can h av e a s t at ic IPv 6 ad d res s o r receiv e co n n ectio n in fo rmat io n wh en co nfig ured as a DHCPv 6 clien t . In t h e cas e wh ere t h e ISP as s ig n s y o u a fixed ad d res s t o acces s t h e in t ern et , t h e s t at ic co n fig u rat io n s et t in gs mu s t b e co mp leted. In ad d it ion t o t h e IPv 6 ad d ress as sign ed t o y o u r ro u t er, t h e IPv 6 p refix len g t h d efin ed b y t h e ISP is n eed ed . Th e d efau lt IPv 6 Gat eway ad d res s is t h e s erv er at t h e ISP t h at t h is ro u t er will co n n ect t o fo r acces s in g t h e in t ern et . Th e p rimary an d s eco n d ary DNS s erv ers o n t h e ISP’s IPv 6 n et wo rk are u s ed fo r res o lvin g in t ernet ad d resses, and t h ese are p ro vid ed alo ng wit h t h e s tat ic IP ad d res s an d p refix len g t h fro m t h e ISP. W h en t h e ISP allo ws y o u t o o b t ain t h e W A N IP s et t in g s v ia DHCP, y o u n eed t o p ro v id e d et ails fo r t h e DHCPv 6 clien t co n fig u rat io n . Th e DHCPv 6 clien t o n t h e g at eway can b e eit her s tateless o r s t ateful. If a s t at eful clien t is s elected t h e g at eway will co n n ect t o t h e ISP’s DHCPv 6 s erv er fo r a leas ed ad d res s . Fo r s t at eles s DHCP 43 Unified Services Router User Manual t h ere n eed n o t b e a DHCPv 6 s erv er av ailab le at t h e ISP, rat h er ICM Pv 6 d is co v er mes s ag es will o rig in at e fro m t h is g at eway an d will b e u s ed fo r au t o co nfig u rat ion. A t h ird o p t io n t o s p ecify t h e IP ad d res s an d p refix len g t h o f a p referred DHCPv 6 s erv er is av ailab le as well. Figure 24 : IPv6 WAN Se tup page Prefix Deleg at io n : Select t his o pt ion t o req uest ro ut er ad v ert isemen t p refix fro m an y av ailab le DHCPv 6 s erv ers a vailab le o n t h e ISP, t h e o b tain ed p refix is u p d at ed t o t he ad v ert is ed p refixes o n t h e LA N s id e. Th is o pt ion can b e s elect ed o n ly in St at es les s A d d res s A u t o Co n fig u rat io n mo d e o f DHCPv 6 Clien t . W h en IPv 6 is PPPo E t y p e, t h e fo llo win g PPPo E field s are en ab le d . Us ern ame: En t er t h e u s ern ame req u ired t o lo g in t o t h e ISP. 44 Unified Services Router User Manual Pas s wo rd : En t er t h e p as s wo rd req u ired t o lo g in t o t h e ISP. A u t h ent icat ion Ty pe: Th e t y pe o f A u t hent icatio n in u se b y t he p ro file: A u to Neg o t iat e/ PA P/ CHA P/ M S-CHA P/ M S-CHA Pv 2. Dh cp v 6 Op t io n s : Th e mo d e o f Dh cp v 6 clien t t h at will s t art in t h is mo d e: d is ab le d h cpv6/ stateless d hcpv6/ stateful d h cpv 6/st at eless d h cp v6 wit h p refix d eleg at io n . Primary DNS Serv er: En t er a v alid p rimary DNS Serv er IP A d d res s . Seco n d ary DNS Serv er: En t er a v alid s eco n d ary DNS Serv er IP A d d res s . Click Sav e Set t in g s t o s av e y o u r ch an g es . 3.2.8 Checking W AN Status Setup > Internet Settings > WAN 1 Status Th e s t at us an d s u mmary o f co n fig u red sett in g s fo r b o t h W A N1 , W A N2 an d W A N3 are av ailab le o n t h e W A N St at us p age. Yo u can v iew t h e fo llo win g key co n n ect io n s t at u s in fo rmat io n fo r each W A N p o rt : Co n n ect io n t ime : Th e co n n ect io n u p t ime Co n n ect io n t y p e: Dy n amic IP o r St at ic IP Co n n ect io n s tate: Th is is wh et her t h e W AN is co n n ected o r d is con n ect ed t o an ISP. Th e Lin k St at e is wh et h er t h e p h y s ical W A N co n n ect io n in p lace; t h e Lin k St at e can b e UP (i.e. cab le in s ert ed ) wh ile t h e W A N Co n n ect io n St at e is d o wn . IP ad d res s / s u b n et mas k: IP A d d res s as s ig n ed Gat eway IP ad d res s : W A N Gat eway A d d res s 45 Unified Services Router User Manual Figure 25 : Conne ction Status inform at io n for both WAN ports Th e W A N s t at us p age allo ws y ou t o En ab le o r Dis ab le s t at ic W A N lin ks . Fo r W A N s et t in gs t h at are d y namically receiv ed fro m t h e ISP, y o u can Ren ew o r Releas e t h e lin k p aramet ers if req u ired . 46 Unified Services Router User Manual 3.3 Bandwidth Controls Advanced > Advanced Network > Traffic Management > Bandwidth Profiles Ban d wid t h p ro files allo w y o u t o reg u late t h e t raffic flo w fro m t h e LA N t o W A N 1 o r W A N 2. Th is is u s efu l t o en s u re t h at lo w p rio rit y LA N u s ers (l ike g u es t s o r HTTP s erv ice) d o n o t mo n o p o lize t h e av ailab le W A N’s b an d wid t h fo r co s t -s av in g s o r b an d wid t h -p rio rit y -allo cat io n p u rp o s es . Ban d wid t h p ro files co nfig uratio n co nsis ts o f en ab lin g t h e b an d wid t h co n t ro l feat u re fro m t h e GUI an d ad d in g a p ro file wh ich d efin es t h e co n t ro l p aramet ers . Th e p ro file can t h en b e asso ciat ed wit h a t raffic s electo r, so t h at b an dwid th p ro file can b e ap p lied t o t h e t raffic mat ch in g t h e s elect o rs . Select o rs are elemen t s like IP ad d res s es o r s erv ices t h at wo u ld t rig g er t h e co n fig u red b an d wid t h reg u lat io n . Figure 26 : Lis t of Configure d B andwi dt h Profile s To creat e a n ew b an d wid t h p ro file, click A d d in t h e Lis t o f Ban d wid t h Pro files . Th e fo llo win g co n fig u rat io n p aramet ers are u s ed t o d efin e a b an d wid t h p ro file: Pro file Name: Th is id en t ifier is u s ed t o as s o ciat e t h e co n fig u red p ro file t o t h e t raffic s elect o r Yo u can ch o o s e t o limit t h e b an d wid t h eit h er u s in g p rio rit y o r rat e. If u s in g p rio rit y “Lo w” , “Hig h ”, an d “ M ed iu m” can b e s elect ed . If t h ere is a lo w p rio rit y p ro file as s o ciat ed wit h t raffic s elect o r A an d a h ig h p rio rit y p ro file as s o ciat ed wit h t raffic s elect o r B, t h en t h e W A N b an d wid t h allo cat io n p referen ce will b e t o t raffic s elect o r B p acket s . 47 Unified Services Router User Manual Fo r fin er co n t ro l, t h e Rat e p ro file t y pe can b e u s ed . W it h t h is o p t io n t h e min imu m an d maximu m b an d wid t h allo wed b y t h is p ro file can b e limit ed . Ch o o s e t h e W A N in t erface t h at t h e p ro file s h o u ld b e as s o ciat ed wit h . Figure 27 : B andwid t h Profile Configurat io n page Advanced > Advanced Network > Traffic Management > Traffic Selectors On ce a p ro file h as b een creat ed it can t h en b e as s o ciat ed wit h a t raffic flo w fro m t h e LA N t o W A N. To creat e a t raffic s elect o r, click A d d o n t h e Traffic Select o rs p ag e. Traffic s elect or co n fig uratio n b in d s a b an d wid t h p ro file t o a t y p e o r s o u rce o f LA N t raffic wit h t h e fo llo win g s et t in g s : A v ailab le p ro files : A s s ig n o n e o f t h e d efin ed b an d wid t h p ro file s Serv ice: Yo u can h av e t h e s elect ed b an d wid t h reg u lat io n ap p ly t o a s p ecific s erv ice (i.e. FTP) fro m t h e LA N. If y o u d o n o t s ee a s ervice t h at y ou wan t , y o u can co n fig u re a cu sto m s erv ice t h rou gh t h e Advanced > Firewall Settings > Custom Services p age. To h ave t h e p ro file ap p ly t o all s erv ices , s elec t A NY. Traffic Select o r M at ch Ty p e: t h is d efin es t h e p aramet er t o filt er ag ain s t wh en ap p ly in g t h e b an d wid t h p ro file. A s p ecific mach in e o n t h e LA N can b e id en t ified v ia IP ad d res s o r M A C ad d res s , o r t h e p ro file can ap p ly t o a LA N p o rt o r VLA N g ro u p . A s well a wireles s n et wo rk can b e s elect ed b y it s BSSID fo r b an d wid t h s h ap in g . 48 Unified Services Router User Manual Figure 28 : Traffi c Se le ctor Configu rat io n 3.4 Features with Multiple WAN Links Th is ro u t er s u p p o rt s mu lt ip le W A N lin ks . Th is allo ws y o u t o t ake ad v an t ag e o f failo v er an d lo ad b alan cing featu res t o en sure certain in t ern et d epend en t s erv ices are p rio rit ized in t h e ev en t o f u n s t ab le W A N co n n ect iv it y o n o n e o f t h e p o rt s . Setup > Internet Settings > WAN Mode To u s e A u t o Failo v er o r Lo ad Balan cin g , W A N lin k failu re d et ect io n mu s t b e co n fig u red. Th is in v olv es accessin g DNS s erv ers o n t h e in t ern et o r p in g t o an in t ernet ad d res s (u s er d efin ed ). If req u ired , y o u can co n fig u re t h e n u mb er o f ret ry at t emp t s wh en t h e lin k s eems t o b e d is con nect ed o r t h e t h reshold o f failu res t h at d et ermin es if a W A N p o rt is d o wn . 3.4.1 Auto Failov er In t h is cas e o n e o f y o u r W A N p o rt s is as s ig n ed as t h e p rimary in t ern et lin k fo r all in t ern et t raffic. Th e s econ dary W A N p o rt is u s ed fo r red un dancy in cas e t h e p rimary lin k g o es d o wn fo r an y reaso n . Bo t h W A N p o rt s (p rimary an d s eco n d ary ) mu s t b e co n fig u red t o co n n ect t o t h e res p ect iv e ISP’s b efo re en ab lin g t h is feat u re. Th e s eco n d ary W A N p o rt will remain u n co n n ect ed u n t il a failu re is d et ect ed o n t h e p rimary lin k (eit h er p o rt can b e as sign ed as t h e p rimary ). In t h e ev en t o f a failu re o n t h e p rimary p o rt , all in t ern et t raffic will b e ro lled o v er t o t h e b acku p p o rt . W h en co n fig u red in A u t o Failo v er mo d e, t h e lin k s t at u s o f t h e p rimary W A N p o rt is ch ecked at reg u lar in t erv als as d efin ed b y t h e failu re d et ect io n s et t in g s . 49 Unified Services Router User Manual No t e t h at b o th W AN1, W A N2 an d W A N3 can b e co nfig ured as t h e p rimary in t ern et lin k. A u t o -Ro llo v er u s in g W A N p o rt Primary W A N: Select ed W A N is t h e p rimary lin k ( W A N1/ W A N2/ W A N3) Seco n d ary W A N: Select ed W A N is t h e s eco n d ary lin k. Failo v er Det ect io n Set tin gs: To ch eck co nn ectiv it y o f t h e p rimary in t ern et lin k, o n e o f t h e fo llo win g failu re d et ect io n met h o d s can b e s elect ed : DNS lo o ku p u s in g W A N DNS Serv ers : DNS Lo o ku p o f t h e DNS Serv ers o f t h e p rimary lin k are u s ed t o d et ect p rimary W A N co n n ect iv it y . DNS lo o ku p u s in g DNS Serv ers : DNS Lo o ku p o f t h e cu s t o m DNS Serv ers can b e s p ecified t o ch eck t h e co n n ect iv it y o f t h e p rimary lin k. Pin g t h es e IP ad d res s es : Th es e IP's will b e p in g ed at reg u lar in t erv als t o ch eck t h e co n n ect iv it y o f t h e p rimary lin k. Ret ry In t erv al is : Th e n u mb er t ells t h e ro u t er h o w o ft en it s h o u ld ru n t h e ab o v e co n fig u red failu re d et ect io n met h o d . Failo v er aft er: Th is s et s t h e n u mb er o f ret ries aft er wh ich failo v er is in it iat ed . 3.4.2 Load Balancing Th is feat u re allo ws y o u t o u se mu lt ip le W A N lin ks (an d p res u mab ly mu lt ip le ISP’s ) s imu lt an eo u s ly . A ft er co n fig u rin g mo re t h an o n e W A N p o rt , t h e lo ad b alan cin g o p t io n is av ailab le t o carry t raffic o v er mo re t h an o n e lin k. Pro t o co l b in d in g s are u s ed t o s eg reg at e an d as s ig n s erv ices o v er o n e W A N p o rt in o rd er t o man ag e in t ern et flo w. Th e co n fig ured failu re d et ect ion met h od is u sed at reg ular in t erv als on all co n fig u red W A N p o rt s wh en in Lo ad Balan cin g mo d e. DSR cu rren t ly s u p p o rt t h ree alg o rit h ms fo r Lo ad Bal an cin g : Round Robi n: Th is alg o rit h m is p art icu larly u s efu l wh en t h e co n n ect io n s p eed o f o n e W A N p o rt g reat ly d iffers fro m an o t h er. In t h is cas e y o u can d efin e p ro t o co l b in d in g s t o ro u t e lo w-lat en cy s erv ices (s u ch as VOIP) o v er t h e h ig h er -s p eed lin k an d let lo w-v o lu me b ackg ro u nd t raffic (s u ch as SM TP) g o o v er t h e lo wer s p eed lin k. Pro t o co l b in d in g is exp lain ed in n ext s ect io n . S pi l l Over : If Sp ill Ov er met h o d is s elect ed , W A N1 act s as a d ed icat ed lin k t ill a t h res h old is reached. A ft er t h is , W A N2 will b e u s e d fo r n ew co n n ect io n s . Yo u can co n fig u re s p ill-o v er mo d e b y u s in g fo llo win g o p t io n s : Lo ad To leran ce: It is t h e p ercen t ag e o f b an d wid t h aft er wh ich t h e ro u t er s wit ch es t o s eco n d ary W A N. M ax Ban d wid t h : Th is s et s t h e maximu m b an d wid t h t o lerab le b y t h e p rimary W A N. If t h e lin k b an d wid t h g o es ab o v e t h e lo ad t o leran ce v alu e o f max b an d wid t h , t h e ro u t er will s p ill-o v er t h e n ext co n n ect io n s t o s eco n d ary W A N. Fo r examp le, if t h e maximu m b an d wid t h o f p rimary W A N is 1 Kb p s an d t h e lo ad t o leran ce is s et t o 70. No w ev ery t ime a n ew co n n ect io n is es t ab lis h ed t h e b an d wid t h in creases. A ft er a cert ain n u mb er o f co n nect ions s ay b an d wid t h reach ed 50 Unified Services Router User Manual 70% o f 1Kb p s , t h e n ew co n n ect io n s will b e s p illed -o v er t o s eco n d ary W A N. Th e maximu m v alu e o f lo ad t o leran ce is 80 an d t h e leas t is 20. Protocol B i ndi ng s : Refer Sect io n 3.4.3 fo r d et ails Lo ad b alan cin g is p art icularly u sefu l wh en t h e co n n ect io n s p eed o f o n e W A N p o rt g reat ly d iffers fro m an o t h er. In t h is case y o u can d efin e p ro t o co l b in d in g s t o ro u t e lo w-lat en cy s ervices (s uch as VOIP) o v er t h e h ig h er -s p eed lin k an d let lo w-v o lu me b ackg ro u n d t raffic (s u ch as SM TP) g o o v er t h e lo wer s p eed lin k. 51 Unified Services Router User Manual Figure 29 : Load B alancing is available whe n multiple WAN ports are configure d and Protocol B indings have be e n de fine d 3.4.3 Protocol Bindings Advanced > Routing > Protocol Bindings Pro t o co l b in d in gs are req uired wh en t h e Lo ad Balan cin g feat ure is in u s e. Ch o o s in g fro m a lis t o f co n fig u red s erv ices o r an y o f t h e u s er-d efin ed s erv ices , t h e t y p e o f t raffic can b e as s ig n ed t o g o o v er o n ly o n e o f t h e av ailab le W A N p o rt s . Fo r in creas ed flexib ilit y t h e s o u rce n et work o r mach in es can b e s p ecified as well as t h e d es t in at io n n et wo rk o r mach in es . Fo r examp le t h e VOIP t raffic fo r a s et o f LA N IP ad d res ses can b e assig ned t o o n e W A N an d an y VOIP t raffic fro m t h e remain in g IP 52 Unified Services Router User Manual ad d res s es can b e as s ig n ed t o t h e o t h er W A N lin k. Pro t o co l b in d in g s are o n ly ap p licab le wh en lo ad b alan cin g mo d e is en ab led an d mo r e t h an o n e W A N is co n fig u red . Figure 30 : Protocol binding s e tup to as s ociate a s e rvice and/or LAN s ource to a WAN and/or de s tination ne twork 3.5 Routing Configuration Ro u t in g b et ween t h e LA N an d W A N will imp act t h e way t h is ro u t er h an d les t raffic t h at is receiv ed o n an y o f it s p h ysical in t erfaces. Th e ro u t in g mo d e o f t h e g at eway is co re t o t h e b eh av io u r o f t h e t raffic flo w b et ween t h e s ecu re LA N an d t h e in t ern et . 3.5.1 Routing Mode Setup > Internet Settings > Routing Mode Th is d ev ice s u p p o rt s clas s ical ro u t in g , n et wo rk ad d res s t ran s lat io n (NA T), an d t ran s p o rt mo d e ro u t in g . W it h clas s ical ro u t ing , d evices o n t h e LA N can b e d irect ly acces s ed fro m t h e in t ern et b y t heir p u b lic IP ad d resses (as sumin g ap pro priat e firewall s et t in gs). If y o u r ISP h as as s ig n ed an IP ad d res s fo r each o f t h e co mp u t ers t h at y o u u s e, s elect Clas s ic Ro u t in g . 53 Unified Services Router User Manual NA T is a t ech n iq u e wh ich allo ws s ev eral co mp u t ers o n a LA N t o s h are an In t ern et co n n ect io n . Th e co mp u t ers o n t h e LA N u s e a " p riv at e" IP ad d res s ran g e wh ile t h e W A N p o rt o n t h e ro u ter is co n figu red wit h a s in g le " p u b lic" IP ad d res s. A lo ng wit h co n nectio n s harin g, NA T als o h id es in t ern al IP ad d res s es fro m t h e co mp u t ers o n t h e In t ern et . NA T is req u ired if y o u r ISP h as as s ig n ed o n ly o n e IP ad d res s t o y o u. Th e co mp u te rs t hat co n nect t h ro u g h t h e ro u t er will n eed t o b e as s ig n ed IP ad d res s es fro m a p riv at e s u b n et . Tran s p aren t ro u t in g b et ween t h e LA N an d W A N d o es n o t p erfo rm NA T. Bro ad cas t an d mu lt icast p ackets t h at arriv e o n t h e LA N in t erface are s wit ch ed t o t h e W A N an d v ice v ers a, if t h ey d o n o t g et filt ered b y firewall o r VPN p o licies . To main t ain t h e LA N an d W A N in t h e s ame b ro ad cas t d o main s elect Tran s p aren t mo d e , wh ich allo ws b rid g ing o f t raffic fro m LA N t o W A N an d v ice v ers a, excep t fo r ro u t er-t ermin at ed t raffic an d o t h er man ag emen t t raffic . A ll DSR feat u res (su ch as 3G mo d em s u p p o rt ) are s u p p o rt ed in t ran s p aren t mo d e as s u min g t h e LA N an d W A N are co n fig u red t o b e in t h e s ame b ro ad cas t d o main . NA T ro u t in g h as a feat u re called “NA T Hair -p in nin g” t h at allo ws in t ern al n e t wo rk u s ers o n t h e LA N an d DM Z t o access in t ern al s erv ers (eg . an in t ern al FTP s erv er) u s in g t h eir ext ern ally -kn o wn d o main n ame. Th is is als o referred t o as “NA T lo o p b ack” s ince LA N g en erat ed t raffic is red irect ed t h ro u g h t h e firewall t o reach LA N s erv ers b y t h eir ext ern al n ame. 54 Unified Services Router User Manual Figure 31 : Routing M ode is us e d to configure traffic routing be twe e n WAN and LAN, as we ll as Dynamic routing (RIP) 55 Unified Services Router User Manual 3.5.2 Dynamic Routing (RIP) DSR- 150/ 150N/ 250/ 250N d o es n o t s u p p o rt RIP. Setup > Internet Settings > Routing Mode Dy n amic ro u t in g u s in g t h e Ro u t in g In fo rmat io n Pro t o co l (RIP) is an In t erio r Gat eway Pro t o co l (IGP) t h at is co mmo n in LA Ns . W it h RIP t h is ro u t er can exchange ro u t in g in fo rmat io n wit h o t her s upp orted ro u ters in t h e LA N an d allo w fo r d y n amic ad ju s t men t o f ro u t in g t ables in o rd er t o ad ap t t o mo d ificat io n s in t h e LA N wit h o u t in t erru p t in g t raffic flo w. Th e RIP d irect io n will d efin e h o w t h is ro u t er s en d s an d receiv es RIP p acket s . Ch o o s e b et ween : Bo t h : Th e ro u t er b o t h b ro ad cas t s it s ro u t in g t ab le an d als o p ro ces s es RIP in fo rmat io n receiv ed fro m o t h er ro u ters. Th is is t h e recommen d ed s et t in g in o rd er t o fu lly u t ilize RIP cap ab ilit ies . Ou t On ly : Th e ro u t er b ro adcasts it s ro u t in g t ab le p erio d ically b u t d o es n o t accep t RIP in fo rmat io n fro m o t h er ro u t ers . In On ly : Th e ro u t er accept s RIP in fo rmat io n fro m o t h er ro u t ers, b u t d o es not b ro ad cas t it s ro u t in g t ab le. No n e: Th e ro u t er n eit h er b ro ad cas t s it s ro u t e t ab le n o r d o es it accep t an y RIP p acket s fro m o t h er ro u t ers . Th is effect iv ely d is ab les RIP. Th e RIP v ers io n is d ep en d en t o n t h e RIP s u p p o rt o f o t h er ro u t in g d ev ices in t h e LA N. Dis ab led : Th is is t h e s et t in g wh en RIP is d is ab led . RIP-1 is a clas s -b as ed ro u t in g v ers io n t h at d o es n o t in clu d e s u b n et in fo rmat io n . Th is is t h e mo s t co mmo n ly s u p p o rt ed v ers io n . RIP-2 in clu d es all t h e fu n ct io n alit y o f RIPv 1 p lu s it s u p p o rt s s u b n et in fo rmat io n . Th o u g h t h e d at a is s en t in RIP -2 fo rmat fo r b o t h RIP-2B an d RIP-2M , t h e mo d e in wh ich p acket s are s en t is d ifferen t. RIP-2B b ro ad cas t s d at a in t h e en t ire s u b n et wh ile RIP-2M s en d s d at a t o mu lt icas t ad d res s es . If RIP-2B o r RIP-2M is t h e s elect ed v ersio n, au th en ticat io n b etween t h is ro u t er an d o t h er ro u t ers (co n fig u red wit h t h e s ame RIP v ers io n ) is req u ired . M D5 au t h en ticat io n is u sed in a firs t / s eco n d key exch an g e p ro ces s . Th e au t h en t icat io n key v alid it y lifet imes are co n fig u rab le t o en s u re t h at t h e ro u t in g in fo rmat io n exch an g e is wit h cu rren t an d s u p p o rt ed ro u t ers d et ect ed o n t h e LA N. 56 Unified Services Router User Manual 3.5.3 Static Routing Advanced > Routing > Static Routing Advanced > IPv6 > IPv6 Static Routing M an u ally ad d ing s tatic ro u tes t o t h is d evice allo ws y o u t o d efin e t h e p at h s elect io n o f t raffic fro m o n e in t erface t o an o t h er. Th ere is n o co mmu n icat io n b et ween t h is ro u t er an d o t h er d ev ices t o acco u n t fo r ch an g es in t h e p at h ; o n ce co n fig u red t h e s t at ic ro u t e will b e act iv e an d effect iv e u n t il t h e n et wo rk ch an g es . Th e Lis t o f St at ic Ro u t es d is play s all ro u t es t h at h av e b een ad d ed man u ally b y an ad min is t rat o r an d allo ws s ev eral o p erat io n s o n t h e s t at ic ro u t es . Th e Lis t o f IPv 4 St at ic Ro u t es an d Lis t o f IPv 6 St at ic Ro u t es s h are t h e s ame field s (wit h o n e excep t io n ): Name: Name o f t h e ro u t e, fo r id en t ificat io n an d man ag emen t . A ct iv e: Det ermin es wh et her t h e ro u t e is act iv e o r in act iv e. A ro u t e can b e ad d ed t o t h e t able an d mad e in act ive, if n o t n eeded. Th is allo ws ro u t es t o b e u s ed as n eeded wit h o ut d eletin g an d re -ad din g t h e en try . A n in activ e ro ute is n o t b ro ad cas t if RIP is en ab led . Priv at e: Det ermin es wh et h er t he ro u te can b e s hared wit h o t her ro u ters wh en RIP is en ab led . If t h e ro u t e is mad e p riv at e , t h en t he ro u te will n o t b e s h ared in a RIP b ro ad cas t o r mu lt icas t . Th is is o n ly ap p licab le fo r IPv 4 s t at ic ro u t es . Des t in at io n : t h e ro u t e will lead t o t h is d es t in at io n h o s t o r IP ad d res s . IP Su b n et M as k: Th is is v alid fo r IPv 4 n et wo rks o n ly , an d id en t ifies t h e s u b n et t h at is affect ed b y t h is s t at ic ro u t e In t erface: Th e p h ysical n et wo rk in t erface (W A N1, W A N2, W A N3, DM Z o r LA N), t h ro u g h wh ich t h is ro u t e is acces s ib le. Gat eway : IP a d d ress o f t h e g ateway t h ro u g h wh ich t h e d es t in at io n h o s t o r n et wo rk can b e reach ed . M et ric: Det ermin es t h e p rio rit y o f t h e ro u t e. If mu lt ip le ro u t es t o t h e s ame d es t in at io n exis t , t h e ro u t e wit h t h e lo wes t met ric is ch o s en . 57 Unified Services Router User Manual Figure 32 : Static route configurat io n fie lds 3.5.4 OSPFv 2 Advanced > Routing > OSPF OSPF is an in t erio r g at eway p ro t ocol t h at ro u tes In ternet Pro t o col (IP) p acket s s o lely wit h in a s in g le ro u t ing d omain . It g at h ers lin k s t at e in fo rmat io n fro m av ailab le ro uters an d co n s t ru ct s a t o p o lo g y map o f t h e n et wo rk. OSPF v ers io n 2 is a ro u t in g p ro to co l wh ich d es crib ed in RFC2328 - OSPF Vers io n 2. OSPF is IGP (In t erio r Gat eway Pro t o co ls ).OSPF is wid ely u s ed in larg e n et wo rks s u ch as ISP b ackb o n e an d en t erp ris e n et wo rks . 58 Unified Services Router User Manual Figure 33 : OSPFv2 configure d parame te rs In t erface : Th e p h y s ical n et wo rk in t erface o n wh ich OSPFv 2 is En ab led / Dis ab led . St at u s : Th is co lu mn d is p lay s t h e En ab le/ Dis ab le s t at e o f OSPFv 2 fo r a p art icu lar in t erface. A rea: Th e area t o wh ich t h e in t erface b elo n g s . Two ro u t ers h av in g a co mmo n s eg men t ; t h eir in t erfaces h av e t o b elo n g t o t h e s ame area o n t h at s eg men t . Th e in t erfaces s h o u ld b elo n g t o t h e s ame s u b n et an d h av e s imilar mas k. Prio rit y : Help s t o d et ermin e t h e OSPFv 2 d es ig nated ro u t er fo r a n et wo rk. Th e ro u t er wit h t h e h ig h es t p rio rit y will b e mo re elig ib le t o b eco me Des ig n at ed Ro u t er. Set t in g t h e v alu e t o 0, makes t h e ro u t er in elig ib le t o b eco me Des ig n at ed Ro u t er. Th e d efau lt v alu e is 1.Lo wer v alu e mean s h ig h er p rio rit y . Hello In t erv al: Th e n u mb er o f s eco n d s fo r Hello In t erv al t imer v alu e . Set t in g t h is v alu e, Hello p acket will b e s en t ev ery t imer v alu e s eco nds o n t h e s p ecified in t erface. Th is v alu e mu s t b e t h e s ame fo r all ro u t ers at t ach ed t o a co mmo n n et wo rk. Th e d efau lt v alu e is 10 s eco n d s . Dead In t erv al: Th e n u mb er o f s econ ds t h at a d evice’s h ello p acket s mu s t n o t h ave been s een b efo re it s n eig h b o u rs d eclare t h e OSPF ro u t er d o wn . Th is v alu e mu s t b e t h e s ame fo r all ro u t ers at tach ed t o a co mmo n n et wo rk. Th e d efau lt v alu e is 40 s eco n d s . OSPF req u ires t h ese in t erv als t o b e exact ly t h e s ame b et ween t wo n eig h b o u rs . If an y o f t h es e in t erv als are d ifferen t , t h es e ro u t ers will n o t b eco me n eig h b o u rs o n a p art icu lar s eg men t Co s t : Th e co s t o f s en d in g a p acket o n an OSPFv 2 in t erface. A u t h ent icat ion Ty pe:. Th is co lu mn d is play s t he t y pe o f au t h en t icat io n t o b e u s ed fo r OSPFv 2.If A u t h en t icat io n t y p e is n o n e t h e in t erface d o es n o t au t h en t icat e o s p f p acket s . If A u t hent icatio n Ty pe is Simp le t h en o s p f p acket s are au t h en t icat ed u s in g s imp le t ext key . If A u t h enticatio n Ty p e is M D5 t h en t h e in t erface au t h en t ica t es o s p f p acket s wit h M D5 au t h en t icat io n . 59 Unified Services Router User Manual Figure 34 : OSPFv2 configurat io n 3.5.5 OSPFv 3 Advanced > IPv6 > OSPF Op en Sh o rt es t Pat h Firs t v ers io n 3 (OSPFv 3) s u p p o rt s IPv 6 . To en ab le an OSPFv 3 p ro ces s o n a ro u t er, y o u n eed t o en ab le t h e OS PFv 3 p ro ces s g lo b ally , as s ig n t h e OSPFv 3 p ro ces s a ro u t er ID, an d en ab le t h e OSPFv 3 p ro ces s o n relat ed in t erfaces 60 Unified Services Router User Manual Figure 35 : OSPFv3 configure d parame te rs In t erface: Th e p h y s ical n et wo rk in t erface o n wh ich OSPFv 3 is En ab led / Dis ab led . St at u s : Th is co lu mn d is p lay s t h e En ab le/ Dis ab le s t at e o f OSPFv 3 fo r a p art icu lar in t erface. Prio rit y : Help s t o d et ermin e t h e OSPFv 3 d es ig nated ro u t er fo r a n et wo rk. Th e ro u t er wit h t h e h ig h es t p rio rit y will b e mo re elig ib le t o b eco me Des i g n at ed Ro u t er. Set t in g t h e v alu e t o 0, makes t h e ro u t er in elig ib le t o b eco me Des ig n at ed Ro u t er. Th e d efau lt v alu e is 1.Lo wer Valu e mean s h ig h er p rio rit y . Hello In t erv al: Th e n u mb er o f s eco n d s fo r Hello In t erv al t imer v alu e. Set t in g t h is v alu e, Hello p acket will b e s en t ev ery t imer v alu e s eco nds o n t h e s p ecified in t erface. Th is v alu e mu s t b e t h e s ame fo r all ro u t ers at t ach ed t o a co mmo n n et wo rk. Th e d efau lt v alu e is 10 s eco n d s . Dead In t erv al: Th e n u mb er o f s econ ds t h at a d evice’s h ello p acket s mu s t n o t h ave bee n s een b efo re it s n eig hbo urs d eclare t h e OSPF ro u t er d o wn .This v alue mu s t b e t h e s ame fo r all ro u t ers at t ach ed t o a co mmo n n et wo rk. Th e d efau lt v alu e is 40 s eco n d s . OSPF req u ires t h ese in t erv als t o b e exact ly t h e s ame b et ween t wo n eig h b o u rs . If an y o f t h es e in t erv als are d ifferen t , t h es e ro u t ers will n o t b eco me n eig h b o u rs o n a p art icu lar s eg men t Co s t : Th e co s t o f s en d in g a p acket o n an OSPFv 3 in t erface. 61 Unified Services Router User Manual Figure 36 : OSPFv3 configurat io n 3.5.6 6to4 Tunneling Advanced > IPv6 > 6to4 Tunneling 6t o 4 is an In t ern et t ran sitio n mech an ism fo r mig rat in g fro m IPv 4 t o IPv 6, a s y s t em t h at allo ws IPv 6 p acket s t o b e t ran s mit t ed o v er an IPv 4 n et wo rk. Select t h e ch eck b o x t o Enabl e Automati c Tunnel i ng an d allo w t raffic fro m an IPv 6 LA N t o b e s en t o v er a IP v 4 Op t io n t o reach a remo t e IPv 6 n et wo rk. 62 Unified Services Router User Manual Figure 37 : 6 to 4 tunne ling 3.5.7 ISATAP Tunnels Advanced > IPv6 > 6to4 Tunneling ISA TA P (In t ra -Sit e A u t o mat ic Tu n n el A d d res s in g Pro t o co l) is an IPv 6 t ran s it io n mech an ism mean t t o t ran smit IPv 6 p acket s b etween d u al-s t ack n o d es o n t o p o f an IPv 4 n et wo rk. ISA TA P s p ecifies an IPv 6-IPv 4 co mp at ib ilit y ad d res s fo rmat as well as a mean s fo r s it e b o rd er ro u t er d is co v ery . ISA TAP als o s p ecifies t h e o p erat io n o f IPv 6 o v er a s p ecific lin k lay er - t h at b ein g IPv 4 u s ed as a lin k lay er fo r IPv 6. 63 Unified Services Router User Manual Figure 38 : IS ATAP Tunnel s Confi g ura ti o n ISA TA P Su b n et Prefix: Th is is t h e 64-b it s u b n et p refix t h at is as s ig n ed t o t h e lo g ical ISA TA P s u bn et fo r t h is in t ranet. Th is can b e o b tained fro m y o u r ISP o r in t ern et reg is t ry , o r d eriv ed fro m RFC 4193. En d Po in t A d d ress: Th is is t h e en dpo int ad dress fo r t h e t u nn el t h at s t art s wit h t h is ro u t er. Th e en d p o in t can b e t h e LA N in t erface (as s u min g t h e LA N is an IPv 4 n et wo rk), o r a s p ecific LA N IPv 4 ad d res s . IPv 4 A d d res s : Th e en d p o in t ad d res s if n o t t h e en t ire LA N. 3.6 Configurable Port - WAN Option Th is ro u t er s up port s o ne o f t h e p hy sical p o rt s t o b e co n fig u red as a s eco n d ary W A N Et h ern et p o rt o r a d ed icated DM Z p o rt . If t h e p o rt is s elected t o b e a s econ d ary W A N in t erface, all co n fig u rat io n p ag es relat in g t o W A N2 are en ab led . 3.7 WAN 3 (3G) Configuration Th is ro u t er s up port s o ne o f t h e p hy sic al p o rt s W AN3 t o b e co n fig ured fo r 3G in t ern et acces s. Setup > Internet Settings > WAN 3 Setup W A N3 co n fig u rat io n fo r t h e 3G USB mo d em is av ailab le o n ly o n W A N 3 in t erface. Th ere are a few key elemen t s o f W A N 3 co n fig u rat io n . Reco n n ect M o d e: Sele ct o n e o f t h e fo llo win g o p t io n s o A lway s On : Th e co n n ect ion is alway s o n . Us ern ame: En t er t h e u s ern ame req u ired t o lo g in t o t h e ISP. 64 Unified Services Router o User Manual On Deman d : Th e co n n ect io n is au t o mat ically en d ed if it is id le fo r a s p ecified n u mb er o f min u t es . En t er t h e n u mb er o f min u t es in t h e M aximu m Id le Time field . Th is feat u re is u s efu l if y o u r ISP ch arg es y o u b as ed o n t h e amo u n t o f t ime t h at y o u are co n n ect ed . Pas s wo rd : En t er t h e p as s wo rd req u ired t o lo g in t o t h e ISP. Dial Nu mb er: En t er t h e n u mb er t o d ial t o t h e ISP. A u t h en t icat io n Pro t o co l: Select o n e o f No n e, PA P o r CHA P A u t h en t icat io n Pro t o co ls t o co n n ect t o t h e ISP. A PN: En t er t h e A PN (A cces s Po in t Name) p ro v id ed b y t h e ISP. Domai n Name S ys tem (DNS ) S ervers Do main n ame s erv ers (DNS) co n v ert In t ern et n ames s u ch as www.d lin k.co m, t o IP ad d res s es t o ro u t e t raffic t o t h e co rrect res o u rces o n t h e In t ern et . If y o u co n fig u re y o u r ro u t er t o g et an IP ad d res s d y n amically fro m t h e ISP, t h en y o u n eed t o s p ecify t h e DNS s erv er s o u rce in t h is s ect io n . DNS Serv er So u rce: Ch o o s e o n e o f t h e fo llo win g o p t io n s : o Get Dy n amically fro m ISP: Ch o o s e t his o pt ion if y o u r ISP d id n o t as s ig n a s t at ic DNS IP ad d res s . o Us e Th es e DNS Serv ers : Ch o o se t his o pt ion if y o u r ISP as s ig n ed a s t at ic DNS IP ad d res s fo r y o u t o u s e. A ls o co mp let e t h e field s t h at are h ig h lig h t ed wh it e in t h is s ect io n . o Primary DNS Serv er: En t er a v alid p rimary DNS Serv er IP A d d res s . o Seco n d ary DNS Serv er: En t er a v alid s eco n d ary DNS Serv er IP A d d res s . Co n fig u rab le Po rt : Th is p age allo ws y ou t o as sig n t h e fu n ct io n alit y in t en d ed fo r t h e Co n fig u rab le Po rt . Ch o o s e fro m t h e fo llo win g o p t io n s : o W A N: If t h is o p t io n is s elect ed , co n fig u re t h e W A N 3. Th e W A N M o d e o p t io n s are n o w av ailab le as t h ere are t wo W A N p o rt s fo r t h e g at eway . o DM Z: If t h is o p t io n is s elect ed , y o u are ab le t o co n fig u re t h e DM Z p o rt o n t h e DM Z Co n fig u rat io n men u . Click Sav e Set t in g s t o s av e y o u r ch an g es . Click Do n 't Sav e Set t in g s t o rev ert t o t h e p rev io u s s et t in g s . 65 Unified Services Router User Manual Figure 39 : WAN3 configurat io n for 3G inte rne t 3G W A N s u p p o rt is av ailab le o n t h e s e d u al W A N p ro d u ct s : DSR-1000 an d DSR1000N. Cellu lar 3G in t ern et acces s is av ailab le o n W A N 3 v ia a 3G USB mo d em fo r DSR1000 an d DSR-1000N. Th e cellu lar ISP t h at p ro v id es t h e 3G d at a p lan will p ro v id e t h e au t h enticatio n req u iremen ts t o establis h a co n n ect io n . Th e d ial Nu mb er an d A PN are s p ecific t o t h e cellu lar carriers . On ce t he co nnectio n t y pe s et t in g s are co n f ig u red an d s av ed, n avig ate t o t h e W AN s t at us p age ( Setup > Internet Settings > WAN 3 Status ) an d En ab le t h e W A N3 lin k t o es t ab lis h t h e 3G co n n ect io n . 3.8 WAN Port Settings Advanced > Advanced Network > WAN Port Setup Th e p h y s ical p o rt s et tin gs fo r each W A N lin k can b e d efin ed h ere. If y o u r ISP account d efin es t h e W A N p o rt sp eed o r is as so ciated wit h a M A C ad d ress, t h is in fo rmat io n is req u ired b y t h e ro u t er t o en s u re a s mo o t h co n n ect io n wit h t h e n et wo rk. 66 Unified Services Router User Manual Th e d efau lt M TU s ize s u p p o rt ed b y all p o rt s is 1500. Th is is t h e larg es t p acket s ize t h at can p ass t h roug h t h e in t erface wit h o ut frag men t at io n. Th is s ize can b e in creas ed , h o wev er larg e p ackets can in t rod uce n etwo rk lag an d b rin g d own t h e in t erface s p eed . No t e t h at a 1500 b y t e s ize p acket is t h e larg est allo w ed b y t h e Et h ernet p ro to co l at the n et wo rk lay er. Th e p o rt s p eed can b e s en sed b y t h e ro ut er wh en A u to is s elected. W it h t h is o p tion the o p t imal p o rt s et t ing s are d et ermin ed b y t h e ro u t er an d n et wo rk. Th e d u p lex (h alf o r fu ll) can b e d efin ed b ased o n t h e p o rt s up port , as well as o n e o f t h ree p o rt s p eed s : 10 M b p s , 100 M b p s an d 1000 M b p s (i.e. 1 Gb p s ). Th e d efau lt s ett in g is 100 M b p s fo r all p o rt s . Th e d efau lt M A C ad d res s is d efin ed d u rin g t h e man u fact u rin g p ro ces s fo r t h e in t erfaces , and can u n iq uely id en tify t h is ro u ter. Yo u can cu st omize each W A N p o rt ’s M A C ad d res s as n eed ed , eit h er b y let t in g t h e W A N p o rt as s u me t h e cu rren t LA N h o s t ’s M A C ad d res s o r b y en t erin g a M A C ad d res s man u ally . Figure 40 : Phys ical WAN port s e ttings 67 Unified Services Router User Manual Chapter 4. Wireless Access Point Setup Th is ro u t er h as an in t egrated 802.11n rad io t h at allo ws y o u t o create an access p oin t for wireles s LA N clien t s . Th e s ecurit y/ en cry ptio n/ au thent icat io n o p t io n s are g ro u p ed in a wireles s Pro file, an d each co n fig u red p ro file will b e av ailab le fo r s elect io n in t h e A P co n fig u ratio n men u . Th e p ro file d efin es v ario u s p aramet ers fo r t h e A P, in clu d in g t h e s ecu rit y b et ween t h e wireles s clien t an d t h e A P, an d can b e s h ared b et ween mu lt ip le A Ps in s t an ces o n t h e s ame d ev ice wh e n n eed ed . Th e co n t en t in t h is s ect io n is ap p licab le t o t h e DSR -500N an d DSR-1000N p ro d u ct s . Up t o fo u r u n iq u e wireles s n et wo rks can b e creat ed b y co n fig u rin g mu lt ip le “v irt u al” A Ps . Each s u ch v irt ual A P ap p ears as an in d ep en d en t A P (u n iq u e SSID) t o s u p p o rt ed clien t s in t h e en v iro nmen t, b u t is act ually ru n nin g o n t h e s ame p h ysical rad io in t egrated wit h t h is ro u t er. Yo u will n eed t h e fo llo win g in fo rmat io n t o co n fig u re y o u r wireles s n et wo rk: Ty p es o f d ev ices exp ect ed t o access t he wireles s n et wo rk an d t h eir s u p p o rt ed W iFi™ mo d es Th e ro u t er’s g eo g rap h ical reg io n Th e s ecu rit y s et t in g s t o u s e fo r s ecu rin g t h e wireles s n et wo rk. Pro files may b e t h o u gh t o f as a g ro u pin g o f A P p aramet ers t h at can t h en b e ap p lied t o n o t ju s t o ne b u t mu lt ip le A P in s t ances (SSIDs ) , t h u s av o id in g d u p licat io n if t h e s ame p aramet ers are t o b e u s ed o n mu lt ip le A P in s t an ces o r SSIDs . 4.1 Wireless Settings Wizard Setup > Wizard > Wireless Settings Th e W ireles s Net wo rk Set u p W izard is av ailab le fo r u s ers n ew t o n et wo rkin g . By g o in g t h ro ug h a few s t raig h t fo rward co n fig u rat io n p ag es y o u can en ab le a W i -Fi™ n et wo rk o n y o u r LA N an d allo w s u p p ort ed 802.11 clien t s t o co n nect t o t h e con fig ured A cces s Po in t . 68 Unified Services Router User Manual Figure 41 : Wire le s s Ne twork Se tup Wizards 4.1.1 W ireless Network Setup W izard Th is wizard p ro v id es a s t ep -by-st ep g uid e t o creat e an d secure a n ew access p oint on t h e ro u t er. Th e n et wo rk n ame (SSID) is t h e A P id en t ifier t h at will b e d et ect ed b y s u p p ort ed clien ts. Th e W izard u ses a TKIP+A ES cip h er fo r W PA / W PA 2 s ecu rit y ; d ep e n d ing o n s up port o n t he clien t sid e, d evices as sociate wit h t h is A P u s in g eit h er W PA o r W PA 2 s ecu rit y wit h t h e s ame p re -s h ared key . Th e wizard h as t h e o p tio n t o au to mat ically g enerate a n et wo rk key fo r t h e A P. Th is key is t h e p re -s h ared key fo r W PA o r W PA 2 t y p e s ecu rit y . Su p p o rt ed clien t s t h at h av e b een g iv en t his PSK can as s o ciat e wit h t h is A P. Th e d efau lt (au t o -as s ig n ed ) PSK is “p as s p h ras e”. Th e las t s t ep in t h e W izard is t o click t h e Co n n ect b u t t o n , wh ich co n firms t h e s et t in g s an d en ab les t h is A P t o b ro ad cas t it s av ailab ilit y in t h e LA N. 4.1.2 Add W ireless Dev ice with W PS W it h W PS en ab led o n y ou r ro u ter, t h e s elected access p o in t allo ws s u p p o rt ed W PS clien t s t o jo in t h e n et wo rk v ery eas ily . W h en t h e A u t o o p t io n fo r co n n ect in g a 69 Unified Services Router User Manual wireles s d ev ice is ch o s e, y o u will b e p res en t ed wit h t wo co mmo n W PS s et u p o p t io n s : Pers onal Identi fi cati on Number (PIN): Th e wireles s d ev ice t h at s u p p o rt s W PS may h av e an alp h an umeric PIN, an d if en t ered in t h is field t h e A P will es t ab lish a lin k t o t h e clien t . Click Co n n ect t o co mp let e s etu p an d co n nect to t h e clien t . Pus h B utton Confi g urati on (PB C): fo r wireles s d ev ices t h at s u p p o rt PBC, p res s an d h o ld d o wn o n t h is b u t t o n an d wit h in 2 min u t es , click t h e PBC co n n ect b u tt on. Th e A P will d et ect t h e wireles s d ev ice an d es t ab lis h a lin k t o t h e clien t . Yo u n eed t o en able at leas t o n e A P wit h W PA / WPA 2 s ecu rity an d als o en able W PS in t h e Advanced > Wireless Settings > WPS p ag e t o u s e t h e W PS wizard . 4.1.3 Manual W ireless Network Setup Th is b u t t on o n t h e W izard p ag e will lin k t o t h e Setup> Wireless Settings> Access Points p ag e. Th e man u al o p t io n s allo w y o u t o creat e n ew A Ps o r mo d ify t h e p aramet ers o f A Ps creat ed b y t h e W izard . 4.2 Wireless Profiles Setup > Wireless Settings > Profiles Th e p ro file allo ws y o u t o as sig n t h e s ecu rit y t y p e, en cry p t io n an d au t h en t icat io n t o u s e wh en co n nectin g t he A P t o a wireles s clien t . Th e d efau lt mo d e is “o p en ”, i.e. n o s ecu rit y . Th is mo d e is in s ecu re as it allo ws an y comp at ib le wireles s clien ts t o co nnect t o an A P co n fig u red wit h t h is s ecu rit y p ro file. To creat e a n ew p ro file, u s e a u n iq u e p ro file n ame t o id en t ify t h e co mb in at io n o f s et t in g s . Co n fig u re a u n iq u e SSID t h at will b e t h e id en t ifier u s ed b y t h e clien t s t o co mmu n icat e t o t h e A P u s in g t h is p ro file. By ch o o s in g t o b ro ad cas t t h e SSID, co mp at ib le wireles s clien t s wit h in ran g e o f t h e A P can d et ect t h is p ro file’s av ailab ilit y . Th e A P o ffers all ad v an ced 802.11 s ecu rit y mo d es, in clu din g W EP, W PA , W PA 2 an d W PA +W PA 2 o p t io ns. Th e securit y o f t h e A ccess p oin t is co n fig ured b y t h e W ireles s Secu rit y Ty p e s ect io n : Op en : s elect t h is o p tio n t o create a p u blic “o p en” n etwo rk t o allo w u n aut henticat ed d ev ices t o acces s t h is wireles s g at eway . W EP (W ired Eq u iv alen t Priv acy ): t h is o p tio n req u ires a s t at ic (p re -s h ared ) key t o b e s h ared b et ween t h e A P an d wireles s clien t . No t e t h at W EP d o es n o t s u p p o rt 802.11n d at a rat es ; is it ap p ro p riat e fo r leg acy 802.11 co n n ect io n s . 70 Unified Services Router User Manual W PA (W i-Fi Pro t ect ed A ccess): Fo r s t ro n g er wireles s s ecu rit y t h an W EP, ch o o s e t h is o p t io n. Th e en cry ptio n fo r W PA will u s e TKIP an d als o CCM P if req u ired . The au t h en t icat io n can b e a p re-s h ared key (PSK), En t erp ris e mo d e wit h RA DIUS s erv er, o r b o t h . No t e t h at W PA d o es n o t s u p p o rt 802.11n d at a rat es ; is it ap p ro p riat e fo r leg acy 802.11 co n n ect io n s . W PA 2: t h is s ecu rit y t y p e u s es CCM P en cry p t io n (an d t h e o p t io n t o ad d TKIP en cry p t io n ) o n eit h er PSK (p re -s h ared key ) o r En t erp ris e (RA DIUS Serv er) au t h en t icat io n . W PA + W PA 2: t h is u s es b o t h en cry p t io n alg o rit h ms , TKIP an d CCM P. W PA clien t s will u s e TKIP an d W PA 2 clien t s will u s e CCM P en cry p t io n alg o rit h ms . “W PA +W PA 2” is a s ecurit y o p tio n t h at allo ws d evices t o co n n ect t o an A P u s in g t h e s t ro ng est s ecurit y t h at it s u p p o rt s . Th is mo d e allo ws leg acy d ev ices t h at o n ly s u p p ort W PA2 key s (s uch as an o ld er wireles s p rin t er) t o co n n ect t o a s ecu re A P wh ere all t h e o t h er wireles s clien t s are u s in g W PA 2. Figure 42 : Lis t of Available Profile s s hows th e options availab le to s e cure the wire le s s link 4.2.1 W EP Security If W EP is t h e ch o sen s ecurit y o pt ion , y ou mu s t s et a u n iq u e s t at ic key t o b e s h ared wit h clien t s t h at wis h t o access t h is s ecu red wireles s n etwo rk. Th is s t at ic key can b e g en erat e d fro m an eas y -to -rememb er p as sphrase and t h e s elected en cryp t io n len g t h . A u t h en t icat io n : s elect b et ween Op en Sy s t em, o r Sh ared Key s ch emes 71 Unified Services Router User Manual En cry p t io n : s ele ct t h e en cry p t io n key s ize -- 64 b it W EP o r 128 b it W EP. Th e larg er s ize key s p ro v id e s tron ger en cry pt ion , t h u s makin g t h e key mo re d ifficu lt t o crack W EP Pas s p hras e: en t er an alp h an u meric p h ras e an d click Gen erat e Key t o g en erat e 4 u n iq u e W EP ke y s wit h len g t h d et ermin ed b y t h e en cry p t io n key s ize. Next c h o o se o n e o f t h e key s t o b e u sed fo r au t henticatio n. Th e s elect ed key mu s t b e s h ared wit h wireles s clien t s t o co n n ect t o t h is d ev ice. 72 Unified Services Router User Manual Figure 43 : Profile configuratio n to s e t ne twork s e curity 4.2.2 W PA or W PA2 with PSK A p re -s h ared key (PSK) is a kn o wn p as sp hrase co nfig u red o n t h e A P an d clien t b o th an d is u s ed t o au t henticate t he wireles s clien t . A n acceptable p assph ras e is b et ween 8 t o 63 ch aract ers in len g t h . 4.2.3 RADIUS Authentication Advanced > RADIUS Settings En t erp ris e M o d e u s es a RA DIUS Serv er fo r W PA an d / o r W PA 2 s ecu rit y . A RA DIUS s erv er mu s t b e co n fig u red an d acces s ib le b y t h e ro u t er t o au t h en t icat e 73 Unified Services Router User Manual wireles s clien t co n n ect io n s t o an A P en ab led wit h a p ro file t h at u s es RA DIUS au t h en t icat io n . Th e A u t h en t icat io n IP A d d res s is req u ired t o id en t ify t h e s erv er. A s eco n dary RA DIUS s erv er p ro vid es red und an cy in t h e event t hat t h e p rimary s erv er can n o t b e reach ed b y t h e ro u t er wh en n eed ed . A u t h en t icat io n Po rt : t h e p o rt fo r t h e RA DIUS s erv er co n n ect io n Secret : en t er t h e s h ared s ecret t h at allo ws t h is ro u t er t o lo g in t o t h e s p ecified RA DIUS s erv er(s). Th is key mu s t mat ch t h e s h ared s ecret o n t h e RA DIUS Se rv er. Th e Timeo u t an d Ret ries field s are u sed t o eit h er mo v e t o a s econ dary s erver if t h e p rimary can n o t b e reached, o r t o g iv e u p t h e RA DIUS au t h en t icat io n at t emp t if co mmu n icat io n wit h t h e s erv er is n o t p o s s ib le. 74 Unified Services Router User Manual Figure 44 : RADIUS s e rve r (Exte rnal Authe nticatio n ) configurat io n 4.3 Creating and Using Access Points Setup > Wireless Settings > Access Points On ce a p ro file (a g ro u p o f s ecu rity s et tin gs) is created, it can b e as sig ned t o an A P o n t h e ro u t er. Th e A P SSID can b e co n fig u red t o b ro adcas t it s av ailab ilit y t o t h e 802.11 en v iro n men t can b e u s ed t o es t ab lis h a W LA N n et wo rk. Th e A P co n fig u rat io n p ag e allo ws y o u t o creat e a n ew A P an d lin k t o it o n e o f t h e av ailab le p ro files . Th is ro u t er s u p p o rt s mu lt ip le A P’s referred t o as v irt u al acces s p o in t s (VA Ps ). Each v irt u al A P t h at h as a u n iq u e SSIDs ap p ears as an in d ep en d en t acces s p o in t t o clien t s . Th is v alu ab le feat u re allo ws t h e ro u t er’s rad io t o b e co n fig u red in a way t o o p t imize s ecu rit y an d t h ro u g h p u t fo r a g ro u p o f clien t s as req u ired b y t h e u s er. To creat e a VA P, click t h e “ad d ” b u t t o n o n t h e Setup > Wireless Settings > Access Points p ag e. A ft er s et t in g t h e A P n ame, t h e p ro file d ro p d o wn men u is u s ed t o s elect o n e o f t h e co n fig u red p ro files . 75 Unified Services Router User Manual Th e A P Name is a u n iq u e id en t ifier u s ed t o man ag e t h e A P fro m t h e GUI, an d is n o t t h e SSID t h at is d et ect ed b y clien t s wh en t h e A P h as b ro ad cas t en ab led . Figure 45 : Virtu al AP configurat io n A v alu ab le p o wer s av in g feat u re is t h e s t art an d s t o p t ime co n t ro l fo r t h is A P. Yo u can co n s erv e o n t h e rad io p o wer b y d is ab lin g t h e A P wh en it is n o t in u s e. Fo r examp le o n ev en in gs an d weekends if y o u kn o w t h ere are n o wireles s clien t s, t h e s tart an d s t o p t ime will en ab le/ d is ab le t h e acces s p o in t au t o mat ically . On ce t h e A P s et t in g s are co n fig u red , y o u mu s t en ab le t h e A P o n t h e rad io o n t h e Setup > Wireless Settings > Access Points p ag e. Th e s t at u s field ch an g es t o “En ab led ” if t h e A P is av ailab le t o accep t wireles s clien ts. If t h e A P is co n fig u red t o b ro ad cas t it s SSID (a p ro file p aramet er), a g reen ch eck mark in d icat in g it is b ro ad cas t in g will b e s h o wn in t h e Lis t o f A v ailab le A cces s p o in t s . 76 Unified Services Router User Manual Figure 46 : Lis t of configure d acce s s points (Virtu al APs ) s hows one e nable d acce s s point on the radio, broadcas t i ng its SSID Th e clien t s co nn ected t o a p art icular A P can b e v iewed b y u s ing t he St atu s Bu t t o n o n t h e Lis t o f A v ailab le A cces s Po in t s . Traffic s t at is t ics are s h o wn fo r t h at in d iv id u al A P, as co mp ared t o t h e s ummary s t ats fo r each A P o n t h e St at ist ics t ab le. Co n n ect ed clien t s are s o rted b y t h e M A C ad d ress an d in d icat e t h e s ecu rit y p aramet ers u s ed b y t h e wireles s lin k, as well as t h e t ime co n n ect ed t o t h is p art icu lar A P. Clickin g t h e Det ails b u t t o n n ext t o t h e co n n ect ed clien t will g iv e t h e d et ailed s en d an d receiv e t raffic s t at is t ics fo r t h e wireles s lin k b et ween t h is A P an d t h e clien t . 4.3.1 Primary benefits of Virtual APs: Op t imize t h ro u g hpu t: if 802.11b , 802.11 g , an d 802.11n clien t s are exp ect ed t o acces s t he LA N v ia t h is ro u t er, creat in g 3 VA Ps will allo w y o u t o man age o r s h ap e t raffic fo r each g ro up o f clien ts. A u n iq u e SSID can b e creat ed fo r t h e n et wo rk o f 802.11b clien t s an d an o t h er SSID can b e as s ig n ed fo r t h e 802.11n clien t s . Each can h av e d ifferen t s ecu rit y p aramet ers – rememb er, t h e SSID an d s ecu rit y o f t h e lin k is d et ermin ed b y t h e p ro file. In t h is way leg acy clien t s can acces s t h e n et wo rk wit h o u t b rin g in g d o wn t h e o v erall t h ro u g h p u t o f mo re cap ab le 802.11n clien t s . Op t imize s ecu rit y : y o u may wis h t o s u p p o rt s elect leg a cy clien t s t h at o n ly o ffer W EP s ecu rit y wh ile u s in g W PA 2 s ecu rit y fo r t h e majo rit y o f clien t s fo r t h e rad io . By creat in g t wo VA Ps co n fig u red wit h d ifferen t SSIDs an d d ifferen t s ecurit y p aramet ers, b ot h t y pes o f clien ts can co n n ect t o t h e LA N. Sin ce W PA 2 is mo re s ecu re, y o u may wan t t o b ro ad cas t t h is SSID an d n o t 77 Unified Services Router User Manual b ro ad cast t h e SSID fo r t h e VA P wit h W EP s in ce it is mean t t o b e u s ed fo r a few leg acy d ev ices in t h is s cen ario . 4.4 Tuning Radio Specific Settings Setup > Wireless Settings > Radio Settings Th e Rad io Set t in g s p ag e let s y o u co n fig u re t h e ch an n els an d p o wer lev els av ailab le fo r t h e A P’s en abled o n t h e DSR. Th e ro u t er h as a d u al b an d 802.11n rad io , mean in g eit h er 2.4 GHz o r 5 GHz freq u en cy o f o p erat io n can b e s elect ed (n o t co n cu rren t ly t h o u g h). Bas ed o n t he s elected o p erat in g freq u en cy , t h e mo d e s elect io n will let y o u d efin e wh et h er leg acy co nnectio ns o r o n ly 802.11n co n n ect io ns (o r b o th ) are accep ted o n co n fig u red A Ps . Figure 47 : Radio card configurat io n options Th e rat ified 802.11n s u p po rt o n t h is rad io req uires s electin g t h e ap prop riate b ro adcast (NA o r NG et c.) mo d e, an d t h en d efinin g t h e ch an n el s p acin g an d co n t ro l s id e b an d fo r 802.11n t raffic. Th e d efau lt s et t in g s are ap p ro p riat e fo r mo s t n et wo rks . Fo r examp le, ch an g in g t h e ch an n el s p acin g t o 40 M Hz can imp ro v e b an d wid t h at t h e exp en s e o f s u p p o rt in g earlier 802.11n clien t s . Th e av ailab le t ran smis sio n ch ann els are g o v ern ed b y reg u latory co nst rain t s b as ed o n t h e reg io n s et t in g o f t h e ro u t er. Th e maximu m t ran s mis s io n p o wer is s imilarly g o v ern ed b y reg u lat o ry limit s ; y o u h av e t h e o p t io n t o d ecreas e fro m t h e d efau lt maximu m t o red u ce t h e s ig n al s t ren g t h o f t raffic o u t o f t h e rad io . 78 Unified Services Router User Manual 4.5 WMM Setup > Wireless Settings > WMM W i-Fi M u lt imed ia (W M M ) p ro v id es b as ic Qu alit y o f s erv ice ( Qo S) feat u res t o IEEE 802.11 n et wo rks . W M M p rio rit izes t raffic accordin g t o fo u r A ccess Cat ego ries (A C) v o ice, v id eo , b es t effo rt , an d b ackg ro u n d . Figure 48 : Wi-Fi M ultime dia Profi l e Name : Th is field allo ws y o u t o s elect t h e a v ailab le p ro files in wireles s s et t in g s . Enabl e WMM: Th is field allo ws y o u t o en ab le W M M t o imp ro v e mu lt imed ia t ran s mis s io n . Defaul t Cl as s Of S ervi ce : Th is field allo ws y o u t o s elect t h e av ailab le A cces s Cat eg o ries (v o ice, v id eo , b es t effo rt , an d b ackg ro u n d ). 79 Unified Services Router User Manual 4.6 Wireless distribution system (WDS) Setup > Wireless Settings > WDS W ireles s d is t rib u t io n s y s t em is a s y s t em en ab lin g t h e wireles s in t erco n n ect io n o f acces s p o in t s in a n et wo rk. Th is feat u re is o n ly g u aran t eed t o wo rk o n ly b et ween d ev ices o f t h e s ame t y p e . Figure 49 : Wire le s s Dis tribut ion Sys te m Th is feat u re is o n ly g uaranteed t o wo rk o n ly b etween d evices o f t h e s ame t y p e (i.e. u s in g t h e s ame ch ip s et / d riv er). Fo r examp le b et ween t wo DSR250N b o xes , o r b et wee n t wo DSR1000N. It s h o u ld als o in t ero p erat e b et ween a DSR 1000N an d DSR 500 N b o xes s in ce t h ey are b as ed o n t h e s ame ch ip s et / d riv er. W h en t h e u s er en ab les t h e W DS lin ks u s e t h e s ame s ecu rit y co n fig u rat io n as t h e d efau lt access p oin t . Th e W DS lin ks d o n o t h ave t ru e W PA /WPA 2 s up port , as in t h ere is n o W PA key h an d sh ake p erfo rmed . In stead t h e Ses sion Key t o b e u s ed wit h a W DS Peer is co mp u t ed u sing a h as h in g fu n ct io n (s imilar t o t h e o n e u s ed fo r co mp u t in g a W PA PM K). Th e in p u t s t o t his fu nctio n are a PSK (co n fig u rab le b y an ad mi n is t rat o r fro m t h e W DS p ag e) an d an in t ern al " mag ic" s t rin g (n o n -co n fig u rab le). In effect t h e W DS lin ks u s e TKIP/ A ES en cry p t io n , d ep en d in g o n t h e en cry p t io n co n fig u red fo r t h e d efault A P. In cas e t h e d efau lt A P u s e s mixed en cry p t io n (TKIP + A ES).Th e W DS lin k will u s e t h e A ES en cry p t io n s ch eme. 80 Unified Services Router User Manual Fo r a W DS lin k t o fu n ct io n p rop erly t h e Rad io s et tin g s o n t h e W DS p eers h av e t o b e t h e s ame. Th e W DS p ag e wo u ld co n sist o f t wo s ect ions. Th e firs t s ectio n p ro v ides g eneral W DS s et t in g s s h ared b y all it s W DS p eers . WDS Enabl e - Th is wo u ld b e a ch eck b o x W DS En cry p t io n - Dis p lay s t he t y pe o f en crypt ion u s ed . It co u ld b e o n e o f OPEN/ 64 b it W EP/ 128 b it W EP/ TKIP/ A ES (Us e t h e t erm b ein g u s ed t h ro u g h o u t t h e b o x i.e. eit h er CCM P o r A ES). WDS Pas s phras e - Th is is req u ired if t h e en cry p t io n s elect ed is TKIP/ CCM P. W e wo u ld exp ect it t o b e wit h in 8~63 A SCII ch aract ers . In t h e W DS co n fig u rat io n p ag e t h is field is man d at o ry an d h as t o b e s ame o n t h e t wo W DS p eers, wh en t h e s ecurity is co n fig u red in TKIP/ A ES mo d e. Th e W DS lin ks u s e t h is as t h e PSK fo r t h e co n n ect io n . DUT' s Mac Addres s - Th is wo u ld b e t h e mac ad d res s o f t h is b o x. Th is s h o u ld b e co n fig u red in t h e p eer's W DS co n fig urat io n p ag e t o b e ab le t o es t ab lis h a W DS lin k wit h t h is b o x. Th is field in t h e W DS Co n fig u rat io n s ectio n d is p lay s t h e d ev ice's mac ad d res s, wh ich n eeds t o b e s pecified o n t h e W DS p eer fo r makin g a co n n ect ion t o t h is d ev ice (Similarly t h e W DS p eers M A C ad d res s will h av e t o b e s p ecified o n t h is d ev ice fo r t h e W DS lin k t o b e es t ab lis h ed b et ween t h e t wo d ev ices ). Th e s eco n d s ect io n will h av e t h e lis t o f co n fig u red W DS p eers wit h b u t t o n s t o A d d / Delet e Peer en t ries . W e s u p p o rt u p t o a maximu m o f 4 W DS lin ks p er b o x. Th e b o t h d evices n eed t o h av e s ame wireles s s et t in g s (wireles s mo d e, en cry p t io n , au t h en ticat io n met h o d , W DS p as s p h ras e, W DS M A C ad d res s an d wireles s SSID) wh en we co n fig u re W DS feat u res in DSR ro u t er . Th e " A d d W DS Peer" s ect io n allo ws t h e u s er t o s p ecify a W DS p eer. Th e " W DS Peers " t ab le d is p lay s t h e lis t o f W DS p eers cu rren t ly co n fig u red o n t h e d ev ice. A maximu m o f 4 W DS p eers can b e s p ecified in an y g iv en mo d e. 4.7 Advanced Wireless Settings Advanced > Wireless Settings > Advanced Wireless So p h is t icat ed wireles s ad min is t rat o rs can mo d ify t h e 802.11 co mmu n icat io n p aramet ers in t h is p ag e. Gen erally , t h e d efau lt s et t in g s are ap p ro p riat e fo r mo s t n et wo rks . Pleas e refer t o t h e GUI in t eg rat ed h elp t ext fo r fu rt h er d et ails o n t he u s e o f each co n fig u rat io n p aramet er. 81 Unified Services Router User Manual Figure 50 : Advance d Wire le s s communic at io n s e ttings 4.8 Wi-Fi Protected Setup (WPS) Advanced > Wireless Settings > WPS W PS is a s imp lified met h o d t o ad d s up port ing wireles s clien ts t o t h e n et work. W PS is o n ly ap p licab le fo r A Ps t hat emp lo y W PA o r W PA 2 s ecu rit y. To u s e W PS, s elect t h e elig ib le VA Ps fro m t h e d ro p d o wn lis t o f A Ps t h at h av e b een co n fig u red wit h t h is s ecu rit y an d en ab le W PS s t at u s fo r t h is A P. Th e W PS Cu rren t St at u s s ect ion o ut lin es t h e securit y, au th en ticatio n , an d en cry p t io n s et t in gs o f t h e s elected A P. Th ese are co nsist en t wit h t h e A P’s p ro file. Th ere are t wo s et u p o p t io n s av ailab le fo r : Pers onal Identi fi cati on Number (PIN): Th e wireles s d ev ice t h at s u p p o rt s W PS may h av e an alp h an u meric PIN, if s o ad d t h e PIN in t h is field . Th e ro u t er will co n n ect wit h in 60 s eco n ds o f clickin g t h e “Co n fig ure v ia PIN” b u t t o n immed iat ely b elo w t h e PIN field . Th ere is n o LED in d icat io n t h at a clien t h as co n n ect ed . Pus h B utton Confi g urati on (PB C): fo r wireles s d ev ices t h at s u p p o rt PBC, p res s an d h o ld d o wn o n t his b ut to n an d wit h in 2 min u t es click t h e PBC co n n ect b u t t o n . Th e A P will d et ect t h e wireles s d ev ice an d es t ab lis h a lin k t o t h e clien t . 82 Unified Services Router User Manual M o re t h an o n e A P can u s e W PS, b u t o n ly o n e A P can b e u s ed t o es t ab lis h W PS lin ks t o clien t at an y g iv en t ime. Figure 51 : WPS configurat io n for an AP with WPA/WP A2 profile 83 Chapter 5. Securing the Private Network Yo u can s ecu re y ou r n etwo rk b y creat in g an d ap p ly in g ru les t h at y o u r ro u t er u s es t o s elect iv ely b lo ck an d allo w in b o u n d an d o u t b o u n d In t ern et t raffic. Yo u t h en s p ecify h o w an d t o wh o m t h e ru les ap p ly . To d o s o , y o u mu s t d efin e t h e fo llo win g : Serv ices o r t raffic t y p es (examp le s : web b ro ws in g , Vo IP, o t h er s t an d ard s erv ices an d als o cu s t o m s erv ices t h at y o u d efin e) Direct io n fo r t h e t raffic b y s p ecifyin g t h e s ource an d d es t in at io n o f t raffic ; t h is is d o n e b y s p ecify in g t h e “Fro m Zo n e” (LA N/ W A N/ DM Z) an d “To Zo n e” (LA N/ W A N/ DM Z) Sch ed u les as t o wh en t h e ro u t er s h o u ld ap p ly ru les A n y Key wo rd s (in a d o main n ame o r o n a URL o f a web p ag e) t h at t h e ro u t er s h o u ld allo w o r b lo ck Ru les fo r allo win g o r b lo ckin g in b o un d an d o u tb oun d In t ern et t raffic fo r s p ecified s erv ices o n s p ecified s ch ed u les M A C ad d res s es o f d ev ices t h at s h o u ld n o t acces s t h e in t ern et Po rt t rig g ers t h at s ign al t h e ro u ter t o allo w o r b lo ck acces s t o sp ecified s erv ices as d efin ed b y p o rt n u mb er Rep o rt s an d alert s t h at y o u wan t t h e ro u t er t o s en d t o y o u Yo u can , fo r examp le, es t ab lis h res t rict ed -acces s p o licies b as ed o n t ime -o f-d ay , web ad d res ses, an d web ad d ress key wo rd s . Yo u can b lo ck In t ern et acces s b y ap p licat io n s an d s erv ices o n t h e LA N, s u ch as ch at ro o ms o r g ames . Yo u can b lo ck ju s t cert ain g ro u p s o f PCs o n y o u r n et wo rk fro m b ein g acces s ed b y t h e W A N o r p u b lic DM Z n et wo rk. 5.1 Firewall Rules Advanced > Firewall Settings > Firewall Rules In b o u n d (W A N t o LA N/ DM Z) ru les rest rict acces s t o t raffic en t erin g y o u r n et wo rk, s elect iv ely allo win g o n ly s pecific o u t side u sers t o access s p ecific lo cal res o u rces . By d efau lt all acces s fro m t h e in s ecure W AN s id e are b lo cked fro m acces sin g t h e s ecu re LA N, excep t in res p o nse t o req uest s fro m t h e LA N o r DM Z. To allo w o u t s id e d ev ices t o acces s s erv ices o n t h e s ecu re LA N, y o u mu s t creat e a n in b o u n d firewall ru le fo r each s erv ice. If y o u wan t t o allo w in co min g t raffic, y o u mu s t make t h e ro u t er’s W A N p o rt IP ad d res s kn o wn t o t h e p u blic. Th is is called “exp o sin g y o ur h o st.” Ho w y o u make y o u r ad d res s kn o wn d ep en d s o n h o w t h e W A N p o rt s are co n fig u red ; fo r t h is ro u t er y o u Unified Services Router User Manual may u s e t h e IP ad d res s if a s t at ic ad d res s is as s ig n ed t o t h e W A N p o rt , o r if y o u r W A N ad d res s is d y n amic a DDNS (Dy n a mic DNS) n ame can b e u s ed . Ou t b o u nd (LA N/ DM Z t o W A N) ru les res trict access t o t raffic leav in g y o u r n et wo rk, s elect iv ely allo win g o n ly s pecific lo cal u s ers t o access s p ecific o u tsid e res ou rces . The d efau lt o u t b o u n d ru le is t o allo w acces s fro m t h e s ecu re zo n e (LA N) t o eit h er t h e p u b lic DM Z o r in s ecu re W A N. On o t h er h an d t h e d efau lt o u t b o u n d ru le is t o d en y acces s fro m DM Z t o in s ecu re W A N. Yo u can ch an g e t h is d efau lt b eh av io u r in t h e Firewall Settings > Default Outbound Policy p ag e. W h en t h e d efau lt o u t b o u n d p o licy is allo w alway s , y o u can t o b lo ck h o s t s o n t h e LA N fro m acces s in g in t ern et s erv ices b y creat in g an o u t b o u n d firewall ru le fo r each s erv ice. Figure 52 : Lis t of Available Fire wal l Rule s 5.2 Defining Rule Schedules Tools > Sche dules Firewall ru les can b e en abled o r d is ab led au t o mat ically if t h ey are as s o ciat ed wit h a co n fig u red s chedule. Th e s ched u le co n fig u rat io n p ag e allo ws y o u t o d efin e d ay s o f t h e week an d t h e t ime o f d ay fo r a n ew s ch ed u le, an d t h en t h is s ch ed u le can b e s elect ed in t h e firewall ru le co n fig u rat io n p ag e. A ll s ch ed ules will fo llo w t h e t ime in t h e ro u t ers con fig ured t ime zo n e. Refer t o t h e s ect io n o n ch o o s in g y o u r Time Zo n e an d co n fig u rin g NTP s erv ers fo r mo re in fo rmat io n . 86 Unified Services Router User Manual Figure 53 : Lis t of Available Sche dule s to bind to a fire wal l rule 5.3 Configuring Firewall Rules Advanced > Firewall Settings > Firewall Rules A ll co n fig u red firewall ru les o n t h e ro u t er are d is p lay ed in t h e Firewall Ru les lis t . Th is lis t als o in d icat es wh et h er t h e ru le is en ab led (act iv e) o r n o t , an d g iv es a s u mmary o f t h e Fro m/ To zo n e as well as t h e s erv ices o r u s ers t h at t h e ru le affect s . To creat e a n ew firewall ru les , fo llo w t h e s t ep s b elo w: 1. View the existing rules in the List of Available Firewall Rules table. 2. To edit or add an outbound or inbound services rule, do the following: To ed it a ru le, click t h e ch eckb o x n ext t o t h e ru le an d click Ed it t o reach t h at ru le’s co n fig u rat io n p ag e. To ad d a n ew ru le , click A d d t o b e t aken t o a n ew ru le’s co n fig u rat io n p ag e. On ce creat ed , t h e n ew ru le is au t o mat ically ad d ed t o t h e o rig in al t ab le. 3. Chose the From Zone to be the source of originating traffic: either the secure LAN, public DMZ, or insecure WAN. For an inbound rule WAN should be selected as the From Zone. 4. Choose the To Zone to be the destination of traffic covered by this rule. If the From Zone is the WAN, the to Zone can be the public DMZ or secure LAN. Similarly if the From Zone is the LAN, then the To Zone can be the public DMZ or insecure WAN. 5. Parameters that define the firewall rule include the following: 87 Unified Services Router User Manual Serv ice : A NY mean s all t raffic is affect ed b y t h is ru le. Fo r a s p ecific s erv ice t h e d ro p d o wn lis t h as co mmo n s erv ices , o r y o u can s elect a cu s t o m d efin ed s erv ice. A ct io n & Sch ed u le: Select o n e o f t h e 4 act io n s t h at t h is ru le d efin es : BLOCK alway s , A LLOW alway s , BLOCK b y s ch ed u le o t h erwis e A LLOW , o r A LLOW b y s ch ed u le o t h erwis e BLOCK . A s ch ed u le mu s t b e p re co n fig ured in o rd er fo r it t o b e av ailab le in t h e d ro p d o wn lis t t o as s ig n t o t h is ru le . So u rce & Des t in at io n u sers: Fo r each relev an t cat ego ry, s elect t he u sers t o wh ich t h e ru le ap p lies : A n y (all u s ers ) Sin g le A d d res s (en t er an IP ad d res s ) A d d res s Ran g e (en t er t h e ap p ro p riat e IP ad d res s ran g e) Lo g : t raffic t h at is filt ered b y t h is ru le can b e lo g g ed ; t h is req u ires co n fig u rin g t h e ro u t er’s lo g g in g feat u re s ep arat ely . Qo S Prio rit y : Ou t b o u n d ru les (wh ere To Zo n e = in s ecu re W A N o n ly ) can h av e t h e t raffic marked wit h a Qo S p rio rit y t ag . Select a p rio rit y lev el: No rmal-Serv ice: To S=0 (lo wes t Qo S) M in imize -Co s t : To S=1 M aximize -Reliab ilit y : To S=2 M aximize -Th ro u g h p u t : To S=4 M in imize -Delay : To S=8 (h ig h es t Qo S) 6. Inbound rules can use Destination NAT (DNAT) for managing traffic from the WAN. Destination NAT is available when the To Zone = DMZ or secure LAN. W it h an in b o u n d allo w ru le y o u can en t er t h e in t ern al s erv er ad d res s t h at is h o s t in g t h e s elect ed s erv ice. Yo u can en ab le p o rt fo rward in g fo r an in co min g s erv ice s p ecific ru le (Fro m Zo n e = W A N) b y s elect in g t h e ap p ro p riat e ch eckb o x. Th is will allo w t h e s elect ed s erv ice t raffic fro m t h e in t ern et t o reach t h e ap p ro p riat e LA N p o rt v ia a p o rt fo rward in g ru le. Tran s lat e Po rt Nu mb er: W it h p o rt fo rward in g , t h e in co min g t raffic t o b e fo rward ed t o t h e p o rt n u mb er en t ered h ere. 88 Unified Services Router User Manual Ext ern a l IP ad d ress: Th e ru le can b e b o un d t o a s p ecific W A N in t erface b y s elect in g eit h er t h e p rimary W A N o r co n fig urab le p o rt W A N as t h e s o u rce IP ad d res s fo r in co min g t raffic. Th is ro u t er s up port s mu lt i-NA T an d s o t h e Ext ern al IP ad d res s d o es n o t n ecessarily h av e t o b e t h e W A N ad d res s . On a s in g le W A N in t erface, mu lt ip le p u b lic IP ad d res ses are s u ppo rted. If y o u r ISP as s ig ns y o u mo re t h an o n e p u b lic IP ad d res s , o n e o f t h es e can b e u s ed as y o u r p rimary IP ad d res s o n t h e W A N p o rt , an d t h e o t h ers can b e assig ned t o s erv ers o n t h e LA N o r DM Z. In t h is way t h e LA N/ DM Z s erv er can b e acces s ed fro m t h e in t ern et b y it s alias ed p u b lic IP ad d res s . 7. Outbound rules can use Source NAT (SNAT) in order to map (bind) all LAN/DMZ traffic matching the rule parameters to a specific WAN interface or external IP address (usually provided by your ISP). On ce t h e n ew o r mo d ified ru le p aramet ers are s av ed , it ap p ears in t h e mas t er lis t o f firewall ru les . To en ab le o r d is ab le a ru le, click t h e ch eckb o x n ext t o t h e ru le in t h e lis t o f firewall ru les an d ch o o s e En ab le o r Dis ab le. Th e ro u t er ap p lies firewall ru les in t h e o rd er lis t ed . A s a g en eral ru le, y o u s h o u ld mo v e t h e s t rict est ru les (t h ose wit h t h e mo s t s pecif ic s erv ices o r ad d res s es ) t o t h e t o p o f t h e lis t . To reo rd er ru les , click t h e ch eckb o x n ext t o a ru le an d click u p o r d o wn . 89 Unified Services Router User Manual Figure 54 : Example whe re an outbound SNAT rule is us e d to map an e xte rnal IP addre s s (209.156.200.225) to a private DM Z IP addre s s (10.30.30.30) 90 Unified Services Router User Manual Figure 55 : The fire wal l rule configuratio n page allows you to de fine the To/From zone , s e rvice , action, s che dule s , and s pe cify s ource /de s tination IP addre s s e s as ne e de d. 91 Unified Services Router User Manual 5.4 Configuring IPv6 Firewall Rules Advanced > Firewall Settings > IPv6 Firewall Rules A ll co n fig u red IPv 6 firewall ru les o n t h e ro u t er are d is p lay ed in t h e Firewall Ru les lis t . Th is lis t als o in d icat es wh et h er t h e ru le is en ab led (act iv e) o r n o t , an d g iv es a s u mmary o f t h e Fro m/ To zo n e as well as t h e s erv ices o r u s ers t h at t h e ru le affect s . Figure 56 : The IPv6 fire wall rule configuratio n page allows you to de fine the To/From zone , s e rvice , action, s che dule s , and s pe cify s ource /de s tination IP addre s s e s as ne e de d. 92 Unified Services Router User Manual Figure 57 : Lis t of Available IPv6 Fire wall Rule s 5.4.1 Firewall Rule Configuration Examples Exampl e 1 : A llo w in b o u n d HTTP t raffic t o t h e DM Z S i tuati on: Yo u h o s t a p u b lic web s erv er o n y o u r lo cal DM Z n et wo rk . Yo u wan t t o allo w in b o u n d HTTP req u ests fro m an y o u t sid e IP ad d ress t o t h e IP ad d res s o f y o u r web s erv er at an y t ime o f d ay . S ol uti on: Creat e an in b o u n d ru le as fo llo ws . Par am eter V alu e From Zone Insecure (WAN1/WAN2/WAN3) To Zone Public (DMZ) Service HTTP Action ALLOW alw ays Send to Local Server (DNAT IP) 192.168.5.2 (w eb server IP address) Destination Users Any Log Never Exampl e 2 : A llo w v id eo co n feren cin g fro m ran g e o f o u t s id e IP ad d res s es S i tuati on: Yo u wan t t o allo w in co min g v id eo co n feren cin g t o b e in it iat ed fro m a res t rict ed ran g e o f o u t s id e IP ad d res s es (132.177.88.2 - 132.177.88.254), fro m a b ran ch o ffice. 93 Unified Services Router User Manual S ol uti on: Creat e an in b o u n d ru le as fo llo ws . In t h e examp le, CUSeeM e (t h e v id eo co n feren ce s erv ice u s ed ) co n n ect io n s are allo wed o n ly fro m a s p ecified ran g e o f ext ern al IP ad d res s es . Par am eter V alu e From Zone Insecure (WAN1/WAN2/WAN3) To Zone Secure (LAN) Service CU-SEEME:UDP Action ALLOW alw ays Send to Local Server (DNAT IP) 192.168.10.11 Destination Users Address Range From 132.177.88.2 To 134.177.88.254 Enable Port Forw arding Yes (enabled) Exampl e 3 : M u lt i-NA T co n fig u rat io n S i tuati on: Yo u wan t t o co n fig u re mu lt i-NA T t o s u p p o rt mu lt ip le p u b lic IP ad d res s es o n o n e W A N p o rt in t erface. S ol uti on: Creat e an in b o u n d ru le t h at co n fig u res t h e firewall t o h o s t an ad d it io n al p u b lic IP ad d res s . A s s o ciat e t h is ad d res s wit h a web s erv er o n t h e DM Z. If y o u arran g e wit h y o u r ISP t o h av e mo re t h an o ne p u blic IP ad d ress fo r y o u r u se, y ou can u s e t h e ad dit io nal p u blic IP ad d resses t o map t o s erv ers o n y o u r LA N. On e o f t h es e p u b lic IP ad d resses is u sed as t h e p rimary IP ad d res s o f t h e ro u t er. Th is ad d res s is u s ed t o p ro vid e In t ernet access t o y o ur LA N PCs t h ro u g h NA T. Th e o t her ad dress es are av ailab le t o map t o y o u r DM Z s erv ers . Th e fo llo win g ad d res s in g s ch eme is u s ed t o illu s t rat e t h is p ro ced u re: W A N IP ad d res s : 10.1.0.118 LA N IP ad d res s : 192.168.10.1; s u b n et 255.255.255.0 W eb s erv er h o s t in t h e DM Z, IP ad d res s : 192.168.12.222 A cces s t o W eb s erv er: (s imu lat ed ) p u b lic IP ad d res s 10.1.0.52 Par am eter V alu e From Zone Insecure (WAN1/WAN2/WAN3) To Zone Public (DMZ) Service HTTP Action ALLOW alw ays Send to Local Server (DNAT IP) 192.168.12.222 ( w eb server local IP address) Destination Users Single Address 94 Unified Services Router E From User Manual 10.1.0.52 x WAN a Users m Log p l e 4 : Blo c Any Never Exampl e 4 : Blo ck t raffic b y s ch edu le if g en erated fro m s p ecific ran g e o f mach in es Us e Cas e: Blo ck all HTTP t raffic o n t h e weeken d s if t h e req u es t o rig in at es fro m a s p ecific g ro u p o f mach in es in t h e LA N h av in g a kn o wn ran g e o f IP ad d res s es , an d an y o n e co min g in t h ro u g h t h e Net wo rk fro m t h e W A N (i.e. all remo t e u s ers ). Confi g urati on: 1. Setup a schedule: To s et u p a s chedule t h at affects t raffic o n weeken ds o n ly, n av igate t o Secu rit y : Sch ed u le, an d n ame t h e s ch ed u le “W eeken d ” Defin e “weeken d ” t o mean 12 am Sat u rd ay mo rn in g t o 12 am M o n d ay mo rn in g – all d ay Sat u rd ay & Su n d ay In t h e Sch ed u led d ays b o x, ch eck t h at y o u wan t t h e s ch ed u le t o b e act iv e fo r “s p ecific d ay s ”. Select “Sat u rd ay ” an d “Su n d ay ” In t h e s ch ed u led t ime o f d ay , s elect “all d ay ” – t h is will ap p ly t h e s ch ed u le b et ween 12 am t o 11:59 p m o f t h e s elect ed d ay . Click ap p ly – n o w s ch edu le “Weeken d ” is o lat es all d ay Sat u rd ay an d Su n d ay fro m t h e res t o f t h e week. 95 Unified Services Router User Manual Figure 58 : Sche dule configurat io n for the above e xample . 2. Since we are trying to block HTTP requests, it is a service with To Zone: Insecure (WAN1/WAN2/WAN3) that is to be blocked according to schedule “Weekend”. 96 Unified Services Router User Manual 3. Select the Action to “Block by Schedule, otherwise allow”. This will take a predefined schedule and make sure the rule is a blocking rule during the defined dates/times. All other times outside the schedule will not be affected by this firewall blocking rule 4. As we defined our schedule in schedule “Weekend”, this is available in the dropdown menu 5. We want to block the IP range assigned to the marketing group. Let’s say they have IP 192.168.10.20 to 192.168.10.30. On the Source Users dropdown, select Address Range and add this IP range as the from and To IP addresses. 6. We want to block all HTTP traffic to any services going to the insecure zone. The Destination Users dropdown should be “any”. 7. We don’t need to change default QoS priority or Logging (unless desired) – clicking apply will add this firewall rule to the list of firewall rules . 8. The last step is to enable this firewall rule. Select the rule, and click “enable” below the list to make sure the firewall rule is active 5.5 Security on Custom Services Advanced > Firewall Settings > Custom Services Cu s t o m s erv ices can b e d efin ed t o ad d t o t he lis t o f s ervices av ailab le d u rin g firewall ru le co n fig u rat io n . W h ile co mmo n s erv ices h av e kn o wn TCP/ UDP/ ICM P p o rt s fo r t raffic, man y cu s t o m o r u n co mmo n ap p licat io n s exis t in t h e LA N o r W A N. In t h e cu s t om s erv ice co nfig uratio n men u y o u can d efin e a ran g e o f p o rt s an d id en t ify t h e t raffic t y p e (TCP/ UDP/ ICM P) fo r t h is s erv ice. On ce d efin ed , t h e n ew s erv ice will ap p ear in t h e s erv ices lis t o f t h e firewall ru les co n fig u rat io n men u . 97 Unified Services Router User Manual Figure 59 : Lis t of us e r de fine d s e rvice s . Figure 60 : Cus tom Se rvice s configuratio n Creat ed s erv ices are av ailab le as o p t io n s fo r firewall ru le co n fig u rat io n . Name: Name o f t h e s erv ice fo r id en t ificat io n an d man ag emen t p u rp o s es . Ty p e: Th e lay er 3 Pro t o co l t h at t h e s erv ice u s es . (TCP, UDP, BOTH, ICM P o r ICM Pv 6) Po rt Ty p e: Th is field s allo ws t o s elect Po rt Ran g e o r M u lt ip le Po rt s ICM P Ty p e: Th is field is en ab led wh en t h e lay er 3 p ro t o co l (in t h e Ty p e field ) is s elect ed as ICM P o r ICM Pv 6. Th e ICM P t y p e is a n u meric v alu e t h at can ran g e b et ween 0 an d 40, wh ile fo r ICM Pv 6 t h e t y p e ran g es fro m 1 t o 255. Fo r a lis t o f 98 Unified Services Router ICM P t y p es , v is it p aramet ers . User Manual the fo llo win g URL:h t t p :/ / www.ian a.o rg / as s ig n men t s / icmp - St art Po rt : Th e firs t TCP, UDP o r BOTH p o rt o f a ran g e t h at t h e s erv ice u s es . If t h e s erv ice u s es o n ly o n e p o rt , t h en t h e St art Po rt will b e t h e s ame as t h e Fin is h Po rt . Fin is h Po rt : Th e las t p o rt in t h e ran ge t hat t h e s erv ice u s es . If t h e s erv ice u s es o n ly o n e p o rt , t h en t h e Fin is h Po rt will b e t h e s ame as t h e St art Po rt . Po rt : Th e p o rt t h at t h e s erv ice u s es . 5.6 ALG support Advanced > Firewall Settings > ALGs A p p licat io n Lev el Gat eway s (A LGs ) are s ecu rit y co mp o nent t hat en h ance t h e firewall an d NA T s u p p ort o f t h is ro u ter t o s eamles sly s up p o rt ap p licat io n lay er p ro t o co ls . In s o me cas es en ablin g t h e A LG will allo w t h e firewall t o u s e d y n amic ep h emeral TCP/ UDP p o rt s t o co mmu n icat e wit h t h e kn o wn p o rts a p art icular clien t ap p licat io n (s u ch as H.323 o r RTSP) req u ires , wit h o u t wh ich t h e ad min wo u ld h av e t o o p en larg e n u mb er o f p o rt s t o accomp lis h t h e s ame s u p p o rt . Becau s e t h e A LG u n d ers t an d s t h e p ro t o co l u s ed b y t h e s p ecific ap p licat io n t h at it s u p p o rt s , it is a v ery s ecu re an d efficien t way o f in t ro d u cin g s u p p o rt fo r clien t ap p licat io n s t h ro u g h t h e ro u t er’s firewall. 99 Unified Services Router User Manual Figure 61 : Available ALG s upport on the route r. 5.7 VPN Passthrough for Firewall Advanced > Firewall Settings > VPN Passthrough Th is ro u t er’s firewall s et t in g s can b e co n fig u red t o allo w en cry p t ed VPN t raffic fo r IPs ec , PPTP, an d L2TP VPN t u n n el co n n ect io n s b et ween t h e LA N an d in t ern et . A s p ecific firewall ru le o r s erv ice is n o t ap p ro p riat e t o in t ro d u ce t h is p as s t h ro u g h s u p p ort ; in s tead t he ap p ro p riat e ch eck b o xes in t h e VPN Pas s t h ro u g h p ag e mu s t b e en ab led . 100 Unified Services Router User Manual Figure 62 : Pas s through options for VPN tunne ls 5.8 Application Rules Advanced > Application Rules > Application Rules A p p licat io n ru les are als o referred t o as p o rt t rig g erin g . Th is feat u re allo ws d ev ices o n t h e LA N o r DM Z t o req u es t o n e o r mo re p o rt s t o b e fo rward ed t o t h em. Po rt t rig g erin g wait s fo r an o u t b o u n d req u es t f ro m t h e LA N/ DM Z o n o n e o f t h e d efin ed o u t g o ing p ort s, an d t h en o pens an in co min g p ort fo r t h at s pecified t y pe o f t raffic. This can b e t h o u g h t o f as a fo rm o f d y n amic p o rt fo rward in g wh ile an ap p licat io n is t ran s mit t in g d at a o v er t h e o p en ed o u t g o in g o r in co min g p o rt (s ). Po rt t rig g erin g ap plicat ion ru les are mo re flexib le t h an s t at ic p o rt fo rward in g t h at is an av ailab le o p t io n wh en co nfig urin g firewall ru les . Th is is b ecaus e a p o rt t rig g erin g ru le d o es n o t h ave t o referen ce a s p ecific LA N IP o r IP ran g e. A s well p o rt s are n o t left o p en wh en n o t in u s e, t h ereby p ro vid in g a lev el o f s ecu rit y t h at p o rt fo rward in g d o es n o t o ffer. Po rt t rig g erin g is n o t ap p ro p riat e fo r s erv ers o n t h e LA N, s in ce t h ere is a d ep en d en cy o n t h e LA N d ev ice makin g an o u t g o in g co n n ect io n b ef o re in co min g p o rt s are o p en ed . So me ap p licat io n s req uire t h at wh en ext ern al d ev ices co n n ect t o t h em, t h ey receiv e d at a o n a s p ecific p o rt o r ran g e o f p o rts in o rd er t o fu n ct ion p rop erly . Th e ro u ter mu s t s en d all in co min g d at a fo r t h at ap p licat io n o n ly o n t h e req u ired p o rt o r ran g e o f p o rts. Th e ro u t er h as a lis t o f co mmo n ap p licat io n s and g ames wit h co rresp ond ing o ut bou n d an d in b o u nd p ort s t o o p en. Yo u can als o sp ecify a p o rt t rig gerin g ru le b y d efin ing t h e t y p e o f t raffic (TCP o r UDP) an d t h e ran g e o f in co min g an d o u t g o in g p o rt s t o o p en wh en en ab led . 101 Unified Services Router User Manual Figure 63 : Lis t of Available Applicat io n Rule s s howing 4 unique rule s Th e ap p licat io n ru le s t atus p age will lis t an y act iv e ru les , i.e. in co min g p o rt s t h at are b ein g t rig g ered b a s ed o n o u t b o u n d req u es t s fro m a d efin ed o u t g o in g p o rt . 5.9 Web Content Filtering Th e g at eway o ffers s ome s t andard web filt erin g o p t io n s t o allo w t h e ad min t o eas ily creat e in t ern et access p o licies b etween t h e s ecu re LA N an d in s ecure W AN. In s tead o f creat in g p o licies b ased o n t he t y pe o f t raffic (as is t h e case wh en u s ing firewall ru les), web b as ed co n t en t it s elf can b e u s ed t o d et ermin e if t raffic is allo wed o r d ro p p ed . 5.9.1 Content Filtering Advanced > Website Filter > Content Filtering Co n t en t filt erin g mu s t b e en abled t o co n figu re an d u se t h e s ubsequent featu res (lis t o f Tru s t ed Do main s , filt erin g o n Blo cked Key wo rds , et c.). Pro xy s erv ers , wh ich can b e u s ed t o circu mv en t cert ain firewall ru les an d t h u s a p o t en t ial s ecu rit y g ap , can b e b lo cked fo r all LA N d ev ice s . Jav a ap p let s can b e p rev en t ed fro m b ein g d o wn lo ad ed fro m in t ern et s it es , an d s imilarly t h e g at eway can p rev en t A ct iv eX co n t ro ls fro m b ein g d o wn lo aded v ia In t ernet Exp lo rer. Fo r ad d ed s ecu rit y co o kies , wh ich t y p ically co n t ain s es s io n in fo rmat io n , can b e b lo cked as well fo r all d ev ices o n t h e p riv at e n et wo rk. 102 Unified Services Router User Manual Figure 64 : Conte nt Filte ring us e d to block acce s s to proxy s e rve rs and pre ve nt Active X controls from be ing downloade d 5.9.2 Approv ed URLs Advanced > Website Filter > Approved URLs Th e A p p ro ved URLs is an accep t ance lis t fo r all URL d o main n ames . Do main s ad d ed t o t h is lis t are allo wed in an y fo rm. Fo r examp le, if t h e d o main “y ah o o ” is ad d ed t o t h is lis t t h en all o f t h e fo llo win g URL’s are p ermit t ed acces s fro m t h e LA N: www.yahoo.com, yahoo.co.uk, et c. Imp o rt / exp o rt fro m a t ext o r CSV file fo r A p p ro v ed URLs is als o s u p p o rt ed 103 Unified Services Router User Manual Figure 65 : Two trus te d domains adde d to the Approve d URLs Lis t 5.9.3 Blocked Keywords Advanced > Website Filter > Blocked Keywords Key wo rd b lo ckin g allo ws y o u t o b lo ck all web s it e URL’s o r s it e co n t ent t h at con tains t h e key wo rd s in t h e co n fig u red lis t . Th is is lo wer p rio rit y t h an t h e A p p ro v ed URL Lis t ; i.e. if t h e b lo cked key wo rd is p res en t in a s it e allo wed b y a Tru s t ed Do main in t h e A p p ro ved URL Lis t , t h en access t o t hat s it e will b e allo wed . Imp o rt / exp o rt fro m a t ext o r CSV file fo r key wo rd b lo ckin g is als o s u p p o rt ed . 104 Unified Services Router User Manual Figure 66 : One k e yword adde d to the block lis t 5.9.4 Export W eb Filter Advanced > Website Filte r > Export Exp o rt A p p ro v ed URLs : Feat u re en ables t h e u ser t o exp o rt t h e URLs t o b e allo wed t o a cs v file wh ich can t h en b e d o wnlo ad ed t o t h e lo cal h o s t . Th e u s er h as t o click t h e exp o rt b u t t o n t o g et t h e cs v file. Exp o rt Blo cked Key wo rd s : Th is feat ure en ab les t he u ser t o exp o rt t he key wo rds t o b e b lo cked t o a cs v file wh ich can t h en b e d o wn loaded t o t h e lo cal h o st. Th e u s er h as t o click t h e exp o rt b u t t o n t o g et t h e cs v file . 105 Unified Services Router User Manual Figure 67 : Export Approve d URL lis t 5.10 IP/MAC Binding Advanced > IP/MAC Binding A n o t h er av ailab le securit y meas u re is t o o n ly allo w o u t bou nd t raffic (fro m t h e LA N to W A N) wh en t h e LA N n o d e h as an IP ad d ress mat ch in g t h e M A C ad dress b o u n d t o it . Th is is IP/ M A C Bin d in g , an d b y en fo rcin g t h e g ateway t o v alid ate t h e s ou rce t raffic’s IP ad d res s wit h t h e u n iq u e M A C A d d res s o f t h e co n fig u red LA N n o d e , t h e ad min is t rat o r can en sure t raffic fro m t h at IP ad d res s is n ot s poo fed . In t h e ev en t o f a v io lat io n (i.e. t h e t raffic’s s ou rce IP ad d ress d oesn’t mat ch u p wit h t h e exp ect ed MAC ad d res s h avin g t h e s ame IP ad d ress) t h e p ackets will b e d ro p p ed an d can b e lo g ged for d iag n o s is . 106 Unified Services Router User Manual Figure 68 : The followi ng e xample binds a LAN hos t’s M AC Addre s s to an IP addre s s s e rve d by DSR. If the re is an IP/M AC B inding violation, the violating pack e t will be droppe d and logs will be capture d 5.11 Intrusion Prevention (IPS) Advanced > Advanced Network > IPS Th e g at eway ’s In t rusio n Prev entio n Sy s tem (IPS) p rev en t s malicio u s at tacks fro m t h e in t ern et fro m acces s in g t h e p riv at e n et wo rk. St at ic at t ack s ig n at u res lo ad ed t o t h e DSR allo w co mmo n at t acks t o b e d etect ed an d p revent ed . Th e ch ecks can b e en ab led b et ween t h e W A N an d DM Z o r LA N, an d a ru n n in g co u n t er w ill allo w t h e ad min is t rat o r t o see h ow man y malicio u s in t ru sio n at temp t s fro m t h e W A N h av e b een d et ect ed an d p rev en t ed . DSR-150/ 150N d o es n o t s u p p o rt In t ru s io n Prev en t io n S y s t em. 107 Unified Services Router User Manual Figure 69 : Intrus ion Pre ve ntion fe ature s on the route r 5.12 Protecting from Internet Attacks Advanced > Advanced Network > Attack Checks A t t acks can b e malicio u s s ecu rit y b reach es o r u n in t en t io n al n et wo rk is s u es t h at ren d er t h e ro u t er u n u s ab le. A t t ack ch ecks allo w y o u t o man ag e W A N s ecu rit y t h reat s s uch a s co ntin ual p in g req uests an d d is co very v ia A RP s can s . TCP an d UDP flo o d at t ack ch ecks can b e en ab led t o man ag e ext reme u s ag e o f W A N res o u rces . A d d it io n ally cert ain Den ial-o f-Serv ice (Do S) at t acks can b e b lo cked. Th ese at t acks , if u n in h ib it ed , can u s e u p p ro ces s in g p o wer an d b an d wid t h an d p rev en t reg u lar n et wo rk s erv ices fro m ru n n in g n o rmally . ICM P p acket flo o d in g , SYN t raffic flo o d in g , an d Ech o s torm t h res ho lds can b e con fig ured t o t emp orarily s usp ect t raffic fro m t h e o ffen d in g s o u rce. 108 Unified Services Router User Manual Figure 70 : Prote cting the route r and LAN from inte rne t attack s WAN S ecuri ty Check s : En ab le St ealt h M o d e: If St ealt h M o de is en ab led, t h e ro u ter will n o t res p ond t o p o rt s can s fro m t h e W A N. Th is makes it les s s u s cep t ib le t o d is co v ery an d at t acks . Blo ck TCP Flo o d : If t h is o p t io n is en ab led , t h e ro u t er will d ro p all in v alid TCP p acket s an d b e p ro t ect ed fro m a SYN flo o d at t ack. LAN S ecuri ty Check s : Blo ck UDP Flo o d : If t h is o p t io n is en abled, t h e ro u t er will n o t accep t mo re t h an 20 s imu lt an eo u s , act iv e UDP co n n ect io n s fro m a s in g le co mp u t er o n t h e LA N. UDP Co n n ect io n Limit : Yo u can s et t h e n u mb er o f s imu lt an eo u s act iv e UDP co n n ect io n s t o b e accep t ed fro m a s in g le co mp u t er o n t h e LA N; t h e d efau lt is 25 ICS A S etti ng s : Blo ck ICM P No t ificat io n : s elect in g t h is p rev en t s ICM P p acket s fro m b ein g id en t ified as s uch. ICM P p acket s, if id en t ified , can b e cap t u red an d u s ed in a Pin g (ICM P) flo o d Do S at t ack. 109 Unified Services Router User Manual Blo ck Frag men t ed Packet s : s elect in g t h is o p t io n d ro p s an y frag men t ed p acket s t h ro u g h o r t o t h e g at eway Blo ck M u lt icas t Packets: s elect ing t h is o pt io n d ro ps mu lt icast p acket s , wh ich co u ld in d icat e a s p o o f at t ack, t h ro u g h o r t o t h e g at eway . DoS Attack s : SYN Flo o d Det ect Rat e (max/ s ec): Th e rat e at wh ich t h e SYN Flo o d can b e d et ect ed . Ech o St o rm (p in g p kt s / s ec): Th e n u mb er o f p in g p acket s p er s eco n d at wh ich t h e ro u t er d et ect s an Ech o s t orm at t ack fro m t h e W A N an d p rev ent s fu rt h er p in g t raffic fro m t h at ext ern al ad d res s . ICM P Flo o d (ICM P p kt s / sec): Th e n u mb er o f ICM P p acket s p er s econ d at wh ich t h e ro u t er d et ect s an ICM P flo o d at t ack fro m t h e W A N an d p rev en t s fu rt h er ICM P t raffic fro m t h at ext ern al ad d res s . Th e p in g o n LA N in t erfaces is en ab led in d efau lt . To d is ab le t h e p in g res p o n s e fro m LA N h o s t s t o t h e LA N/ W AN p o rt o f t h e d ev ice u n ch eck t h e " Allo w Pin g fro m LA N" o p t io n . 110 Unified Services Router User Manual Chapter 6. IPsec / PPTP / L2TP VPN A VPN p ro v id es a s ecu re co mmu n icat io n ch an n el (“t u n n el”) b et ween t wo g at eway ro u t ers o r a remo t e PC clien t . Th e fo llo win g t y p es o f t u n n els can b e creat ed : Gat eway -t o -g ateway VPN: t o co n n ect t wo o r mo re ro u t ers t o s ecure t raffi c b et ween remo t e s it es . Remo t e Clien t (clien t -t o -g at eway VPN t u n n el): A remo t e clien t in it iat es a VPN t u n n el as t h e IP ad d res s o f t h e remo t e PC clien t is n o t kn o wn in ad v an ce. Th e g at eway in t h is cas e act s as a res p o n d er. Remo t e clien t b eh in d a NA T ro u t er: Th e clien t h as a d y n amic IP ad d res s an d is b eh in d a NA T Ro u t er. Th e remo t e PC clien t at t h e NA T ro u t er in it ia t es a VPN t u n n el as t h e IP ad d res s o f t h e remo t e NA T ro u t er is n o t kn o wn in ad v an ce. T h e g at eway W A N p o rt act s as res p o n d er. PPTP s erv er fo r LA N / W A N PPTP clien t co n n ect io n s . L2TP s erv er fo r LA N / W A N L2TP clien t co n n ect io n s . Figure 71 : Example of Gate way-to - Gate way IPs e c VPN tunne l us ing two DSR route rs conne cte d to the Inte rne t 111 Unified Services Router User Manual Figure 72 : Example of thre e IPs e c clie nt conne ctions to the inte rnal ne twork through the DSR IPs e c gate way 112 Unified Services Router User Manual 6.1 VPN Wizard Setup > Wizard > VPN Wizard Yo u can u s e t h e VPN wizard t o q u ickly creat e b o t h IKE an d VPN p o licies . On ce t h e IKE o r VPN p o licy is creat ed , y o u can mo d ify it as req u ired . Figure 73 : VPN Wizard launch s cre e n To eas ily es t ab lis h a VPN t u n n el u s in g VPN W izard , fo llo w t h e s t ep s b elo w: 1. Select the VPN tunnel type to create Th e t u n n el can eit her b e a g at eway t o g at eway co n nect ion (s it e -t o -s it e) o r a t u n n el t o a h o s t o n t h e in t ern et (remo t e acces s ). Set t h e Co n n ect io n Name an d p re -s h ared key : t h e co n n ect io n n ame is u s ed fo r man ag emen t , an d t h e p re -sh ared key will b e req u ired o n t h e VPN clien t o r g at eway t o es t ab lis h t h e t u n n el Det ermin e t h e lo cal g at eway fo r t h is t u n n el; if t h ere is mo re t h an 1 W A N co n fig u red t h e t u n n el can b e co n fig u red fo r eit h er o f t h e g at eway s . 113 Unified Services Router User Manual 2. Configure Remote and Local WAN address for the tunnel endpoints Remo t e Gat eway Ty p e: id en t ify t h e remo t e en d p o in t o f t h e t u n n el b y FQDN o r s t at ic IP ad d res s Remo t e W A N IP ad d res s / FQDN: Th is field is en ab led o n ly if t h e p eer y o u are t ry in g t o co n n ect t o is a Gat eway . Fo r VPN Clien t s , t h is IP ad d res s o r In t ern et Name is d et ermin ed wh en a co n n ect io n req u es t is re ceiv ed fro m a clien t . Lo cal Gat eway Ty p e: id en t ify t h is ro u t er’s en d p o in t o f t h e t u n n el b y FQDN o r s t at ic IP ad d res s Lo cal W A N IP ad d ress / FQDN: Th is field can b e left b lan k if y o u are n o t u s in g a d ifferen t FQDN o r IP ad d res s t h an t h e o n e s p ecified in t h e W A N p o rt ’s co n fig u rat io n . 3. Configure the Secure Connection Remote Accessibility fields to identify the remote network: Remo t e LA N IP ad d res s : ad d res s o f t h e LA N b eh in d t h e p eer g at eway Remo t e LA N Su b n et M as k: t h e s u b n et mas k o f t h e LA N b eh in d t h e p eer Note: Th e IP ad d res s ran ge u sed o n t h e remo t e LA N mu s t b e d ifferen t fro m t h e IP ad d res s ran g e u s ed o n t h e lo cal LA N. 4. Review the settings and click Connect to establish the tunnel. Th e W izard will creat e an A u t o IPs ec p o licy wit h t h e fo llo win g d efau lt v alu es fo r a VPN Clien t o r Gat eway p o licy (t h es e can b e acces s ed fro m a lin k o n t h e W izard p ag e): Par am eter De f au lt value f rom Wizard Exchange Mode Aggressive (Client policy ) or Main (Gatew ay policy) ID Type FQDN Local WAN ID w an_local.com (only applies to Client policies) Remote WAN ID w an_remote.com (only applies to Client policies) Encryption Algorithm 3DES Authentication Algorithm SHA-1 Authentication Method Pre-shared Key PFS Key-Group DH-Group 2(1024 bit) Life Time (Phase 1) 24 hours Life Time (Phase 2) 8 hours 114 Unified Services Router User Manual Par am eter De f au lt value f rom Wizard Exchange Mode Aggressive (Client policy ) or Main (Gatew ay policy) ID Type FQDN Local WAN ID w an_local.com (only applies to Client policies) Remote WAN ID w an_remote.com (only applies to Client policies) Encryption Algorithm 3DES Authentication Algorithm SHA-1 Authentication Method Pre-shared Key PFS Key-Group DH-Group 2(1024 bit) Life Time (Phase 1) 24 hours NETBIOS Enabled (only applies to Gatew ay policies) Th e VPN W izard is t h e reco mmen d ed met h o d t o s et u p an A u t o IPs ec p o licy . On ce t h e W izard creat es t h e mat ch in g IKE an d VPN p o licies req u ired b y t h e A u t o p o licy , o n e can mo d ify t h e req uired field s t h ro ugh t he ed it lin k. Refer t o t h e o n lin e h elp fo r d et ails . Eas y Set u p Sit e t o Sit e VPN Tu n n el: If y o u fin d it d ifficu lt t o co n fig u re VPN p o licies t h ro ugh VPN wizard u s e easy s et up s it e t o s it e VPN t u n n el. Th is will ad d VPN p o licies b y imp o rt in g a file co n t ain in g v pn p o licies . 6.2 Configuring IPsec Policies Setup > VPN Settings > IPsec > IPsec Policies A n IPs ec p o licy is b et ween t his ro ut er an d an oth er g at eway o r t h is ro u t er an d a IPs ec clien t o n a remo t e h o s t . Th e IPs ec mo d e can b e eit her t u nnel o r t ran s p o rt d ep en d in g o n t h e n et wo rk b ein g t rav ers ed b et ween t h e t wo p o licy en d p o in t s . Tran s p ort : Th is is u sed fo r en d -to -en d co mmu n icat ion b et ween t h is ro u t er an d t h e t u n n el en d p o in t , eit h er an o t h er IPs ec g at eway o r an IPs ec VPN clien t o n a h o s t . On ly t h e d at a p ay lo ad is en cry pted an d t he IP h ead er is n o t mo d ified o r en cry p t ed . Tu n n el: Th is mo d e is u s ed fo r n et wo rk -t o -n et wo rk IPs ec t u n n els wh ere t h is g at eway is o n e en dpo int o f t h e t u nn el. In t h is mo d e t h e en t ire IP p acket in clu d in g t h e h ead er is en cry p t ed an d / o r au t h en t icat ed . W h en t u n n el mo d e is s elect ed , y o u can en ab le Net BIOS an d DHCP o v er IPs ec . DHCP o v er IPs ec allo ws t h is ro ut er t o s erve IP leas es t o h o sts o n t h e remo t e LA N. A s well in t h is mo d e y o u can d efin e t h e s ing le IP ad d ress, ran ge o f IPs , o r s u b net o n b oth t h e lo cal an d remo t e p riv at e n et wo rks t h at can co mmu n icat e o v er t h e t u n n el. 115 Unified Services Router User Manual Figure 74 : IPs e c policy configurat ion On ce t h e t u n nel t y p e an d en d poin t s o f t h e t u n n el are d efin ed y o u can d et ermin e t h e Ph as e 1 / Ph as e 2 n eg o t iatio n t o u se fo r t h e t un nel. Th is is co v ered in t h e IPs ec mode s et t in g , as t h e p o licy can b e M an u al o r A u t o . Fo r A u t o p o licies , t h e In t ern et Key Exch an g e (IKE) p ro t o co l d y namically exch an g es key s b et ween t wo IPs ec h o s t s . Th e Ph as e 1 IKE p aramet ers are u s ed t o d efin e t h e t u n n el’s s ecu rit y as s o ciat io n d et ails . Th e Ph as e 2 A u t o p o licy p aramet ers co v er t h e s ecu rit y as s o ciat io n lifet ime an d en cry p t io n / a u t h en t icat io n d et ails o f t h e p h as e 2 key n eg o t iat io n . 116 Unified Services Router User Manual Th e VPN p o licy is o n e h alf o f t h e IKE/ VPN p o licy p air req u ired t o est ab lis h an A u t o IPs ec VPN t u n n el. Th e IP ad d res s es o f t h e mach in e o r mach in es o n t h e t wo VPN en d p o in ts are co nfig u red h ere, alo n g wit h t h e p o licy p aramet ers req u ired t o s ecure t he t u n n el Figure 75 : IPs e c policy configurat ion continue d (Auto policy via IKE) A M an u al p o licy d o es n ot u s e IKE an d in s t ead relies o n man u al key in g t o exch an g e au t h en ticat io n p aramet ers b etween t h e t wo IPs ec h o s t s . Th e in co min g an d o u t g o in g s ecu rit y p aramet er in d ex (SPI) v alu es mu s t b e mirro red o n t h e remo t e t u n n el 117 Unified Services Router User Manual en d p o in t. A s well t h e en cry pt io n an d in t egrit y alg o rit hms an d key s mu s t mat ch on the remo t e IPs ec h o s t exact ly in o rd er fo r t h e t u nn el t o es t ab lis h s u cces s fu lly . No t e t h at u s in g A u to p olicies wit h IKE are p referred as in s o me IPs ec imp lemen t at io n s t h e SPI (s ecu rit y p aramet er in d ex) v alu e s req u ire co n v ers io n at each en d p o in t . DSR s u p p orts VPN ro ll-o v er feat u re. Th is mean s t h at p o licies co n fig u red o n p rimary W A N will ro llo v er t o t h e s eco n d ary W A N in cas e o f a lin k failu re o n a p rimary W A N. Th is feat u re can b e u s ed o n ly if y o u r W A N is co n f ig u red in A u t o -Ro llo v er mo d e. 118 Unified Services Router User Manual Figure 76 : IPs e c policy configurat ion continue d (Auto / M anual Phas e 2) 6.2.1 Extended Authentication (XAUTH) Yo u can als o co n fig ure ext en ded au t hen ticatio n (XA UTH). Rat h er t h an co n fig u re a u n iq u e VPN p o licy fo r each u s er, y o u can co n fig u re t h e VPN g at eway ro u t er t o au t h en t icat e u s ers fro m a s t o red lis t o f u s er acco u n t s o r wit h an ext ern al au t h en ticat io n s erv er s u ch as a RA DIUS s erv er. W it h a u s er d atabase, u ser accou n t s creat ed in t h e ro u t er are u s ed t o au t h en t icat e u s ers . 119 Unified Services Router User Manual W it h a co n fig u red RA DIUS s erv er, t h e ro u t er co n n ect s t o a RA DIUS s erv er an d p as s es t o it t h e credent ials t h at it receiv es fro m t h e VPN clien t . Yo u can s ecu re t h e co n n ect io n b et ween t h e ro u t er an d t h e RA DIUS s erv er wit h t h e au t h en t icat io n p ro t o co l s u p p o rt ed b y t h e s erv er (PA P o r CHA P). Fo r RA DIUS – PA P, t h e ro u t er firs t ch ecks in t h e u ser d atabase t o s ee if t h e u s er cred en t ials are av ailab le; if t h ey are n o t , t h e ro u t er co n n ect s t o t h e RA DIUS s erv er. 6.2.2 Internet ov er IPSec tunnel In t h is feat u re all t h e t raffic will p as s t h rou gh t h e VPN Tu n n el an d fro m t h e Remo t e Gat eway t h e p acket will b e ro u t ed t o In t ern et . On t h e remo t e g at eway s id e, t h e o u t g o in g p acket will b e SNA T'ed . 6.3 Configuring VPN clients Remo t e VPN clien t s mu s t b e co nfig u red wit h t h e s ame VPN p o licy p aramet ers used in t h e VPN t u n n el t h at t h e clien t wis h es t o u se: en crypt io n, au thent icat ion , life t ime, an d PFS key -g ro u p . Up o n es t ab lis h in g t h es e au t h en t icat io n p aramet ers , t h e VPN Clien t u s er d at ab a s e mu s t als o b e p o p u lat ed wit h an acco u n t t o g iv e a u s er acces s t o t h e t u n n el. VPN clien t s o ft ware is req uired t o es t ab lis h a VPN t u n n el b et ween t h e ro u t er an d remo t e en d p o in t. Op en so urce s o ftware (s uch as Op en VPN o r Op en s wan ) as well as M icro s o ft IPs ec VPN s o ft ware can b e co n fig u red wit h t h e req u ired IKE p o licy p aramet ers t o est ab lish an IPs ec VPN t u n n el. Refer t o t h e clien t s o ft ware g u id e fo r d et ailed in s t ru ct io n s o n s et u p as well as t h e ro u t er’s o n lin e h elp . Th e u s er d at abase co nt ain s t he lis t o f VPN u s er acco un ts t h at are au t h o rized t o u s e a g iv en VPN t u n n el. A lt ern at iv ely VPN t u n n el u s ers can b e au t h en t icat ed u s in g a co n fig u red Rad iu s d at ab ase. Refer t o t h e o nlin e h elp t o d et ermin e h o w t o p o pu late the u s er d at ab as e an d / o r co n fig u re RA DIUS au t h en t icat io n . 6.4 PPTP / L2TP Tunnels Th is ro u t er s up port s VPN t u n n els fro m eit h er PPTP o r L2TP ISP s erv ers . Th e ro u t er act s as a b ro ker d ev ice t o allo w t h e ISP's s erv er t o creat e a TCP co n t ro l co n n ect io n b et ween t h e LA N VPN clien t an d t h e VPN s erv er. 6.4.1 PPTP Tunnel Support Setup > VPN Settings > PPTP > PPTP Client PPTP VPN Clien t can b e co n fig u red o n t h is ro u ter. Us in g t h is clien t we can acces s remo t e n et wo rk wh ich is lo cal t o PPTP s erv er. On ce clien t is en ab led , t h e u s er can acces s Status > Active VPNs p ag e an d es t ab lis h PPTP VPN t u n n el clickin g Co n n ect . To d is co n n ect t h e t u n n el, click Dro p . 120 Unified Services Router User Manual Figure 77 : PPTP tunne l configuratio n – PPTP Clie nt Figure 78 : PPTP VPN conne ction s tatus Setup > VPN Settings > PPTP > PPTP Server A PPTP VPN can b e es t ablis hed t h rou gh t h is ro u ter. On ce en ab led a PPTP s erv er is av ailab le o n t h e ro u t er fo r LA N an d W A N PPTP clien t u s ers t o acces s . On ce t h e PPTP s erv er is en ab led , PPTP clien t s t h at are wit h in t h e ran g e o f co n fig u red IP ad d re s ses o f allo wed clien t s can reach t he ro u ter’s PPTP s erv er. On ce au t hen t icat ed b y t h e PPTP s erv er (t h e t u nnel en d poin t), PPTP clien t s h av e acces s t o t h e n et wo rk man ag ed b y t h e ro u t er. 121 Unified Services Router User Manual Figure 79 : PPTP tunne l configuratio n – PPTP Se rve r 6.4.2 L2TP Tunnel Support Setup > VPN Settings > L2TP > L2TP Server A L2TP VPN can b e es t ablis hed t h rou gh t h is ro u ter. On ce en ab led a L2TP s erv er is av ailab le o n t h e ro u t er fo r LA N an d W A N L2TP clien t u s ers t o acces s . On ce t h e L2TP s erv er is en ab led , L2TP clien t s t h at are wit h in t h e ran g e o f co n fig u red IP ad d res ses o f allo wed clien t s can reach t he ro u ter’s L2TP s erv er. On ce au t hen t icat ed b y t h e L2TP s erv er (t h e t u nnel en d poin t ), L2TP clien t s h av e acces s t o t h e n et wo rk man ag ed b y t h e ro u t er. 122 Unified Services Router User Manual Figure 80 : L2TP tunne l configuratio n – L2TP Se rve r 6.4.3 OpenVPN Support Setup > VPN Settings > OpenVPN > OpenVPN Configuration Op en VPN allo ws p eers t o au t h en t icat e each o t h er u s in g a p re -s h ared s ecret key , cert ificat es , o r u sername/ passwo rd . W hen u sed in a mu lt iclien t -s erv er co n figu rat ion, it allo ws t h e s erv er t o releas e an au t h en t icat io n cert ificat e fo r ev ery clien t , u s in g 123 Unified Services Router User Manual s ig n at ure an d Cert ificat e au th o rit y . A n Op en VPN can b e es t ab lis h ed t h ro u g h t h is ro u t er. Ch eck/ Un ch eck t h is an d click s av e s et t in g s t o s t art / s t o p o p en v p n s erv er. M o d e: Op en VPN d aemo n mo d e. It can ru n in s erv er mo d e, clien t mo d e o r acces s s erv er clien t mo d e. In a cces s s erv er clien t mo d e, t h e u s er h as t o d o wn lo ad t h e au t o lo g in p rofile fro m t h e Op en v p n A ccess Serv er an d u p load t h e s ame t o co n n ect . Serv er IP: Op en VPN s erv er IP co n n ect s (A p p licab le in clien t mo d e). Vp n Net wo rk: A d d res s o f t h e Virt u al Net wo rk. Vp n Net mas k: Net mas k o f t h e Virt u al Net wo rk. Po rt : Th e p o rt n u mb er o n wh ich o p en v p n s erv er(o r A cces s Serv er) ru n s . Tu n n el Pro t o col: Th e p ro t o co l u s ed t o co mmu n icat e wit h t h e remo t e h o s t . Ex: Tcp , Ud p . Ud p is t h e d efau lt . En cry p t io n A lg orit hm: Th e cip h er wit h wh ich t h e p ackets are en cry pt ed . Ex: BF-CBC, A ES-128,A ES-192 an d A ES-256. BF-CBC is t h e d efau lt Has h alg o rit h m: M es sage d ig est alg orit hm u s ed t o au t hen t icat e p acket s . Ex: SHA 1, SHA 256 an d SHA 512. SHA 1 is t h e d efau lt . Tu n n el Ty p e: Select Fu ll Tu n n el t o red irect all t h e t raffic t h ro u g h t h e t u n n el. Select Sp lit Tu n n el t o red irect t raffic t o o n ly s p ecified res o u rces (ad d ed fro m o p en Vp n Clien t Ro u t es) t h ro u g h t h e t u n n el. Fu ll Tu n n el is t h e d efau lt . En ab le Clien t t o Clien t co mmu n icat io n : En a b le t h is t o allo w o p env pn clients t o co mmu n icat e wit h each o t h er in s p lit t u n n el cas e. Dis ab led b y d efau lt . Up lo ad A ccess Serv er Clien t Co n fig u rat io n : Th e u s er h as t o d o wn lo ad t h e au t o lo g in p ro file an d u p lo ad h ere t o co n n ect t h is ro u t er t o t h e Op en VPN A cces s Serv er. Cert ificat es : Select t h e s et o f cert ificat es o p en v p n s erv er u s es . Firs t Ro w: Set o f cert ificat es an d key s t h e s erv er u ses. Seco n d Ro w: Set o f cert ificat es an d key s n ewly u p lo ad ed . En ab le Tls A u t h ent icat ion Key : En ab lin g t h is ad ds Tls au th ent icat io n wh ich ad d s an ad dit io nal lay er o f au t henticatio n. Can b e ch ecked o n ly wh en t h e t ls key is u p lo ad ed . Dis ab led b y d efau lt . Click Sav e Set t in g s t o s av e t h e s et t in g s . 124 ad d res s to wh ich the clien t Unified Services Router User Manual Figure 81 : Ope nVPN configuratio n 6.4.4 OpenVPN Remote Network Setup > VPN Settings > OpenVPN > OpenVPN Remote Network (Site-toSite) Th is p ag e allo ws t h e u s er t o ad d / ed it a remo t e n et wo rk an d n et mas k wh ich allo ws t h e o t h er Op en VPN clien t s t o reach t h is n et wo rk. 125 Unified Services Router User Manual Figure 82 : Ope nVPN Re mote Ne twork Common Name : Co mmo n Name o f t h e Op en VPN clien t cert ificat e. Remote Network : Net wo rk ad d res s o f t h e remo t e res o u rce. S ubnet Mas k : Net mas k o f t h e remo t e res o u rce. 6.4.5 OpenVPN Authentication Setup > VPN Settings > OpenVPN > OpenVPN Authentication Th is p ag e allo ws t h e u s er t o u p lo ad req u ired cert ificat es an d key s . 126 Unified Services Router User Manual Figure 83 : Ope nVPN Authe nticat io n Trus ted Certi fi cate (CA Certi fi cate) : Bro ws e an d u p lo ad t h e p em fo rmat t ed CA Cert ificat e. S erver/ Cl i ent Certi fi cate : Bro ws e an d u p lo ad t h e p em fo rmat t ed Serv er/ Clien t Cert ificat e. S erver/ Cl i ent Key: Bro ws e an d u p lo ad t h e p em fo rmat t ed Serv er/ Clien t Key . DH Key: Bro ws e an d u p lo ad t h e p em fo rmat t ed Diffie Hellman Key . Tl s Authenti cati on Key: Bro ws e an d u p lo ad t h e p em fo rmat t ed Tls A u t h en t icat io n Key . 127 Chapter 7. SSL VPN Th e ro u t er p ro v ides a n in t rin sic SSL VPN feat u re as an alt ern at e t o t h e s t an d ard IPs ec VPN. SSL VPN d iffers fro m IPs ec VPN main ly b y remo v in g t h e req u iremen t o f a p re in s t alled VPN clien t o n t h e remo t e h o st. In s tead , u sers can s ecu rely lo g in t h ro u g h t h e SSL Us er Po rt al u s in g a s t an d ard web b ro ws er an d receiv e acces s t o co n fig u red n et wo rk res o u rces wit h in t h e co rp orate LA N. Th e ro u t er s u p p o rt s mu lt ip le co n cu rren t s es s io n s t o allo w remo t e u s ers t o acces s t h e LA N o v er an en cry p t ed lin k t h ro u g h a cu s t o mizab le u s er p o rt al in t erface, an d each SSL VPN u s er can b e as s ig n ed u n iq u e p riv ileg es an d n et wo rk res o u rce acces s lev els . Th e remo t e u s er can b e p ro vid ed d ifferent o pt io ns fo r SSL s erv ice t h ro u g h t h is ro u t er: VPN Tunnel : Th e remo t e u s er’s SSL en ab led b ro ws er is u s ed in p lace o f a VPN clien t o n t h e remo t e h o s t t o es t ab lis h a s ecu re VPN t u n n el. A SSL VPN clien t (A ct iv e -X o r Jav a b as ed ) is in s t alled in t h e remo t e h o s t t o allo w t h e clien t t o jo in t h e co rp o rat e LA N wit h p re-co n fig u red acces s / p o licy p riv ileg es . A t t h is p o in t a v irt u al n et wo rk in t erface is created o n t he u ser’s h o s t an d t h is will b e as s ig n ed an IP ad d res s an d DNS s erv er ad d res s fro m t h e ro u t er. On ce es t ab lis h ed , t h e h o s t mach in e can acces s allo cat ed n et wo rk res o u rces . Port Forwardi ng : A web -b as ed (A ct iv eX o r Jav a) clien t is in s t alled o n t h e clien t mach in e ag ain . No t e t h at Po rt Fo rward in g s ervice o n ly s u p p o rt s TCP co n n ect io n s b et ween t h e remo t e u s er an d t he ro u ter. Th e ro ut er ad min is t rat or can d efine s pecific s erv ices o r ap p licatio ns t h at are av ailable t o remo t e p o rt fo rward in g u s ers in s t ead o f acces s t o t h e fu ll LA N like t h e VPN t u n n el. A ct iv eX clien t s are u s ed wh en t h e remo t e u ser accesses t h e p o rt al u s ing t he In ternet Exp lo rer b ro ws er. Th e Jav a clien t is u s ed fo r o t h er b ro ws ers like M o zilla Firefo x, Net s cap e Nav ig at o r, Go o g le Ch ro me, an d A p p le Safari. Unified Services Router User Manual Figure 84 : Example of clie ntle s s SSL VPN conne ctions to the DSR 130 Unified Services Router User Manual 7.1 Groups and Users Advanced > Users > Groups Th e g ro u p p ag e allo ws creat in g , ed it in g an d d elet in g g ro u p s . Th e g ro u p s are as s o ciat ed t o s et o f u s er t y pes. Th e lis ts o f av ailab le g ro ups are d is p layed in t h e “Lis t o f Gro u p ” p ag e wit h Gro u p n ame an d d es crip t io n o f g ro u p . Click A d d t o creat e a g ro u p . Click Ed it t o u p d at e an exis t in g g ro u p . Click Delet e t o clear an exis t in g g ro u p . Figure 85 : Lis t of groups Gro u p co n fig u rat io n p age allo ws t o creat e a g ro u p wit h a d ifferen t t y pe o f u s ers . Th e u s er t y p es are as fo llo ws : PPTP Us er: Th es e are PPTP VPN t u n n el LA N u s ers t h at can es tablis h a t unnel wit h t h e PPTP s erv er o n t h e W A N. L2TP Us er: Th es e are L2TP VPN t u n n el LA N u s ers t h at can es tablis h a t unnel wit h t h e L2TP s erv er o n t h e W A N. Xau t h Us er: Th is u s er’s au t h en t icat io n is p erfo rmed b y an ext ern ally co n fig u red RA DIUS o r o t h er En t erp rise s erv er. It is n o t p art o f t h e lo cal u s er d at ab as e. SSLVPN Us er: Th is u s er h as acces s t o t h e SSL VPN s erv ices as d et ermin ed b y t h e g ro u p p o licies an d aut henticatio n d o main o f wh ich it is a memb er. Th e d o main -d et ermin ed SSL VPN p o rt al will b e d is p lay ed wh en lo g g in g in wit h t h is u s er t y p e. 131 Unified Services Router User Manual A d min : Th is is t h e ro u t er’s s u p er-u s er, an d can man ag e t h e ro u t er, u s e SSL VPN t o acces s n et wo rk res o u rces , an d lo g in t o L2TP/ PPTP s erv ers o n t h e W A N. Th ere will alway s b e o n e d efau lt ad min is t rat o r u s er fo r t h e GUI Gu es t Us er (read -o n ly ): Th e g uest u s er g ain s read o n ly acces s t o t h e GUI t o o b s erv e an d rev iew co n fig uratio n s ettin gs. Th e g u est d oes n o t h av e SSL VPN acces s . Cap t iv e Po rt al Us er: Th es e cap tiv e p ort al u s ers h as access t h ro ugh t h e ro u t er. Th e acces s is d et ermin ed b as ed o n cap t iv e p o rt al p o licies . Id le Timeo u t : Th is t h e lo g in t imeo u t p erio d fo r u s ers o f t h is g ro u p . Figure 86 : Us e r group configu rat ion W h en SSLVPN u s ers are s elect ed , t h e SSLVPN s et t in g s are d is p lay ed wit h t h e fo llo win g p aramet ers as cap t u red in SSLVPN Set t in g s . A s p er t h e A u t h en t icat io n Ty p e SSL VPN d et ails are co n fig u red . A u t h ent icat ion Ty p e: Th e au t h en t icat io n Ty p e can b e o n e o f t h e fo llo w in g : Lo cal Us er Dat ab ase (d efault ), Rad iu s -PAP, Rad iu s-CHA P, Rad iu s -MSCHAP, Rad iu s -M SCHA Pv 2, NT Do main , A ct iv e Direct o ry an d LDA P. A u t h en t icat io n Secret : If t h e d o main u s es RA DIUS au t h en t icat io n t h en t h e au t h en ticat io n s ecret is req u ired (an d t h is h as t o mat ch t h e s ecret co n fig u red o n t h e RA DIUS s erv er). W o rkg ro u p : Th is is req u ired is fo r NT d o main au t h en t icat io n . If t h ere are mu lt ip le wo rkg ro u p s , u s er can en t er t h e d et ails fo r u p t o t wo wo rkg ro u p s . LDA P Bas e DN: Th is is t h e b as e d o main n ame fo r t h e LDA P au t h en t icat io n s erv er. If t h ere are mu lt ip le LDA P au t h en ticatio n s erv ers , u s er can en t er t h e d et ails fo r u p t o t wo LDA P Bas e DN. 132 Unified Services Router User Manual A ct iv e Direct o ry Do main : If t h e d o main u s es t h e A ct iv e Direct o ry au t h en t icat io n , t h e A ct iv e Direct o ry d o main n ame is req u ired . Us ers co n fig u red in t h e A ct ive Direct o ry d atabase are g iv en acces s t o t h e SSL VPN p o rt al wit h t h eir A ct iv e Direct o ry u s ern ame an d p as s wo rd . If t h ere are mu lt ip le A ct iv e Direct o ry d o main s , u s er can en t er t h e d et ails fo r u p t o t wo au t h en t icat io n d o main s . Timeo u t : Th e t imeo u t p erio d fo r reach in g t h e au t h en t icat io n s erv er. Ret ries : Th e n u mb er o f ret ries t o au t henticat e wit h t h e au t h en t icat io n s erv er aft er wh ich t h e DSR s t o p s t ry in g t o reach t h e s erv er. Figure 87 : SSLVPN Se ttings Log i n Pol i ci es To s et lo g in p o licies fo r t h e g ro u p , s elect t h e co rres p o n d in g g ro u p click “Lo g in p o licies ”. Th e fo llo win g p aramet ers are co n fig u red : Gro u p Name: Th is is t h e n ame o f t h e g ro u p t h at can h av e it s lo g in p o licy ed it ed 133 Unified Services Router User Manual Dis ab le Lo g in : En ab le t o p rev en t t h e u sers o f t h is g ro up fro m lo g g in g in t o the d ev ices man ag emen t in t erface(s ) Den y Lo g in fro m W A N in t erface: En ab le t o p rev en t t h e u s ers o f t h is g ro u p fro m lo g g in g in fro m a W A N (wid e area n et wo rk) in t erface. In t h is cas e o n ly lo g in t h ro u g h LA N is allo wed . Figure 88 : Group login policie s options Pol i cy by B rows ers To s et b ro ws er p olicies fo r t h e g ro up , s elect t h e co rrespo ndin g g ro u p click “ Po licy b y Bro ws ers ”. Th e fo llo win g p aramet ers are co n fig u red : Gro u p Name: Th is is t h e n ame o f t h e g ro u p t h at can h av e it s lo g in p o licy ed it ed Den y Lo g in fro m Defin ed Bro ws ers : Th e lis t o f d efin ed b ro ws ers b elo w will b e u s ed t o p revent t h e u sers o f t h is g ro up fro m lo g g in g in t o t h e ro u t ers GUI. A ll n o n -d efin ed b ro ws ers will b e allo wed fo r lo g in fo r t h is g ro u p . A llo w Lo g in fro m Defin ed Bro ws ers : Th e lis t o f d efin ed b ro ws ers b elo w will b e u s ed t o allo w t h e u s ers o f t h is g ro u p fro m lo g g in g in t o t h e ro u t ers GUI. A ll n o n -d efin ed b ro ws ers will b e d en ied fo r lo g in fo r t h is g ro u p . Defin ed Bro ws ers :Th is lis t d is plays t h e web b ro ws ers t h at h ave b een add ed t o t h e Defin ed Bro ws ers lis t , u p o n wh ich g ro u p lo g in p o licies can b e d efin ed . (Ch eck Bo x A t Firs t Co lu mn Head er): Select s all t h e d efin ed b ro ws ers in t h e t ab le. Delet e: Delet es t h e s elect ed b ro ws er(s ). Yo u can ad d t o t h e lis t o f Defin ed Bro ws ers b y s elect ing a clien t b ro wser fro m the d ro p d o wn men u an d clickin g A d d. Th is b rows er will t h en ap p ear in t h e ab ov e list o f Defin ed Bro ws ers . Click Sav e Set t in g s t o s av e y o u r ch an g es . 134 Unified Services Router User Manual Figure 89 : B rows e r policie s options Pol i cy by IP To s et p o licies b ye IP fo r t h e g ro u p , select t h e co rres p o n d in g g ro u p click “Po licy b y IP”. Th e fo llo win g p aramet ers are co n fig u red : Gro u p Name: Th is is t h e n ame o f t h e g ro u p t h at can h av e it s lo g in p o licy ed it ed Den y Lo g in fro m Defin ed Bro ws ers : Th e lis t o f d efin ed b ro ws ers b elo w will b e u s ed t o p revent t h e u sers o f t h is g ro up fro m lo g g in g in t o t h e ro u t ers GUI. A ll n o n -d efin ed b ro ws ers will b e allo wed fo r lo g in fo r t h is g ro u p . A llo w Lo g in fro m Defin ed Bro ws ers : Th e lis t o f d efin ed b ro ws ers b elo w will b e u s ed t o allo w t h e u s ers o f t h is g ro u p fro m lo g g in g in t o t h e ro u t ers GUI. A ll n o n -d efin ed b ro ws ers will b e d en ied fo r lo g in fo r t h is g ro u p . Defin ed Bro ws ers :Th is lis t d is plays t h e web b ro ws ers t h at h ave b een add ed t o t h e Defin ed Bro ws ers lis t , u p o n wh ich g ro u p lo g in p o licies can b e d efin ed . (Ch eck Bo x A t Firs t Co lu mn Head er): Select s all t h e d efin ed b ro ws ers in t h e t ab le. Delet e: Delet es t h e s elect ed b ro ws er(s ). Yo u can ad d t o t h e lis t o f Defin ed Bro ws ers b y s elect ing a clien t b ro wser fro m the d ro p d o wn men u an d clickin g A d d. Th is b rows er will t h en ap p ear in t h e ab ov e list o f Defin ed Bro ws ers . 135 Unified Services Router User Manual Click Sav e Set t in g s t o s av e y o u r ch an g es . Figure 90 : IP policie s options . Lo g in Po licies , Po licy b y Bro ws ers , Po licy b y IP are ap p licab le SSL VPN u s er o n ly . Advanced > Users > Users Th e u s ers p ag e allo ws ad d in g , ed it in g an d d elet in g exis t in g g ro u p s . Th e u s er are as s o ciat ed t o co nfig u red g rou ps. Th e lis t s o f av ailable u sers are d is played in t h e “Lis t o f Us ers ” p ag e wit h Us er n ame, as s o ciat ed g ro u p an d Lo g in s t at u s . Click A d d t o creat e a u s er. Click Ed it t o u p d at e an exis t in g u s er. Click Delet e t o clear an exis t in g u s er 136 Unified Services Router User Manual Figure 91 : Available Us e rs with login s tatus and as s ociate d Group 7.1.1 Users and Passwords Advanced > Users > Users Th e u s er co n fig uratio ns allo w creat in g u sers asso ciat ed t o g ro u p . Th e u s er s et t in g s co n t ain t h e fo llo win g key co mp o n en t s : Us er Name: Th is is u n iq u e id en t ifier o f t h e u s er. Firs t Name: Th is is t h e u s er’s firs t n ame Las t Name: Th is is t h e u s er’s las t n ame Select Gro u p : A g ro u p is ch o s en fro m a lis t o f co n fig u red g ro u p s . Pas s wo rd : Th e p as s wo rd as s o ciat ed wit h t h e u s er n ame. Co n firm Pas s wo rd : Th e s ame p as s wo rd as ab o v e is req u ired t o mit ig at e ag ain s t t y p in g erro rs . Id le Timeo u t : Th e s es s io n t imeo u t fo r t h e u s er. It is reco mmen d ed t h at p asswo rds co nt ain s n o d ict io nary wo rd s fro m an y lan g u ag e, an d is a mixt u re o f let t ers (b o th u p p ercas e an d lo werca s e), n u mb ers , an d s y mb o ls . Th e p as s wo rd can b e u p t o 30 ch aract ers . 137 Unified Services Router User Manual Figure 92 : Us e r configurat ion options 7.2 Using SSL VPN Policies Setup > VPN Settings > SSL VPN Server > SSL VPN Policies SSL VPN Po licies can b e creat ed o n a Glo b a l, Gro u p , o r Us er lev el. Us er lev el p o licies t ake p reced en ce o v er Gro u p lev el p o licies an d Gro u p lev el p o licies t ake p reced ence o ver Glo b al p o licies . Th ese p o licies can b e ap p lied t o a s p ecific n et wo rk res o u rce, IP ad d res s o r ran g es o n t h e LA N, o r t o d iffe ren t SSL VPN s erv ices s u p p o rt ed b y t h e ro u t er. Th e Lis t o f A v ailab le Po licies can b e filt ered b as ed o n wh et h er it ap p lies t o a u s er, g ro u p , o r all u s ers (g lo b al). A mo re s p ecific p o licy t akes p reced en ce o v er a g en eric p o licy wh en b o t h are ap p lied t o t h e s ame u s er/g roup /glo b al d o main . I.e. a p o licy fo r a s p ecific IP ad d ress t akes p recedence o v er a p o licy fo r a ran g e o f ad d res s es co n t ain in g t h e IP ad d res s alread y referen ced . 138 Unified Services Router User Manual Figure 93 : Lis t of SSL VPN police s (Global filte r) To ad d a SSL VPN p o licy , y o u mu s t firs t as sig n it t o a u s er, g ro u p , o r make it g lo b al (i.e. ap p licab le t o all SSL VPN u s ers ). If t h e p o licy is fo r a g ro u p , t h e av ailab le co n fig u red g ro u p s are s h o wn in a d ro p d o wn men u an d o n e mu s t b e s elect ed . Similarly , fo r a u s er d efin ed p o licy a SSL VPN u s er mu s t b e ch o s en fro m t h e av ailab le lis t o f co n fig u red u s ers . Th e n ext s t ep is t o d efin e t h e p o licy d et ails . Th e p olicy n ame is a u n iq u e id ent ifier for t h is ru le. Th e p o licy can b e assig ned t o a s p ecific Net wo rk Res o urce (d etails fo llo w in t h e s u b s eq u en t s ect io n ), IP ad d res s , IP n et wo rk, o r all d ev ices o n t h e LA N o f t h e ro u t er. Bas ed o n t h e s elect io n o f o n e o f t h es e fo u r o p t io n s , t h e ap p ro p riat e co n fig u ratio n field s are req u ired (i.e. ch o o s in g t h e n et wo rk res o u rces fr o m a lis t o f d efin ed res o urces, o r d efin in g t h e IP ad d resses). Fo r ap p ly ing t he p o licy t o ad d res s es t h e p o rt ran g e/ p o rt n u mb er can b e d efin ed . Th e fin al s t ep s req uire t h e p o licy p ermis sio n t o b e s et t o eit h er p ermit o r d en y acces s t o t h e s elected ad d resses o r n et wo rk res ources. A s well t h e p o licy can b e sp ecified for o n e o r all o f t h e s u p p o rt ed SSL VPN s erv ices (i.e. VPN t u n n el) On ce d efin ed , t h e p olicy g o es in t o effect immed iat ely . Th e p o licy n ame, SSL s erv ice it ap p lies t o , d es t in at io n (n et wo rk res o u rce o r IP ad d res s es ) an d p ermis s io n (d en y / p ermit ) is o u t lin ed in a lis t o f co n fig u red p o licies fo r t h e ro u t er. 139 Unified Services Router User Manual Figure 94 : SSL VPN policy configurat io n To co n fig u re a p o licy fo r a s in g le u s er o r g ro u p o f u s ers , en t er t h e fo llo win g in fo rmat io n : Po licy fo r: Th e p o licy can b e as sig ned t o a g ro up o f u sers, a s in gle u ser, o r all u s ers (makin g it a g lo b al p o licy ). To cu s to mize t h e p o licy fo r s p ecific u sers or g ro u p s , t h e u s er can s elect fro m t h e A v ailab le Gro u p s an d A v ailab le Us ers d ro p d o wn . A p p ly p o licy t o : Th is refers t o t he LA N res o u rces man ag ed b y t h e DSR, an d t h e p o licy can p ro vid e (o r p rev ent ) access t o n etwo rk res ources, IP ad d ress, IP n et wo rk, et c. Po licy n ame: Th is field is a u n iq u e n ame fo r id en t ify in g t h e p o licy . IP ad d res s: Re q u ired wh en t h e g o verned res ource is id en t ified b y it s IP ad d res s o r ran g e o f ad d res s es . M as k Len g t h : Req u ired wh en t h e g ov ern ed res o u rce is id en t ified b y a ran g e o f ad d res s es wit h in a s u b n et . 140 Unified Services Router User Manual ICM P: Select t h is o p t io n t o in clu d e ICM P t raffic Po rt ran g e: If t h e p o licy g o v ern s a t y p e o f t raffic, t h is field is u s ed fo r d efin in g TCP o r UDP p o rt n u mb er(s ) co rres p o n d in g t o t h e g o v ern ed t raffic. Leav in g t h e s t art in g an d en d ing p ort ran ge b lank co rres p o n d s t o all UDP an d TCP t raffic. Serv ice: Th is is t h e SSL VPN s erv ice mad e av ailab le b y t h is p o licy . Th e s erv ices o ffered are VPN t u n n el, p o rt fo rward in g o r b o t h . Defin ed res o u rces : Th is p o licy can p ro v id e acces s t o s p ecific n et wo rk res o u rces. Net wo rk res o urces mu s t b e co nfig ured in ad v an ce o f creat in g t h e p o licy t o make t h em av ailab le fo r s elect io n as a d efin ed res o u rce. Net wo rk res o u rces are creat ed wit h t h e fo llo win g in fo rmat io n Permis s io n : Th e as sig n ed res o u rces d efin ed b y t h is p o licy can b e exp licit ly p ermit t ed o r d en ied . 7.2.1 Using Network Resources Setup > VPN Settings > SSL VPN Server > Resources Net wo rk res o u rces are s erv ices o r g ro u p s o f LA N IP ad d res s es t h at are u s ed t o eas ily creat e an d co n fig u re SSL VPN p o licies . Th is s h o rt cu t s av es t ime wh en creat in g s imilar p o licies fo r mu lt ip le remo t e SSL VPN u s ers . A d d in g a Net wo rk Res o u rce in v o lv es creat in g a u n iq u e n ame t o id en t ify t h e res o u rce and assig nin g it t o o n e o r all o f t h e s u p p o rt ed SSL s erv ices . On ce t h is is d o n e, ed it in g o n e o f t h e creat ed n et wo rk res o u rces allo ws y o u t o co n fig u re t h e o b ject t y p e (eit h er IP ad d ress o r IP ran g e) as sociat ed wit h t h e s erv ice. Th e Net wo rk A d d res s , M as k Len g t h , an d Po rt Ran g e/ Po rt Nu mb er can all b e d efin ed fo r t h is res o u rce as req u ired . A n et wo rk res o u rce can b e d efin ed b y co n fig u rin g t h e fo llo win g in t h e GUI: Res o u rce n ame: A u n iq u e id en t ifier n ame fo r t h e res o u rce. Serv ice: Th e SSL VPN s erv ice co rres p o n d in g t o t h e res o u rce (VPN t u n n el, Po rt Fo rward in g o r A ll). 141 Unified Services Router User Manual Figure 95 : Lis t of configure d re s ource s , which are availab le to as s ign to SSL VPN policie s 7.3 Application Port Forwarding Setup > VPN Settings > SSL VPN Server > Port Forwarding Po rt fo rward in g allo ws remo t e SSL u s ers t o access s pecified n et wo rk ap p licat io n s o r s erv ices aft er t h ey lo g in t o t h e Us er Po rt al an d lau n ch t h e Po rt Fo rward in g s erv ice. Traffic fro m t h e remo t e u s er t o t h e ro u t er is d et ect ed an d re -ro u t ed b as ed o n co n fig u red p o rt fo rward in g ru les . In t ern al h o st s erv ers o r TCP ap p licat io n s mu s t b e s pecified as b ein g mad e acces s ib le t o remo t e u s ers . A llo win g access t o a LA N s erv er req u ires en terin g t h e lo cal s erver IP ad d res s an d TCP p o rt n u mb er o f t h e ap plicat ion t o b e t u nn elled . Th e t able b elo w lis t s s o me co mmo n ap p licat io n s an d co rres p o n d in g TCP p o rt n u mb ers : T CP Ap p lication Po r t Num ber FTP Data (usually not needed) 20 FTP Control Protocol 21 SSH 22 Telnet 23 SMTP (send mail) 25 HTTP (w eb) 80 POP3 (receive mail) 110 NTP (netw ork time protocol) 123 Citrix 1494 Terminal Services 3389 VNC (virtual netw ork computing) 5900 or 5800 142 Unified Services Router User Manual A s a co n v enien ce fo r remo t e u s ers , t h e h o s t n ame (FQDN) o f t h e n et wo rk s erv er can b e co n fig u red t o allo w fo r IP ad d ress res olu tio n . Th is h o s t n ame res o lu t io n p ro v id es u s ers wit h eas y -t o -rememb er FQDN’s t o acces s TCP ap p licat io n s in s t ead o f erro r p ro n e IP ad d res s es wh en u s in g t h e Po rt Fo rward in g s erv ice t h ro u g h t h e SSL Us er Po rt al. To co n fig u re p o rt fo rward in g , fo llo win g are req u ired : Lo cal Serv er IP ad d ress: Th e IP ad d res s o f t h e lo cal s erv er wh ich is h o s t in g t h e ap p licat io n . TCP p o rt : Th e TCP p o rt o f t h e ap p licat io n On ce t h e n ew ap p licat io n is d efin ed it is d is p layed in a lis t o f co n fig u red ap plicat ion s fo r p o rt fo rward in g . allo w u s ers t o access t he p riv ate n et work s erv ers b y u sin g a h o st name in s tead o f an IP ad d res s, t he FQDN co rres p on din g t o t he IP ad d ress is d efin ed in t h e p o rt fo rward in g h o s t co n fig u rat io n s ect io n . Lo cal s erv er IP ad d res s : Th e IP ad d res s o f t h e lo cal s erv er h o s t in g t h e ap p licat io n . Th e ap p licat io n s h o u ld b e co n fig u red in ad v an ce. Fu lly q u alified d o main n ame: Th e d o main n a me o f t h e in t ern al s erv er is t o b e s p ecified On ce t h e n ew FQDN is co n fig u red, it is d is p layed in a lis t o f co n fig u red h o sts fo r port fo rward in g . Defin in g t h e h o s t n ame is o p t io n al as min imu m req u iremen t fo r p o rt fo rward in g is id en t ify in g t h e TCP ap p licat io n an d lo cal s erv er IP ad d res s . Th e lo cal s erv er IP ad d res s o f t h e co n fig u red h o s t n ame mu s t mat ch t h e IP ad d res s o f t h e co n fig u red ap p licat io n fo r p o rt fo rward in g . 143 Unified Services Router User Manual Figure 96 : Lis t of Available Applicat io ns for SSL Port Forward i ng 7.4 SSL VPN Client Configuration Setup > VPN Settings > SSL VPN Client > SSL VPN Client A n SSL VPN t u n n el clien t p ro vid es a p o in t-to -po int co nnect ion b etween t h e b ro ws er s id e mach in e an d t h is ro u t er. W h en a SSL VPN clien t is lau n ch ed fro m t h e u s er p o rt al, a " n et wo rk ad ap t er" wit h an IP a d d res s fro m t h e co rp o rat e s u b n et , DNS an d W INS s et t in g s is au t o mat ically creat ed . Th is allo ws lo cal ap p licat io n s t o acces s s erv ices o n t h e p riv at e n et wo rk wit h o u t an y s p ecial n et wo rk co n fig u rat io n o n t h e remo t e SSL VPN clien t mach in e. It is imp o rt an t t o en s u re t h at t h e v irt u al (PPP) in t erface ad d res s o f t h e VPN t u n n el clien t d o es n ot co nflict wit h p h ys ical d ev ices o n t h e LA N. Th e IP ad d res s ran g e fo r t h e SSL VPN v irt u al n et wo rk ad ap t er s h o u ld b e eit h er in a d ifferen t s u b n et o r n o n o v erlap p in g ran g e as t h e co rp o rat e LA N. Th e IP ad d res ses o f t h e clien t’s n et work in t erfaces (Et h ern et, W ireless, et c.) canno t b e id en t ical t o t h e ro u t er’s IP ad d res s o r a s erv er o n t h e co rp o rat e LA N t h at is b ein g acces s ed t h ro u g h t h e SSL VPN t u n n el. 144 Unified Services Router User Manual Figure 97 : SSL VPN clie nt adapte r and acce s s configuratio n Th e ro u t er allo ws fu ll t u n n el an d s plit t u n nel s upp ort . Fu ll t u n nel mo d e ju s t s en d s all t raffic fro m t h e clien t acro s s t h e VPN t u n n el t o t h e ro u t er. Sp lit t u n n el mo d e o n ly s en d s t raffic t o t h e p riv a t e LA N b as ed o n p re -s p ecified clien t ro u t es . Th es e clien t ro u t es g iv e t h e SSL clien t access t o s pecific p riv at e n et works , t hereby allo win g access co n t ro l o v er s p ecific LA N s erv ices . Clien t lev el co n fig u rat io n s u p p o rt s t h e fo llo win g : En ab le Sp lit Tu n n el Su p p o rt : W it h a s p lit t u n n el, o n ly res o u rces wh ich are referen ced b y clien t ro u t es can b e acces s ed o v er t h e VPN t u n n el. W it h fu ll t u n n el s u p p o rt (if t h e s p lit t u n n el o p t io n is d is ab led t h e DSR act s in fu ll t u n n el mo d e) all ad d res s es o n t h e p riv at e n et wo rk are acces s ib le o v er t h e VPN t u n n el. Clien t ro u t es are n o t req u ired . DNS Su ffix: Th e DNS s u ffix n ame wh ich will b e g iv en t o t h e SSL VPN clien t . Th is co n fig u rat io n is o p t io n al. Primary DNS Serv er: DNS s erv er IP ad d res s t o s et o n t h e n et wo rk ad ap t o r creat ed o n t h e clien t h o s t . Th is co n fig u rat io n is o p t io n al. Seco n d ary DNS Serv er: Seco n d ary DNS s erv er IP ad d res s t o s et o n t h e n et wo rk ad ap t o r creat ed o n t h e clien t h o s t . Th is co n fig u rat io n is o p t io n al. Clien t A d d ress Ran g e Beg in : Clien t s wh o co n n ect t o t h e t u n n e l g et a DHCP s erv ed IP ad d ress assig ned t o t he n etwo rk ad apt or fro m t h e ran g e o f ad d resses b eg in n in g wit h t h is IP ad d res s Clien t A d d res s Ran g e En d : Th e en d in g IP ad d res s o f t h e DHCP ran g e o f ad d res s es s erv ed t o t h e clien t n et wo rk ad ap t o r. 145 Unified Services Router User Manual Setup > VPN Settings > SSL VPN Client > Configured Client Routes If t h e SSL VPN clien t is as s ig n ed an IP ad d res s in a d ifferen t s u b n et t h an t h e co rp o rat e n et work, a clien t ro u t e mu s t b e ad d ed t o allo w acces s t o t h e p riv at e LA N t h ro u g h t h e VPN t u n n el. A s well a s t at ic ro u t e o n t h e p riv at e LA N’s firewall (t y p ically t h is ro u ter) is n eed ed t o fo rward p riv ate t raffic t h rou gh t h e VPN Firewall t o t h e remo t e SSL VPN clien t . W h en s plit t u n nel mo d e is en ab led , t he u ser is req uired to co n fig u re ro u t es fo r VPN t u n n el clien t s : Des t in at io n n et wo rk: Th e n et wo rk ad d res s o f t h e LA N o r t h e s u b n et in fo rmat io n o f t h e d es t in at io n n et wo rk fro m t h e VPN t u n n el clien t s ’ p ers p ect iv e is s et h ere. Su b n et mas k: Th e s u b net in fo rmat io n o f t h e d es t in at io n n et wo rk is s et h ere. Figure 98 : Configu re d clie nt route s only apply in s plit tunne l mode S teps to Ins tal l / Uni ns tal l S S LVPN tunnel i n MA C OS 1.Op en t ermin al an d ru n " v is u d o " as ro o t an d it will o p en s u d o ers file 2. A d d " u s ern ame A LL=NOPA SSW D: / u s r/ sbin /cho wn ,/ b in / ch mo d ,/ b in / rm" at t h e b o t t o m o f t h e s u doers file, s av e an d clo s e t h e file. (Us ern ame is t h e u s er n ame o f t h e M A C acco u n t b u t n o t SSLVPN u s er n ame). W h ile u n in s t allin g SSLVPN t u n n el, wh en it as ks fo r p asswo rd, en ter t h e M A C u s er acco u n t p as s wo rd b u t n o t ro o t p as s wo rd o r s s lv p n u s er p as s wo rd 146 Unified Services Router User Manual 7.5 User Portal Setup > VPN Settings > SSL VPN Client > SSL VPN Client Portal W h en remo t e u s ers wan t t o access t he p riv ate n etwo rk t h ro u g h an SSL t u n n el (eit h er u s in g t h e Po rt Fo rward in g o r VPN t u n n el s erv ice), t h ey lo g in t h ro u g h a u s er p o rt al. Th is p o rt al p ro v ides t he au th en ticatio n field s t o p ro vid e t he ap pro priat e acces s lev els an d p riv ileg es as d etermin ed b y t h e ro ut er ad min is t rat o r. Th e d o main wh ere t h e u s er acco u n t is s t o red mu s t b e s p ecified , an d t h e d o main d et ermin es t h e au t h en t icat io n met h o d an d p o rt al lay o u t s creen p res en t ed t o t h e remo t e u s er. Figure 99 : Lis t of configure d SSL VPN portal s . The configure d portal can the n be as s ociate d with an authe ntic at io n domain 7.5.1 Creating Portal Layouts Setup > VPN Settings > SSL VPN Server > Portal Layouts Th e ro u t er allo ws y o u t o creat e a cu s t o m p ag e fo r remo t e SSL VPN u s ers t h at is p res en t ed u p o n au t h en t icat io n . Th ere are v ario u s field s in t h e p o rt al t h at are cu s t o mizab le fo r t h e d o main , an d t h is a llo ws t h e ro u t er ad min is t rat o r t o co mmu n icat e d et ails s uch as lo g in in s tructio ns, av ailable s erv ices , an d o t h er u s ag e d et ails in t h e p o rt al v is ib le t o remo t e u sers. Du rin g d o main s etup , co n fig u red p o rt al lay o u t s are av ailab le t o s elect fo r all u s ers au t h en t icat ed b y t h e d o main . LA N IP ad d res s is https://192.168.10.1/scgibin/userPortal/portal. Th is is t h e s ame p ag e t h at o p ens wh en t h e “Us er Po rt al” lin k is clicked o n t h e SSL VPN men u o f t h e ro u t er GUI. Th e d efau lt p o rt al Th e ro u t er ad min is t rator creat es an d ed it s p o rtal lay o uts fro m t h e co n fig u rat ion p ages in t h e SSL VPN men u . Th e p o rt al n ame, t it le, b an n er n ame, an d b an n er co n t en t s are all cu s t o mizab le t o t h e in t en ded u sers fo r t h is p o rtal. Th e p o rtal n ame is ap p en d ed t o 147 Unified Services Router User Manual t h e SSL VPN p o rt al URL. A s well, t h e u s ers as s ig n ed t o t h is p o rt al (t h ro u g h t h eir au t h en ticat io n d o main ) can b e p resent ed wit h o n e o r mo re o f t h e ro u t er’s s u p p o rt ed SSL s erv ices s u ch as t h e VPN Tu n n el p ag e o r Po rt Fo rwa rd in g p ag e. To co n fig u re a p o rt al lay o u t an d t h eme, fo llo win g in fo rmat io n is n eed ed : Po rt al lay o u t n ame: A d es crip t iv e n ame fo r t h e cu s t o m p o rt al t h at is b ein g co n fig u red . It is u s ed as p art o f t h e SSL p o rt al URL. Po rt al s it e t it le: Th e p o rt al web b ro ws er win d o w t it le t h at ap p ears wh en t h e clien t acces s es t h is p o rt al. Th is field is o p t io n al. Ban n er t it le: Th e b an n er t it le t h at is d is p lay ed t o SSL VPN clien t s p rio r t o lo g in . Th is field is o p t io n al. Ban n er mes s ag e: Th e b an n er mes s ag e t h at is d is p lay ed t o SSL VPN clien t s p rio r t o lo g in . Th is field is o p t io n al. Dis p lay b an n er mes s ag e o n t h e lo g in p age: Th e u s er h as t h e o p t io n t o eit h er d is p lay o r h id e t h e b an n er mes s ag e in t h e lo g in p ag e. HTTP met a t ag s fo r cache co nt rol: Th is s ecu rity featu re p rev en ts exp ired web p ag es an d d at a fro m b ein g s t o red in t h e clien t ’s web b ro ws er cach e. It is reco mmen d ed t h at t h e u s er s elect s t h is o p t io n . A ct iv eX web cach e clean er: A n A ct iv eX cach e co n t ro l web clean er can b e p u s h ed fro m t h e g at eway t o t h e clien t b ro ws er wh en ev er u s ers lo g in t o t h is SSL VPN p o rt al. SSL VPN p o rt al p ag e t o d is play : Th e Us er can eit h er en able VPN t u n n el p ag e o r Po rt Fo rward in g , o r b o t h d epend ing o n t h e SSL s erv ices t o d is p lay o n t h is p o rt al. On ce t h e p o rt al s ettin gs are co n fig u red , t h e n ewly co n fig u red p o r t al is ad d ed t o t h e lis t o f p o rt al lay o u t s . 148 Unified Services Router User Manual Figure 100 : SSL VPN Portal configu rat ion 149 Unified Services Router User Manual Chapter 8. Advanced Configuration Tools 8.1 USB Device Setup Setup > USB Settings > USB Status Th e DSR Un ified Serv ices Ro u t er h as a USB in t erface fo r p rin t er acces s , file s h arin g an d on the DSR-1000 / DSR-1000N mo d els 3G mo d em s u p p o rt . Th ere is n o co n fig u rat io n o n t he GUI t o en ab le USB d ev ice s u p p o rt . Up o n in s ert in g y o u r USB s t o rag e d ev ice, p rin t er cab le o r 3G mo d em t h e DSR ro u t er will au t o mat ically d et ect t h e t y p e o f co n n ect ed p erip h eral. USB M as s St o rag e: als o referred t o as a “s h are p o rt ”, files o n a USB d is k co n n ect ed t o t h e DSR can b e acces s ed b y LA N u s ers as a n et wo rk d riv e. USB Prin t er: Th e DSR can p ro v id e t h e LA N wit h acces s t o p rin t ers co n n ect ed t h ro u g h t h e USB. Th e p rin t er d riv er will h av e t o b e in s t alled o n t h e LA N h o s t an d t raffic will b e ro u t ed t h ro u g h t h e DSR b et ween t h e LA N an d p rin t er. USB 3G mo d em: A 3G mo d em d o n g le can b e p lu g ged in an d u sed as a s eco n d ar y W A N. Lo ad b alan cin g , au to-failo v er, o r p rimary W A N acces s can b e co n fig u red t h ro u g h t h e 3G in t erface. To co n fig u re p rin t er o n a W in d o ws mach in e, fo llo w b elo w g iv en s t ep s : Click 'St art ' o n t h e d es kt o p . Select ‘Prin t ers an d faxes ’ o p t io n . Rig h t click an d s elect 'ad d p rin t er' o r click o n 'A d d p rin t er' p res en t at t h e left men u . Select t h e 'Net wo rk Prin t er' rad io b u t t on an d click n ext (s elect " d evice is n't lis t ed in cas e o f W in d o ws 7" ). Select t h e 'Co n n ect t o p rin ter u sin g URL' rad io b u t t o n ('Select a s hared p rin t er b y n ame ‘in cas e o f W in d o ws 7) an d g iv e t h e fo llo win g URL h t t p :/ / <Ro u t er's LA N IP ad d res s>:631/ p rin ters / <M o d el Name> (M o d el Name can b e fo u n d in t h e USB s t at u s p ag e o f ro u t er's GUI). Click 'n ext ' an d s elect t h e ap p ro p riat e d riv er fro m t h e d is p lay e d lis t . Click o n 'n ext ' an d 'fin is h ' t o co mp let e ad d in g t h e p rin t er. 150 Unified Services Router User Manual Figure 101 : USB De vice De te ction 8.2 USB share port Setup > USB Settings > USB SharePort Th is p ag e allo ws co n fig u re t h e Sh arePo rt feat u re av ailab le in t h is ro u t er. 151 Unified Services Router User Manual Figure 102 : USB Share Port US B -1 : En ab le USB Prin t er: Select t h is o p t io n t o allo w t h e USB p rin t er co n n ect ed t o t h e ro u t er t o b e s h ared acro s s t h e n et wo rk. Th e USB p rin t er can b e acces s ed o n an y LA N h o s t (wit h ap p ro p riat e p rin t er d riv er in s t alled ) co n nected t o t h e ro u t er b y u s in g t h e fo llo win g co mman d in t h e h o s t 's ad d p rin t ers win d o w h t t p :/ / <Ro uter's IP:631>/ p rin t ers/ <Device M od el> (Dev ice M o d el can b e fo u n d in t h e USB s et t in g s p ag e). En ab le Sh arin g : Select t h is o p tio n t o allo w t h e USB s t o rag e d ev ice co n n ect ed t o t h e ro u t er t o b e s h ared acro s s t h e n et wo rk. US B -2 : En ab le USB Prin t er: Select t h is o p t io n t o allo w t h e USB p rin t er co n n ect ed t o t h e ro u t er t o b e s h ared acro s s t h e n et wo rk. Th e USB p rin t er can b e acces s ed o n an y LA N h o s t ( wit h ap p ro p riat e p rin t er d riv er in s t alled ) co n nected t o t h e ro u t er b y u s in g t h e fo llo win g co mman d in t h e h o s t 's ad d p rin t ers win d o w h t t p :/ / <Ro uter's IP:631>/ p rin t ers/ <Device M od el> (Dev ice M o d el can b e fo u n d in t h e USB s et t in g s p ag e). 152 Unified Services Router User Manual En ab le Sh arin g : Selec t t h is o p tio n t o allo w t h e USB s t o rag e d ev ice co n n ect ed t o t h e ro u t er t o b e s h ared acro s s t h e n et wo rk. S hari ng Enabl ed i nterfaces : Th e LA N in t erfaces o n wh ich USB s h arin g is en ab led , at leas t o n e in t erface mu s t b e s elect ed t o b eg in s h arin g . En ab le Prin t er: En ab les p rin t er s h arin g o n t h e s elect ed in t erface. En ab le St o rag e : En ab les s t o rag e d ev ice s h arin g o n t h e s elect ed in t erface . 8.3 SMS service Setup > USB Settings > SMS Service Th e DSR Un ified Serv ic es Ro u t er h as a USB in t erface t o co n n ect 3G mo d em s u p p o rt t o s en d an d receiv e Sh o rt M essagin g Serv ice. Th e receiv ed mes s ag es can b e s een in t h e In b o x a n d allo ws t h e u ser t o create a n ew SM S. If W A N3 is u s ed in d ed icat ed wan mo d e, lo ad b alan cin g mo d e o r if 3G USB Dev ice is n o t co n n ect ed t o ro u t er t h en t h e co n t ro ls o n t h is p ag e will b e g rey ed o u t . Figure 103 : SM S Se rvice – Se nd SM S Th e fo llo win g d et ails are d is p lay ed in SM S INBOX p ag e: Sn o : Dis p lay s t h e s erial n u mb er o f mes s ag e in t h e in b o x. Sen d er: Dis p lay s t h e s en d er o f t h e p art icu lar mes s ag e. TimeSt amp : Dis p lay s t h e t ime wh en t h e mes s ag e was s en t Text : Dis p lay s t h e co n t en t o f t h e p art icu lar M es s ag e. Th e fo llo win g act io n s are p erfo rmed : Delet e : Delet es t h e SM S h av in g t h at p art icu lar Sn o . On ly o n e mes s ag e can b e d elet ed at a t ime. Refres h : Up d at es t h e in b o x wit h n ew SM S (if an y ). Rep ly : Let s t h e u s er creat e a n ew SM S in rep ly t o a p art icu lar mes s ag e b y t h e s elect ed s en d er. “Receiv er" field in t h e creat eSms .h t m p ag e is filled wit h t h e s en d er's n u mb er. Fo rward : Let s t h e u s er fo rward a s elect ed SM S. " Text M es s ag e" field in t h e creat eSms .h t m p ag e is filled wit h t h e " Text " o f t h e s elect ed mes s ag e. 153 Unified Services Router User Manual Figure 104 : SM S Se rvice – Re ce ive SM S Th e fo llo win g d et ails t o b e p ro v id ed in Creat e M es s ag e p ag e: Receiv er: En t er t h e p h o n e n u mb er o f t h e in t en d ed receiv er o f t h e mes s ag e. Text M es s ag e : En t er t h e b o d y o f t h e mes s ag e h ere Click Sen d M es s ag e t o s en d t h e mes s ag e. Click Do n 't Sav e Set t in g s t o res et Receiv er an d Text M es s ag e field s . 8.4 Authentication Certificates Advanced > Certificates Th is g at eway u s es d ig it al cert ificat es fo r IPs ec VPN au t h en t icat io n as well as SSL v alid at io n (fo r HTTPS an d SSL VPN au t h en t icat io n ). Yo u can o b t ain a d ig it al cert ificat e fro m a well-kn o wn Cert ificat e A u t h o rit y (CA ) s u ch as VeriSig n , o r g en erat e and s ign y ou r o wn certificat e u s ing fu nctio nalit y av ailab le o n t h is g at eway . Th e g at eway co mes wit h a s elf -s ig n ed cert ificat e, an d t h is can b e rep laced b y o n e s ig n ed b y a CA as p er y o u r n et wo rkin g r eq u iremen t s . A CA cert ificat e p ro v id es s t ro n g as s u ran ce o f t h e s erv er’s id en t it y an d is a req u iremen t fo r mo s t co rp o rat e n et wo rk VPN s o lu t io n s . Th e cert ificat es men u allo ws y o u t o v iew a lis t o f cert ificat es (b o t h fro m a CA an d s elf-s ig n ed ) cu rren t ly lo ad ed o n t h e g at eway . Th e fo llo win g cert ificat e d at a is d is p lay ed in t h e lis t o f Tru s t ed (CA ) cert ificat es : CA Id en t it y (Su b ject Name): Th e cert ificat e is is s u ed t o t h is p ers o n o r o rg an izat io n Is s u er Name: Th is is t h e CA n ame t h at is s u ed t h is cert ificat e Exp iry Time: Th e d at e aft er wh ich t h is Tru s t ed cert ificat e b eco mes in v alid A s elf cert ificat e is a cert ificat e is s u ed b y a CA id en t ify in g y o u r d ev ice (o r s elf s ig n ed if y o u d o n’t wan t t h e id ent ity p ro tect ion o f a CA ). Th e A ct iv e Self Cert ificat e 154 Unified Services Router User Manual t ab le lis t s t h e s elf cert ificat es cu rren t ly lo ad ed o n t h e g at eway . Th e fo llo win g in fo rmat io n is d is p lay ed fo r each u p lo ad ed s elf cert ificat e: Name: Th e n ame y o u u s e t o id en t ify t h is cert ificat e, it is n o t d is p lay ed t o IPs ec VPN p eers o r SSL u s ers . Su b ject Name: Th is is t h e n ame t h at will b e d is p lay ed as t h e o wn er o f t h is cert ificat e. Th is s ho uld b e y ou r o fficial reg is t ered o r co mp an y n ame, as IPs ec o r SSL VPN p eers are s h o wn t h is field . Serial Nu mb er: Th e s erial n u mb er is main t ain ed b y t h e CA an d u s ed t o id en t ify t h is s ig n ed cert ificat e. Is s u er Name: Th is is t h e CA n ame t h at is s u ed (s ig n ed ) t h is cert ificat e Exp iry Time: Th e d at e aft er wh ich t h is s ig n ed cert ificat e b eco mes in v alid – y o u s h o u ld ren ew t h e cert ificat e b efo re it exp ires . To req u es t a s elf cert ificat e t o b e s ig n ed b y a CA , y o u can g en erat e a Cert ificat e Sig n in g Req u est fro m t h e g at eway b y ent erin g id ent ificatio n p aramet ers an d p ass ing it alo n g t o t h e CA fo r s ig n in g . On ce s ig n ed , t h e CA ’s Tru s t ed Cert ificat e an d s ig n ed cert ificat e fro m t h e CA are u p lo ad ed t o act iv at e t h e s elf-cert ificat e v alid at in g t h e id en t it y o f t h is g at eway . Th e s elf cert ificat e is t h en u s ed in IPs ec an d SSL co n n ect io n s wit h p eers t o v alid at e t h e g at eway ’s au t h en t icit y . Figure 105 : Ce rtificate s ummary for IPs e c and HTTPS manage me nt 155 Unified Services Router User Manual 8.5 Advanced Switch Configuration Th e DSR allo ws y o u t o ad ju st t h e p o wer co nsu mp tio n o f t h e h ard ware b as ed o n y o u r act u al u s ag e. Th e t wo “g reen ” o p t io n s av ailab le fo r y o u r LA N s wit ch are Po wer Sav in g b y Lin k St at u s an d Len g t h Det ect io n St at e. W it h “Po wer Sav in g b y Lin k St at u s ” o p tio n en abled, t h e t ot al p o wer co n sump t ion b y t h e LA N s wit ch is d ep en d en t fu n ct io n o f o n t h e n u mb er o f co n nect ed p o rt s. Th e o v erall cu rren t d raw wh en a s in g le p o rt is co n n ect ed is les s t h an wh en all t h e p o rt s are co n n ect ed . W it h “Len g t h Det ect io n St ate” o p t ion enabled , t he o v erall cu rren t s up plied t o a LA N p o rt is red u ced wh en a s maller cab le len g t h is co n n ect ed o n a LA N p o rt . Ju mb o Frames s u p p ort can b e co n figu red as an ad vanced s wit ch co nfig uratio n. Ju mb o frames are Et h ern et frames wit h mo re t h an 1500 b y t es o f p ay lo ad . W hen t h is o p tio n is en ab led , t h e LA N d ev ices can exch an g e in fo rmat io n at Ju mb o frames rat e. Figure 106 : Advance d Switch Se ttings 156 Unified Services Router User Manual Chapter 9. Administration & Management 9.1 Configuration Access Control Th e p rimary mean s t o co n fig ure t h is g ateway v ia t h e b ro ws er -in d ep en d en t GUI. Th e GUI can b e acces s ed fro m LA N n o d e b y u s in g t h e g at eway ’s LA N IP ad d res s an d HTTP, o r fro m t h e W A N b y u s in g t h e g at eway ’s W AN IP ad d ress an d HTTPS (HTTP o v er SSL). A d min is t rat o r an d Gu es t u s ers are p ermit t ed t o lo g in t o t h e ro u t er’s man ag emen t in t erface. Th e u s er t y pe is s et in t h e Advanced > Users > Users p ag e. Th e A d min or Gu es t u s er can b e co nfig ured t o acces s t h e ro u t er GUI fro m t h e LA N o r t h e In t ern et (W A N) b y en ab lin g t h e co rres p o n d in g Lo g in Po licy . Figure 107 : Us e r Login policy configuratio n 9.1.1 Admin Settings Tools > Admin > Admin settings Th is p ag e allo ws t o p ro v id e t h e n ame o f t h e ro u t er. 157 Unified Services Router User Manual Figure 108 : Admin Se ttings 9.1.2 Remote Management Tools > Admin > Remote Management Bo t h HTTPS an d t eln et acces s can b e res t rict ed t o a s u b s et o f IP ad d res s es . Th e ro u t er ad min is t rat o r can d efin e a kn o wn PC, s in g le IP ad d res s o r ran g e o f IP ad d res ses t h at are allo wed t o access t he GUI wit h HTTPS. Th e o p en ed p o rt fo r SSL t raffic can b e ch an g ed fro m t h e d efau lt o f 443 at t h e s ame t ime as d efin in g t h e allo wed remo t e man ag emen t IP ad d res s ran g e . 158 Unified Services Router User Manual Figure 109 : Re mote M anage me nt from the WAN 9.1.3 CLI Access In ad d it io n t o t h e web -b as ed GUI, t h e g at eway s u p p o rt s SSH an d Teln et man ag emen t fo r co mman d -lin e in t eract io n . Th e CLI lo g in cred en t ials are s h ared wit h t h e GUI fo r ad min is t rat o r u s ers . To acces s t h e CLI, t y p e “cli” in t h e SSH o r co n s o le p ro mp t an d lo g in wit h ad min is t rat o r u s er cred en t ials . 9.2 SNMP Configuration Tools > Admin > SNMP SNM P is an ad d it io n al man ag emen t t o o l t h at is u s efu l wh en mu lt ip le ro u t ers in a n et wo rk are b ein g man ag ed b y a cen t ral M as t er s y s t em. W h en a n ext ern al SNM P man ag er is p ro v id ed wit h t h is ro u ter’s M anag emen t In fo rmat io n Bas e (M IB) file, t h e man ag er can u p d ate t he ro u ter’s h ierarch al v ariab les t o v iew o r u p d at e co n fig u rat io n p aramet ers . Th e ro u ter as a man ag ed d evice h as an SNM P ag en t t h at allo ws t h e M IB co n fig u rat io n v ariab les t o b e acces s ed b y t h e M as t er (t h e SNM P man ag er). Th e A cces s Co n tro l Lis t o n t h e ro ut er id en tifies man ag ers in t h e n et wo rk t h at h av e read o n ly o r read -writ e SNM P cred en t ials . Th e Trap s Lis t o u t lin es t h e p o rt o v er wh ich n o t ificat io ns fro m t h is ro u t er a re p ro v id ed t o t h e SNM P co mmu n it y (man ag ers ) an d als o t h e SNM P v ers io n (v 1, v 2c, v 3) fo r t h e t rap . 159 Unified Services Router User Manual Figure 110 : SNM P Us e rs , Traps , and Acce s s Control Tools > Admin > SNMP System Info Th e ro u t er is id en t ified b y an SNM P man ag er v i a t h e Sy s t em In fo rmat io n . Th e id en t ifier s et t ing s Th e Sy s Name s et h ere is als o u sed t o id en tify t he ro u ter fo r Sy s Lo g lo g g in g . 160 Unified Services Router User Manual Figure 111 : SNM P s ys te m inform at io n for this route r 9.3 Configuring Time Zone and NTP Tools > Date and Time Yo u can co n fig u re y o u r t ime zo n e, wh et h er o r n o t t o ad ju s t fo r Day lig h t Sav in g s Time, an d wit h wh ich Net wo rk Time Pro t o co l (NTP) s erv er t o s y n ch ro n ize t h e d at e an d t ime. Yo u can ch o o s e t o s et Dat e an d Time man u ally , wh ich will s t o re t h e in fo rmat io n o n t h e ro u t er’s real t ime clo ck (RTC). If t h e ro u t er h as acces s t o t h e in t ern et , t h e mo s t accurate mech anism t o s et t h e ro u t er t ime is t o en ab le NTP s erv er co mmu n icat io n . A ccu rat e d at e an d t ime o n t h e ro u ter is crit ical fo r firewall s ch ed u les , W i -Fi p o wer s av in g s u p p o rt t o d is ab le A Ps at cert ain t imes o f t h e d ay , an d accu rat e lo g g in g . Pleas e fo llo w t h e s t ep s b elo w t o co n fig u re t h e NTP s erv er: 1. Select the router’s time zone, relative to Greenwich Mean Time (GMT). 2. If supported for your region, click to Enable Daylight Savings. 3. Determine whether to use default or custom Network Time Protocol (NTP) servers. If custom, enter the server addresses or FQDN. 161 Unified Services Router User Manual Figure 112 : Date , Time , and NTP s e rve r s e tup 9.4 Log Configuration Th is ro u t er allo ws y o u t o capt ure lo g mes sag es fo r t raffic t h ro u g h t h e firewall, VPN, an d o v er t h e wireles s A P. A s an ad min is t rat or y o u can mo n it o r t he t y pe o f t raffic t h at g o es t h rou gh t h e ro ut er an d als o b e n ot ified o f p o t en t ial at t acks o r erro rs wh en t h ey are d et ect ed b y t h e ro u t er. Th e fo llo win g s ect io n s d es crib e t h e lo g co n fig u rat io n s et t in g s an d t h e way s y o u can acces s t h es e lo g s . 9.4.1 Defining W hat to Log Tools > Log Settings > Logs Facility Th e Lo g s Facilit y p ag e allo ws y o u t o d et ermin e t h e g ran u larit y o f lo g s t o receiv e fro m t h e ro u t er. Th ere are t h ree co re co mp o n en t s o f t h e ro u t er, referred t o as Facilit ies : 162 Unified Services Router User Manual Kern el: Th is refers t o t h e Lin u x kern el. Lo g mes s ag es t h at co rres p o n d t o t h is facilit y wo u ld co rres p o n d t o t raffic t h ro u g h t h e firewall o r n et wo rk s t ack. Sy s t em: Th is refers t o ap plicat ion an d man ag emen t lev el feat ures av ailab le o n this ro u t er, in clu d in g SSL VPN an d ad min is t rat o r ch an g es fo r man ag in g t h e u n it . W ireles s : Th is facilit y co rres p o n d s t o t h e 802.11 d riv er u s ed fo r p ro v id in g A P fu n ct io n alit y t o y o u r n et wo rk. Lo cal1-UTM : Th is facilit y co rres p o n d s t o IPS (In t ru s io n Prev en t io n Sy s t em) wh ich h elp s in d et ect in g malicio u s in t ru s io n at t emp t s fro m t h e W A N. Fo r each facilit y , t h e fo llo win g ev en t s (in o rd er o f s ev erit y ) can b e lo g g ed : Emerg en cy , A lert , Crit ical, Erro r , W arn in g , No t ificat io n , In fo rmat io n , Deb u g g in g . W h en a p art icu lar s ev erit y lev el is s elect ed , all ev en t s wit h s ev erit y eq u al t o an d g reat er t h an t h e ch osen s ev erit y are cap t u red . Fo r examp le if y o u h av e co n fig u red CRITICA L lev el lo g g in g fo r t h e W ireles s facilit y , t h en 802.11 lo g s wit h s ev erit ies CRITICA L, A LERT, an d EM ERGENCY are lo g g ed . Th e s ev erit y lev els av ailab le fo r lo g g in g are: EM ERGENC Y: s y s t em is u n u s ab le A LERT: act io n mu s t b e t aken immed iat ely CRITICA L: crit ical co n d it io n s ERROR: erro r co n d it io n s W A RNING: warn in g co n d it io n s NOTIFICA TION: n o rmal b u t s ig n ifican t co n d it io n INFORM A TION: in fo rmat io n al DEBUGGIN G: d eb u g -lev el mes s ag es 163 Unified Services Router User Manual Figure 113 : Facility s e ttings for Logging Th e d is p lay fo r lo g g in g can b e cu st omized b as ed o n wh ere t h e lo g s are s en t , eit h er t h e Ev en t Lo g v iewer in t h e GUI (t h e Ev en t Lo g v iewer is in t h e Status > Logs p ag e ) o r a remo t e Sy s lo g s erv er fo r lat er rev iew. E-mail lo g s , d is cu s s ed in a s u b sequ en t s ectio n, fo llo w t h e s ame co n fig u rat io n as lo g s co n fig u red fo r a Sy s lo g s erv er. Tools > Log Settings > Logs Configuration Th is p ag e allo ws y o u t o d et ermin e t h e t y p e o f t raffic t h ro u g h t h e ro u t er t h at is lo g g ed fo r d is p lay in Sy s lo g, E-mailed lo g s , o r t h e Ev en t Viewer. Den ial o f s erv ice at t acks , g en eral at t ack in fo rmat io n , lo g in at t emp t s , d ro p p ed p acket s , an d s imilar ev en t s can b e cap t u red fo r rev iew b y t h e IT ad min is t rat o r. Traffic t h ro u g h each n etwo rk s egmen t (LA N, W A N, DM Z) can b e t racked b as ed o n wh et h er t h e p acket was accep t ed o r d ro p p ed b y t h e firewall. A ccep t ed Packet s are t h o s e t h at were s u cces s fu lly t ran s ferred t h ro u g h t h e co rres p o n d in g n et wo rk s eg men t (i.e. LA N t o W A N). Th is o p t io n is p art icu larly u s efu l wh en t h e Defau lt Ou t b o u n d Po licy is “Blo ck A lway s ” s o t h e IT ad min can mo n it o r t raffic t h at is p as s ed t h ro u g h t h e firewall. Examp le: If A ccep t Packet s fro m LA N t o W A N is en ab led an d t h ere is a firewall ru le t o allo w SSH t raffic fro m LA N, t h en wh en ev er a LA N mach in e 164 Unified Services Router User Manual t ries t o make an SSH co n n ect io n , t h o s e p acket s will b e accep t ed an d a mes s ag e will b e lo g g ed . (A s s u min g t h e lo g o p t io n is s et t o A llo w fo r t h e SSH firewall ru le.) Dro p p ed Packet s are p acket s t hat were in t en tio nally b lo cked fro m b ein g t ran s ferred t h ro u g h t h e co rrespo ndin g n et work s eg men t. Th is o p tio n is u s efu l wh en t h e Defau lt Ou t b o u n d Po licy is “A llo w A lway s ”. Examp le: If Dro p Packet s fro m LA N t o W A N is en ab led an d t h ere is a firewall ru le t o b lo ck SSH t raffic fro m LA N, t h en wh en ev er a LA N mach in e t ries t o make an SSH co n n ect io n , t h o s e p acket s will b e d ro p p ed an d a mes s ag e will b e lo g g ed . (M ake s u re t h e lo g o p t io n is s et t o allo w fo r t h is firewall ru le.) En ab lin g accep t ed p acket lo g g in g t h ro u g h t h e firewall may g en erat e a s ig n ifican t v o lu me o f lo g mes s ag es d ep en d in g o n t h e t y p ical n et wo rk t raffic. Th is is reco mmen d ed fo r d eb u g g in g p u rp o s es o n ly . In ad d it io n t o n et work s egmen t lo g gin g, u n icast an d mu lt icast t raffic can b e lo g g ed . Un icas t p acket s h av e a s in g le d es t in at io n o n t h e n et wo rk, wh ereas b ro ad cas t (o r mu lt icas t ) p acket s are s en t t o all p o s s ib le d es t in at io n s s imu lt an eo u s ly . On e o t h er u s efu l lo g co n tro l is t o lo g p acket s t h at are d ro p p ed d u e t o co n fig u red b an d wid t h p ro files o v er a p art icu lar in t erface. Th is d ata will in d icat e t o t h e ad min wh et h er t h e b an d wid t h p ro file h as t o b e mo d ified t o acco u n t fo r t h e d es ired in t ern et t raffic o f LA N u s ers . 165 Unified Services Router User Manual Figure 114 : Log configuratio n options for traffic through route r Tools > Log Settings > IPv6 logging Th is p ag e allo ws y o u t o co n fig u re t h e IPv 6 lo g g in g 166 Unified Services Router User Manual Figure 115 : IPv6 Log configuratio n options for traffi c through route r 9.4.2 Sending Logs to E-mail or Syslog Tools > Log Settings > Remote Logging On ce y o u h av e co nfig ured t h e t y pe o f lo g s t h at y o u wan t t h e ro u t er t o co llect , t h ey can b e s en t t o eit h er a Sy s log server o r an E-M ail ad d res s. Fo r remo t e lo g g in g a key co n fig u ratio n field is t h e Remo t e Lo g Id en t ifier. Ev ery lo g g ed mes sag e will co n t ain t h e co n fig u red p refix o f t h e Remo t e Lo g Id en t ifier, s o t h at s y s lo g s erv ers o r email ad d res s es t h at receiv e lo g s fro m mo re t h an o n e ro u t er can s o rt fo r t h e relev an t d ev ice’s lo g s . On ce y o u en ab le t h e o p t io n t o e -mail lo g s , en t er t h e e -mail s erv er’s ad d res s (IP ad d res s o r FQDN) o f t h e SM TP s erv er. Th e ro u ter will co n n ect t o t h is s erv er wh en s en d in g e -mails o u t t o t h e co nfig u red ad d res s es . Th e SM TP p o rt an d ret u rn e -mail ad d res ses are req u ired field s t o allo w t h e ro u ter t o p ackage t he lo g s an d s end a v alid e-mail t h at is accep ted b y o ne o f t h e co nfig ured “s end -to ” ad dress es . Up t o t h ree e mail ad d res s es can b e co n fig u red as lo g recip ien t s . In o rd er t o es t ablis h a co n n ectio n wit h t h e co nfig ured SM TP p o rt an d s erv er, d efin e t h e s erv er’s au t h en t icat io n req u iremen t s . Th e ro u t er s u p p o rt s Lo g in Plain (n o en cry p t ion ) o r CRA M -M D5 (en cry p ted) fo r t h e u s ern ame an d p as s wo rd d at a t o b e s en t t o t h e SM TP s erv er. A u th en ticat io n can b e d is ab led if t h e s erv er d o es n o t h av e t h is req u iremen t . In s ome cas es t h e SM TP s erver may s en d o u t IDENT req u es ts, an d t h is ro u t er can h av e t h is res p o n s e o p t io n en ab led as n eed e d . On ce t h e e -mail s erv er an d recip ient d etails are d efin ed y o u can d etermin e wh en t h e ro u t er s h ou ld s end o ut lo g s. E-mail lo g s can b e s ent o u t b ased o n a d efin ed s ch ed u le b y firs t ch o o s in g t h e u n it (i.e. t h e freq u en cy ) o f s en d in g lo g s : Ho u rly , Daily , o r W eekly . Select in g Nev er will d is ab le lo g e -mails b u t will p res erv e t h e e -mail s erv er s et t in g s . 167 Unified Services Router User Manual Figure 116 : E-mail configurat io n as a Re mote Logging option A n ext ern al Sy s lo g s erver is o ft en u sed b y n etwo rk ad min is trato r t o collect an d s tore lo g s fro m t h e ro u t er. Th is remo t e d evice t y pically h as les s memo ry co n s t rain t s t h an t h e lo cal Ev en t Viewer o n t h e ro u t er’s GUI, an d t h u s can co llect a co n s id erab le n u mb er o f lo g s o v er a s u stain ed p eriod . Th is is t y pically v ery u s efu l fo r d eb u g g in g n et wo rk is s u es o r t o mo n it o r ro u t er t raffic o v er a lo n g d u rat io n . Th is ro u t er s up port s u p t o 8 co n cu rren t S y s lo g s erv ers . Each can b e co n fig u red t o receiv e d ifferen t lo g facilit y mes s ag es o f v ary in g s ev er it y. To en able a Sy s lo g s erver s elect t h e ch eckbo x n ext t o an emp t y Sy s lo g s erver field an d assig n t h e IP ad d ress or FQDN t o t h e Name field . Th e s elect ed facilit y an d s ev erit y lev el mes s ag es will b e 168 Unified Services Router User Manual s en t t o t h e co nfig u red (an d en abled) S y s log server o n ce y o u s av e t h is co n fig u rat io n p ag e’s s et t in g s . Figure 117 : Sys log s e rve r configuratio n for Re mote Logging (continue d) 9.4.3 Ev ent Log Viewer in GUI Status > Logs > View All Logs Th e ro u t er GUI let s y o u o b s erv e co n fig u red lo g mes s ag es fro m t h e St at u s men u . W h en ev er t raffic t h ro u g h o r t o t h e ro u t er mat ch es t h e s et t in g s d et ermin ed in t h e Tools > Log Settings > Logs Facility o r Tools > Log Settings > Logs Configuration p ag es , t h e co rres p o n d in g lo g mes s ag e will b e d is p lay ed in t h is win d o w wit h a t imes t amp . It is v ery imp o rt an t t o h av e accu rat e s y s t em t ime (man u ally s et o r fro m a NTP s erv er) in o rd er t o u n d ers t an d lo g mes s ag es . Status > Logs > VPN Logs Th is p ag e d is p lay s IPs ec VPN lo g mes s ag es as d et ermin ed b y t h e co n fig u rat io n s et t in g s fo r facilit y an d s ev erit y . Th is d at a is u s efu l wh en ev alu at in g IPs ec VPN t raffic an d t u n n el h ealt h . 169 Unified Services Router User Manual Figure 118 : VPN logs dis playe d in GUI e ve nt vie we r 9.5 Backing up and Restoring Configuration Settings Tools > System Yo u can b ack u p t h e ro u t er’s cu s t o m co n fig u rat io n s et t in g s t o res t o re t h em t o a d ifferen t d ev ice o r t h e s ame ro u t er aft er s o me o t h er ch an g es . Du rin g b acku p , y o u r s et t in gs are s aved as a file o n y o u r h o st. Yo u can res t o re t h e ro u t er's s av ed s et t in g s fro m t h is file as well. Th is p ag e will als o allo w y o u rev ert t o facto ry d efau lt s et t in g s o r execu t e a s o ft reb o o t o f t h e ro u t er. IMPORTANT! Du rin g a res t o re o p erat io n , d o NOT t ry t o g o o n lin e, t u rn o ff t h e ro u t er, s h ut d o wn t h e PC, o r d o an y t h in g els e t o t h e ro u t er u n t il t h e o p erat io n is co mp let e. Th is will t ake ap p ro ximat ely 1 min u t e . On ce t h e LEDs are t u rn ed o ff, wait a few mo re s eco n d s b efo re d o in g an y t h in g wit h t h e ro u t er. Fo r b ackin g u p co nfig u rat io n o r res t o rin g a p rev io u s ly s av ed co n fig u rat io n , p leas e fo llo w t h e s t ep s b elo w: 1. To save a copy of your current settings, click the Backup button in the Save Current Settings option. The browser initiates an export of the configuration file and prompts to save the file on your host. 170 Unified Services Router User Manual 2. To restore your saved settings from a backup file, click Browse then locate the file on the host. After clicking Restore, the router begins importing the file’s saved configuration settings. After the restore, the router reboots automatically with the restored settings. 3. To erase your current settings and revert to factory default settings, click the Default button. The router will then restore configuration settings to factory defaults and will reboot automatically. (See Appendix B for the factory default parameters for the router). Figure 119 : Re s toring configuratio n from a s ave d file will re s ult in the curre nt configurat io n be ing ove rwritte n and a re boot 9.6 Upgrading Router Firmware Tools > Firmware Yo u can u p g rad e t o a n ewer s o ft ware v ers io n fro m t h e A d min is t rat io n web p ag e. In t h e Firmware Up g rad e s ect io n , t o u p g rad e y o u r firmware, click Bro ws e , lo cat e an d s elect t h e firmware imag e o n y o u r h o s t , an d click Up g rad e . A ft er t h e n ew firmware imag e is v alid at ed , t h e n ew imag e is writ t en t o flas h , an d t h e ro u t er is au t o mat ically reb o o t ed wit h t h e n ew firmware. Th e Firmware In fo rmat io n an d als o t h e Status > Device Info > Device Status p ag e will reflect t h e n ew firmware v ers io n . IMPORTANT! Du rin g firmware u p g rad e, d o NOT t ry t o g o o n lin e, t u rn o ff t h e DSR, s h u t d o wn t h e PC, o r in t erru p t t h e p ro ce s s in an y way u n t il t h e o p erat io n is co mp let e. Th is s h o u ld t ake o n ly a min u t e o r s o in clu d in g t h e reb o o t p ro ces s . In t erru p t ing t he u p grade p rocess at s pecific p o in t s wh en t h e flas h is b ein g writ t en t o may co rru p t t h e flas h memo ry an d ren d er t h e ro ut er u n usa ble wit h o ut a lo w-lev el p ro ces s o f res t o rin g t h e flas h firmware (n o t t h ro u g h t h e web GUI). 171 Unified Services Router User Manual Figure 120 : Firmware ve rs ion inform atio n and upgrade option Th is ro u t er als o s u ppo rts an au to mat ed n o t ificat io n t o d et ermin e if a n ewer f irmware v ers io n is av ailab le fo r t h is ro u t er. By clickin g t h e Ch eck No w b u t t o n in t h e n o t ificat io n sectio n, t h e ro u t er will ch eck a D -Lin k s erv er t o s ee if a n ewer firmware v ers io n fo r t h is ro u t er is av ailab le fo r d o wn lo ad an d u p d at e t h e St at u s field b elo w . IMPORTANT! A ft er firmware 1.04B13, n ew u s er d at ab as e arch it ect u re is in t ro d u ced . Th e n ew u s er d at ab as e is eas ier t o s et u p an d mo re in t u it iv ely t o u s e. W h en u s ers u p g rad e DSR’s firmware t o 1.04B13 o r lat t er, DSR will au t o mat ically merg e u s ers in t h e o ld d at ab ase in t o t h e n ew o n e. Ho wev er, all u s er d at ab as es will b e s wep t away wh en u sers d own grade firmware fro m 1.04B13 t o t h e o ld er o n e, e.g . 1.03B43. Pleas e keep in min d : b acku p y o u r u ser d atabase fo r fu rt h er rest orin g o n ce y o u d ecid e t o d o wn g rad e firmware t o t h e o ld er o n e. 9.7 Upgrading Router Firmware via USB Tools > Firmware via USB Th is p ag e allo ws u ser t o u pg rad e t h e firmware, b acku p an d rest ore t he s et tin gs u sing a USB s t o rag e key . 172 Unified Services Router User Manual Figure 121 : Firmware upgrade and configurat io n re s tore /back up via USB 9.8 Dynamic DNS Setup Tools > Dynamic DNS Dy n amic DNS (DDNS) is an In t ern et s ervice t h at allo ws ro u t ers wit h v ary in g p u b lic IP ad d res s es t o b e lo cat ed u s in g In t ern et d o main n ames . To u s e DDNS, y o u mu s t s et u p an acco u n t wit h a DDNS p ro v id er s u ch as Dy n DNS.o rg , D-Lin k DDNS, o r Oray .n et . Each co n fig u red W A N can h av e a d ifferen t DDNS s erv ice if req u ired . On ce co n fig u red, t h e ro u ter will u p d at e DDNS s erv ices ch an ges in t h e W A N IP ad d res s s o t h at feat u res t h at are d ep en d en t o n acces s in g t h e ro u t er’s W A N v ia FQDN will b e d irect ed t o t h e co rrect IP ad d ress. W hen y o u s et u p an acco u n t wit h a DDNS s erv ice, t h e h o s t an d d o main n ame, u s ername, p asswo rd an d wild card s u ppo rt will b e p ro v id ed b y t h e acco u n t p ro v id er. 173 Unified Services Router User Manual Figure 122 : Dynamic DNS configurat ion 9.9 Using Diagnostic Tools Tools > System Check Th e ro u t er h as b u ilt in t o o ls t o allo w an ad min is t rator t o ev alu at e t h e co mmu n icat io n s t at u s an d o v erall n et wo rk h ealt h . 174 Unified Services Router User Manual Figure 123 : Route r diagnos tics tools availab le in the GUI 9.9.1 Ping Th is u t ilit y can b e u s ed t o t est co n nect ivit y b et ween t h is ro u t er an d an o t h er d ev ice o n t h e n et wo rk co n n ect ed t o t h is ro u t er. En t er an IP ad d res s an d click PING. Th e co mman d o u t p u t will a p p ear in d icat in g t h e ICM P ech o req u es t s t at u s . 9.9.2 Trace Route Th is u t ilit y will d is p lay all t h e ro u t ers p res en t b et ween t h e d es t in at io n IP ad d res s an d t h is ro u ter. Up t o 30 “h o p s ” (in t ermed iate ro u t ers ) b et ween t h is ro u t er an d t h e d es t in at io n will b e d is p lay ed . 175 Unified Services Router User Manual Figure 124 : Sample trace route output 9.9.3 DNS Lookup To ret riev e t h e IP ad d ress o f a W eb , FTP, M ail o r an y o t h er s erv er o n t h e In t ern et , t y p e t h e In t ern et Name in t h e t ext b o x an d click Lo o ku p . If t h e h o s t o r d o main en t ry exis t s , y o u will s ee a res p o n s e wit h t h e IP ad d res s . A mes s ag e s t at in g “Un kn o wn Ho s t ” in d icat es t h at t h e s p ecified In t ern et Name d o es n o t exis t . Th is feat u re as s u mes t h ere is in t ern et acces s av ailab le o n t h e W A N lin k(s ) . 9.9.4 Router Options Th e s t at ic an d d y namic ro u t es co n fig u red o n t h i s ro u t er can b e s h o wn b y clickin g Dis p lay fo r t h e co rres po n d in g ro u t in g t ab le. Clickin g t h e Packet Trace b u t t o n will allo w t h e ro u t er t o cap t u re an d d is p lay t raffic t h ro u g h t h e DSR b et ween t h e LA N an d W A N in t erface as well. Th is in fo rmat io n is o ft en v ery u s efu l in d eb u g g in g t raffic an d ro u t in g is s u es . 176 Unified Services Router User Manual 9.10 Localization Tools > Set Language Th e ro u t er h as b u ilt in t o o ls t o allo w ch an g e t h e d efau lt lan g u ag e (En g lis h ) t o fo u r d ifferen t lan g u ag es . (Fren ch , Deu t s ch e , Sp an is h an d It alian ) Figure 125 : Localizatio n 177 Unified Services Router User Manual Chapter 10. Router Status and Statistics 10.1 System Overview Th e St at u s p ag e allo ws y o u t o g et a d et ailed o v erv iew o f t h e s y s t em co n fig u rat io n . Th e s et t in g s fo r t h e wired an d wireles s in t erfaces are d is p lay ed in t h e DSR St at u s p ag e, an d t h en t h e res u lt in g h ard ware res o u rce an d ro u t er u s ag e d et ails are s u mmarized o n t h e ro u t er’s Das h b o ard . 10.1.1 Dev ice Status Status > Device Info > Device Status Th e DSR St at u s p ag e g iv es a s u mmary o f t h e ro u t er co n fig u rat io n s et t in g s co n fig u re d in t h e Set u p an d A d vanced men u s. Th e s tatic h ardware s erial n u mb er and cu rren t firmware v ers io n are p resen t ed in t h e Gen eral s ect io n . Th e W A N an d LA N in t erface in fo rmat io n s h o wn o n t h is p ag e are b as ed o n t h e ad min is t rat o r co n fig u ratio n p aramet ers. Th e ra d io b and an d ch annel s ett in g s are p res en t ed b elo w alo n g wit h all co n fig u red an d act iv e A Ps t h at are en ab led o n t h is ro u t er. 178 Unified Services Router User Manual Figure 126 : De vice Status dis play 179 Unified Services Router User Manual Figure 127 : De vice Status dis play (continue d) 10.1.2 Resource Utilization Status > Device Info > Dashboard Th e Das h b oard p ag e p resents h ard ware an d u sag e s t at is t ics . Th e CPU an d M emo ry u t ilizat io n is a fu n ct io n o f t h e av ailab le h ard ware an d cu rren t co n fig u rat io n an d t raffic t h ro u g h t h e ro u t er. In t erface s t at is t ics fo r t h e wired co n n ect io n s (LA N, W A N1, W A N2/ DM Z, VLA Ns ) p ro v id e in d icat io n o f p acket s t h ro u g h an d p acket s d ro p p ed b y t h e in t erface. Click refres h t o h av e t h is p ag e ret riev e t h e mo s t cu rren t s t at is t ics . 180 Unified Services Router User Manual Figure 128 : Re s ource Utilizatio n s tatis tics 181 Unified Services Router User Manual Figure 129 : Re s ource Utilizatio n data (continue d) 182 Unified Services Router User Manual Figure 130 : Re s ource Utilizatio n data (continue d) 10.2 Traffic Statistics 10.2.1 W ired Port Statistics Status > Traffic Monitor > Device Statistics Det ailed t ran s mit an d receiv e s t at is t ics fo r each p h y s ical p o rt are p res en t ed h ere. Each in t erface (W A N1, W A N2/ DM Z, LA N, an d VLA Ns ) h av e p o rt s p ecific p acket lev el in fo rmat io n p ro v id ed fo r rev iew. Tran s mit t ed/receiv ed p acket s, p ort co llis ions, an d t h e cu mu lat in g b y tes/sec fo r t ran s mit / receiv e d irect io n s are p ro v id ed fo r each in t erface alo n g wit h t h e p o rt u p t ime. If y o u s u s p ect is s u es wit h an y o f t h e wired p o rt s , t h is t ab le will h elp d iag n o s e u p t ime o r t ran s mit lev el is s u es wit h t h e p o rt . Th e s t at ist ics t ab le h as au t o-refresh co ntro l wh ich allo ws d is play o f t h e mo s t cu rrent p o rt lev el d at a at each p ag e refres h . Th e d efau lt au t o -refres h fo r t h is p ag e is 10 s eco n d s . 183 Unified Services Router User Manual Figure 131 : Phys ical port s tatis tics 10.2.2 W ireless Statistics Status > Traffic Monitor > Wireless Statistics Th e W ireles s St at is t ics t ab d is p lay s t h e in cremen t in g t raffic s t at is t ics fo r each en ab led access p o in t . Th is p ag e will g iv e a s n ap s h o t o f h o w mu ch t raffic is b ein g t ran s mit t ed o v er each wireles s lin k. If y o u s u s p ect t h at a rad io o r VA P may b e d o wn , t h e d et ails o n t h is p ag e wo u ld co n firm if t raffic is b ein g s en t an d receiv ed t h ro u g h t h e VA P. Th e clien t s co nn ected t o a p art icular A P can b e v iewed b y u s in g t h e S t at u s Bu t t o n o n t h e lis t o f A Ps in t h e Setup > Wireless > Access Points p age. Traffic s t atis tics are s h o wn fo r t h at in d ivid ual A P, as co mp ared t o t h e s ummary s t at s fo r each A P o n t h is St at is t ics p ag e . Th e p o ll in t erv al (t h e refres h rat e fo r t h e s t at is t ics ) can b e mo d ified t o v iew mo re freq u en t t raffic an d co llis io n s t at is t ics . 184 Unified Services Router User Manual Figure 132 : AP s pe cific s tatis tics 10.3 Active Connections 10.3.1 Sessions through the Router Status > Active Sessions Th is t ab le lis t s t h e act iv e in t ern et s es s io n s t h ro u g h t h e ro u t er’s firewall. Th e s es s io n ’s p ro t o co l, s t at e , lo cal an d remo t e IP ad d res s es are s h o wn . 185 Unified Services Router User Manual Figure 133 : Lis t of curre nt Active Fire wall Se s s ions 186 Unified Services Router User Manual 10.3.2 W ireless Clients Status > Wireless Clients Th e clien t s co n n ect ed t o a p art icu lar A P can b e v iewed o n t h is p ag e. Co n n ect ed clien t s are s o rted b y t h e M A C ad d ress an d in d icat e t h e securit y p aramet ers u s ed b y t h e wireles s lin k, as well as t h e t ime co n n ect ed t o t h e co rres p o n d in g A P. Th e s t at ist ics t ab le h as au t o-refresh co ntro l wh ich allo ws d is pla y o f t h e mo s t cu rrent p o rt lev el d at a at each p ag e refres h . Th e d efau lt au t o -refres h fo r t h is p ag e is 10 s eco n d s . Figure 134 : Lis t of conne cte d 802.11 clie nts pe r AP 10.3.3 LAN Clients Status > LAN Clients Th e LA N clien t s t o t h e ro u t er are id en t ified b y a n A RP s can t h ro u g h t h e LA N s wit ch . Th e Net Bio s n ame (if av ailab le), IP ad d ress an d M AC ad d ress o f d is co vered LA N h o s t s are d is p lay ed . 187 Unified Services Router User Manual Figure 135 : Lis t of LAN hos ts 10.3.4 Activ e VPN Tunnels Status > Active VPNs Yo u can v iew an d ch an g e t h e s t at us (co nn ect o r d ro p ) o f t h e ro ut er’s IPs ec s ecu rit y as s o ciat ions. Here , t h e act iv e IPs ec SA s (s ecurit y as sociatio ns) are lis t ed alo n g wit h t h e t raffic d et ails an d t u n n el s t at e. Th e t raffic is a cu mu lat iv e meas u re o f t ran s mit t ed / receiv ed p acket s s in ce t h e t u n n el was es t ab lis h ed . If a VPN p o licy s t at e is “ IPs ec SA No t Es t ab lis h ed ”, it can b e en ab led b y clickin g t h e Co n n ect b u tt on o f t h e co rrespo ndin g p o licy . Th e A ct ive IPs ec SA s t ab le d isp lays a lis t o f act iv e IPs ec SA s . Ta b le field s are as fo llo ws . Fie ld De s cription Policy Name IKE or VPN policy associated with this SA. Endpoint IP address of the remote VPN gatew ay or client. Tx (KB) Kilobytes of data transmitted over this SA. Tx (Packets) Number of IP packets transmitted over this SA. State Status of the SA for IKE policies: Not Connected or IPsec SA Established. 188 Unified Services Router User Manual Figure 136 : Lis t of curre nt Active VPN Se s s ions A ll act iv e SSL VPN co n n ect ion s, b ot h fo r VPN t u n n el an d VPN Po rt fo rward in g , are d is p lay ed o n t h is p ag e as well. Tab le field s are as fo llo ws . Fie ld De s cription User Name The SSL VPN user that has an active tunnel or port forwarding session to this router. IP Address IP address of the remote VPN client. Local PPP Interface The interface (WAN1 or WAN2) through w hich the session is active. Peer PPP Interface IP The assigned IP address of the virtual netw ork adapter. Connect Status Status of the SSL connection betw een this router and the remote VPN client: Not Connected or Connected. 189 Unified Services Router User Manual Chapter 11. Trouble Shooting 11.1 Internet connection S ymptom: Yo u can n o t access t h e ro ut er’s web -co n fig u rat io n in t erface fro m a PC o n y o u r LA N. Recommended acti on: 1. Check the Ethernet connection between the PC and the router. 2. Ensure that your PC’s IP address is on the same subnet as the router. If you are using the recommended addressing scheme, your PC’s address should be in the range 192.168.1 0.2 to 192.168.10.254. 3. Check your PC’s IP address. If the PC cannot reach a DHCP server, some versions of Windows and Mac OS generate and assign an IP address. These auto-generated addresses are in the range 169.254.x.x. If your IP address is in this range, check the connection from the PC to the firewall and reboot your PC. 4. If your router’s IP address has changed and you don’t know what it is, reset the router configuration to factory defaults (this sets the firewall’s IP address to 192.168.10.1). 5. If you do not want to reset to factory default settings and lose your configuration, reboot the router and use a packet sniffer (such as Ethereal™) to capture packets sent during the reboot. Look at the Address Resolution Protocol (ARP) packets to locate the router’s LAN interface address. 6. Launch your browser and ensure that Java, JavaScript, or ActiveX is enabled. If you are using Internet Explorer, click Refresh to ensure that the Java applet is loaded. Close the browser and launch it again. 7. Ensure that you are using the correct login information. The factory default login name is admin and the password is password. Ensure that CAPS LOCK is off when entering this information. S ymptom: Ro u t er d o es n o t s av e co n fig u rat io n ch an g es . Recommended acti on: 1. When entering configuration settings, click Apply before moving to another menu or tab; otherwise your changes are lost. 2. Click Refresh or Reload in the browser. Your changes may have been made, but the browser may be caching the old configuration. 190 Unified Services Router User Manual S ymptom: Ro u t er can n o t acces s t h e In t ern et . Pos s i bl e caus e: If y o u u se d y namic IP ad d resses, y ou r ro u ter may n o t h ave req ues t ed an IP ad d res s fro m t h e ISP. Recommended acti on: 1. Launch your browser and go to an external site such as www.google.com. 2. Access the firewall’s configuration main menu at http://192.168.10.1. 3. Select Monitoring > Router Status . 4. Ensure that an IP address is shown for the WAN port. If 0.0.0.0 is shown, your firewall has not obtained an IP address from your ISP. See the next symptom. S ymptom: Ro u t er can n o t o b t ain an IP ad d res s fro m t h e ISP. Recommended acti on: 1. Turn off power to the cable or DSL modem. 2. Turn off the router. 3. Wait 5 minutes, and then reapply power to the cable or DSL modem. 4. When the modem LEDs indicate that it has resynchronized with the ISP, reapply power to the router. If the router still cannot obtain an ISP address, see the next symptom. S ymptom: Ro u t er s t ill can n o t o b t ain an IP ad d res s fro m t h e ISP. Recommended acti on: 1. Ask your ISP if it requires a login program — PPP over Ethernet (PPPoE) or some other type of login. 2. If yes, verify that your configured login name and password are correct. 3. Ask your ISP if it checks for your PC's hostname. 4. If yes, select Network Configuration > WAN Settings > Ethernet ISP Settings and set the account name to the PC hostname of your ISP account. 5. Ask your ISP if it allows only one Ethernet MAC address to connect to the Internet, and therefore checks for your PC’s MAC address. 6. If yes, inform your ISP that you have bought a new network device, and ask them to use the firewall’s MAC address. 7. Alternatively, select Network Configuration > WAN Settings > Ethernet ISP Settings and configure your router to spoof your PC’s MAC address. 191 Unified Services Router User Manual S ymptom: Ro u t er can o b tain an IP ad d ress, b ut PC is u n ab le t o lo ad In t ern et p ag es . Recommended acti on: 1. Ask your ISP for the addresses of its designated Domain Name System (DNS) servers. Configure your PC to recognize those addresses. For details, see your operating system documentation. 2. On your PC, configure the router to be its TCP/IP gateway. 11.2 Date and time S ymptom: Dat e s h o wn is Jan u ary 1, 1970. Pos s i bl e caus e: Th e ro u t er h as n o t y et s u cces s fu lly reach ed a n et wo rk t ime s erv er (NTS). Recommended acti on: 1. If you have just configured the router, wait at least 5 minutes, select Administration > Time Zone , and recheck the date and time. 2. Verify your Internet access settings. S ymptom: Time is o ff b y o n e h o u r. Pos s i bl e caus e : Th e ro ut er d o es n ot au tomat ically ad ju s t fo r Day lig h t Sav in g s Time. Recommended acti on: 1. Select Administration > Time Zone and view the current date and time settings. 2. Click to check or uncheck “Automatically adjust for Daylight Savings Time”, then click Apply. 11.3 Pinging to Test LAN Connectivity M o s t TCP/ IP t ermin al d ev ices an d firewalls co n tain a p in g u t ilit y t h at s end s an ICM P ech o -req uest p acket t o t he d esign at ed d evice. Th e DSR res p o n d s wit h an ech o rep ly . Tro u b les hoo tin g a TCP/ IP n et wo rk is mad e v ery eas y b y u s ing t he p in g u t ilit y in y o u r PC o r wo rks t at io n . 11.3.1 Testing the LAN path from your PC to your router 1. From the PC’s Windows toolbar, select Start > Run. 2. Type ping <IP_address> where <IP_address> is the router’s IP address. Example: ping 192.168.10.1. 3. Click OK. 192 Unified Services Router User Manual 4. Observe the display: If t h e p at h is wo rkin g , y o u s ee t h is mes s ag e s eq u en ce: Pin g in g <IP ad d res s > wit h 32 b y t es o f d at a Rep ly fro m <IP ad d res s >: b y t es =32 t ime=NN ms TTL=xxx If t h e p at h is n o t wo rkin g , y o u s ee t h is mes s ag e s eq u en ce: Pin g in g <IP ad d res s > wit h 32 b y t es o f d at a Req u es t t imed o u t 5. If the path is not working, Test the physical connections between PC and router If t h e LA N p o rt LED is o ff, g o t o t h e “LED d is p lay s” s ectio n o n p age B 1 an d fo llo w in s t ru ct io n s fo r “LA N o r In t ern et p o rt LEDs are n o t lit .” Verify t h at t h e co rres p o n d in g lin k LEDs are lit fo r y o u r n et wo rk in t erface card an d fo r an y h u b p o r t s t h at are co n n ect ed t o y o u r wo rks t at io n an d firewall. 6. If the path is still not up, test the network configuration: Verify t h at t h e Et h ern et card d riv er s o ft ware an d TCP/ IP s o ft ware are in s t alled an d co n fig u red o n t h e PC. Verify t h at t h e IP ad d res s fo r t h e ro u t er an d PC are co rrect an d o n t h e s ame s u b n et . 11.3.2 Testing the LAN path from your PC to a remote dev ice 1. From the PC’s Windows toolbar, select Start > Run. 2. Type ping -n 10 <IP_address> where -n 10 specifies a maximu m of 10 tries and <IP address> is the IP address of a remote device such as your ISP’s DNS server. Example: ping -n 10 10.1.1.1. 3. Click OK and then observe the display (see the previous procedure). 4. If the path is not working, do the following: Ch eck t h at t h e PC h as t h e IP ad d res s o f y o u r firewall lis t ed as t h e d efau lt g at eway . (If t h e IP co n fig u rat io n o f y o u r PC is as s ig n ed b y DHCP, t h is in fo rmat io n is n o t v is ib le in y o u r PC’s Net wo rk Co n t ro l Pan el.) 193 Unified Services Router User Manual Verify t h at t h e n etwo rk (s ub net) ad dress o f y o ur PC is d ifferen t fro m t he n et wo rk ad d res s o f t h e re mo t e d ev ice. Verify t h at t h e cab le o r DSL mo d em is co n n ect ed an d fu n ct io n in g . A s k y o u r ISP if it as s ig n ed a h o s t n ame t o y o u r PC. If y es , s elect Network Configuration > WAN Settings > Ethernet ISP Settings an d en t er t h at h o s t n ame as t h e ISP acco u n t n ame. A s k y o u r ISP if it reject s t h e Et h ernet M A C ad d res s es o f all b u t o n e o f y o u r PCs . M an y b ro adb an d ISPs res trict acces s b y allo win g t raffic fro m t h e M A C ad d res s o f o n ly y o u r b ro adb and mo d em; b u t so me ISPs ad d it ion ally res trict access t o t h e M A C ad d res s o f ju s t a s in g le PC co n n ect ed t o t h at mo d em. If t h is is t h e cas e, co n fig u re y o u r firewall t o clo n e o r s p o o f t h e M A C ad d res s fro m t h e au t h o rized PC. 11.4 Restoring factory-default configuration settings To res t o re fact o ry -d efau lt co n fig u rat io n s et t in g s , d o eit h er o f t h e fo llo win g : 1. Do you know the account password and IP address? If y es , s elect Administration > Settings Backup & Upgrade an d click d efau lt . If n o , d o t h e fo llo win g : On t h e rear p an el o f t h e ro u ter, p ress an d h o ld t h e Res et b u t t o n ab o u t 10 s eco n d s , u n t il t h e t es t LED lig h t s an d t h en b lin ks . Releas e t h e b u t t o n an d wait fo r t h e ro u t er t o reb o o t . 2. If the router does not restart automatically; manually restart it to make the default settings effective. 3. After a restore to factory defaults —whether initiated from the configuration interface or the Reset button — the following settings apply: LA N IP ad d res s : 192.168.10.1 Us ern ame: ad min Pas s wo rd : ad min DHCP s erv er o n LA N: en ab led W A N p o rt co n fig u rat io n : Get co n fig u rat io n v ia DHCP 194 Chapter 12. Credits M icro s o ft , W in d o ws are reg is t ered t rad emarks o f M icro s o ft Co rp . Lin u x is a reg is t ered t rad emark o f Lin u s To rv ald s . UNIX is a reg is t ered t rad emark o f Th e Op en Gro u p . Unified Services Router User Manual Appendix A. Glossary ARP Address Resolution Protocol. Broadcast protocol for mapping IP addresses to MAC address es. CHAP Challenge-Handshake Authentication Protocol. Protocol for authenticating users to an ISP. DDNS Dynamic DNS. System for updating domain names in real time. Allow s a domain name to be assigned to a device w ith a dynamic IP address. DHCP Dynamic Host Configuration Protocol. Protocol for allocating IP addresses dynamically so that addresses can be reused w hen hosts no longer need them. DNS Domain Name System. Mechanism for translating H.323 IDs, URLs, or e-mail IDs into IP addresses. Also used to assist in locating remote gatekeepers and to map IP addresses to hostnames of administrative domains. FQDN Fully qualified domain name. Complete domain name, including the host portion. Example: serverA.companyA.com. FTP File Transfer Protocol. Protocol for transferring files between network nodes. HTTP Hypertext Transfer Protocol. Protocol used by w eb browsers and web servers to transfer files. IKE Internet Key Exchange. Mode for securely exchanging encryption keys in ISAKMP as part of building a VPN tunnel. IPsec IP security. Suite of protocols for securing VPN tunnels by authenticating or encrypting IP packets in a data stream. IPsec operates in either transport mode (encrypts payload but not packet headers) or tunnel mode (encrypts both payload and packet headers). ISAKMP Internet Key Exchange Security Protocol. Protocol for establishing security associations and cryptographic keys on the Internet. ISP Internet service provider. MAC Address Media-access-control address. Unique physical-address identifier attached to a netw ork adapter. MTU Maximum transmission unit. Size, in bytes, of the largest packet that can be passed on. The MTU for Ethernet is a 1500-byte packet. NAT Netw ork Address Translation. Process of rewriting IP addresses as a packet passes through a router or firew all. NAT enables multiple hosts on a LAN to access the Internet using the single public IP address of the LAN’s gatew ay router. NetBIOS Microsoft Window s protocol for file sharing, printer sharing, messaging, authentication, and name resolution. NTP Netw ork Time Protocol. Protocol for synchronizing a router to a single clock on the netw ork, know n as the clock master. PAP Passw ord Authentication Protocol. Protocol for authenticating users to a remote access server or ISP. 196 Unified Services Router User Manual PPPoE Point-to-Point Protocol over Ethernet. Protocol for connecting a netw ork of hosts to an ISP w ithout the ISP having to manage the allocation of IP addresses. PPTP Point-to-Point Tunneling Protocol. Protocol for creation of VPNs for the secure transfer of data from remote clients to private servers over the Internet. RADIUS Remote Authentication Dial-In User Service. Protocol for remote user authentication and accounting. Provides centralized management of usernames and passw ords. RSA Rivest-Shamir-Adleman. Public key encryption algorithm. TCP Transmission Control Protocol. Protocol for transmitting data over the Internet w ith guaranteed reliability and in-order delivery. UDP User Data Protocol. Protocol for transmitting data over the Internet quickly but w ith no guarantee of reliability or in-order delivery. VPN Virtual private netw ork. Netw ork that enables IP traffic to travel securely over a public TCP/IP netw ork by encrypting all traffic from one netw ork to another. Uses tunneling to encrypt all information at the IP level. WINS Window s Internet Name Service. Service for name resolution. Allow s clients on different IP subnets to dynamically resolve addresses, register themselves, and browse the network without sending broadcasts. XAUTH IKE Extended Authentication. Method, based on the IKE protocol, for authenticating not just devices (which IKE authenticates) but also users. User authentication is performed after device authentication and before IPsec negotiation. 197 Appendix B. Factory Default Settings Fe at u re Device login Internet Connection Local area network (LAN) Firew all De s cription De f au lt Setting User login URL http://192.168.10.1 User name (case sensitive) admin Login password (case sensitive) admin WAN MAC address Use default address WAN MTU size 1500 Port speed Autosense IP address 192.168.10.1 IPv4 subnet mask 255.255.255.0 RIP direction None RIP version Disabled RIP authentication Disabled DHCP server Enabled DHCP starting IP address 192.168.10.2 DHCP ending IP address 192.168.10.100 Time zone GMT Time zone adjusted for Daylight Saving Time Disabled SNMP Disabled Remote management Disabled Inbound communications from the Internet Disabled (except traffic on port 80, the HTTP port) Outbound communications to the Internet Enabled (all) Source MAC filtering Disabled Stealth mode Enabled Unified Services Router User Manual Appendix C. Standard Services Available for Port Forwarding & Firewall Configuration A NY ICM P-TYPE-8 RLOGIN A IM ICM P-TYPE-9 RTELNET BGP ICM P-TYPE-10 RTSP:TCP BOOTP_ CLIENT ICM P-TYPE-11 RTSP:UDP BOOTP_ SERVER ICM P-TYPE-13 SFTP CU-SEEM E:UDP ICQ SM TP CU-SEEM E:TCP IM A P2 SNM P:TCP DNS:UDP IM A P3 SNM P:UDP DNS:TCP IRC SNM P-TRA PS:TCP FINGER NEW S SNM P-TRA PS:UDP FTP NFS SQL-NET HTTP NNTP SSH:TCP HTTPS PING SSH:UDP ICM P-TYPE-3 POP3 STRM W ORKS ICM P-TYPE-4 PPTP TA CA CS ICM P-TYPE-5 RCM D TELNET ICM P-TYPE-6 REA L-A UDIO TFTP ICM P-TYPE-7 REXEC VDOLIVE 200 Unified Services Router User Manual Appendix D. Log Output Reference Facility: System (Networking) Log Message DBUpdate event: Table: %s opCode:%d rowId:%d Severity Severity DEBUG DEBUG DEBUG Log Message BridgeConfig: too few arguments to command %s BridgeConfig: too few arguments to command %s sqlite3QueryResGet failed.Query:%s ddnsDisable failed networkIntable.txt not found sqlite3QueryResGet failed Interface is already deleted in bridge removing %s from bridge %s... %s adding %s to bridge %s... %s DEBUG DEBUG sqlite3QueryResGet failed.Query:%s sqlite3QueryResGet failed.Query:%s ERROR ERROR stopping bridge... stopping bridge... stopping bridge... %s:DBUpdate event: Table: %s opCode:%d rowId:%d Wan is not up %s:DBUpdate event: Table: %s opCode:%d rowId:%d doDNS:failed DEBUG DEBUG DEBUG ddnsDisable failed failed to call ddns enable ddnsDisable failed ERROR ERROR ERROR DEBUG DEBUG sqlite3QueryResGet failed.Query:%s Error in executing DB update handler ERROR ERROR DEBUG DEBUG sqlite3QueryResGet failed.Query:%s Illegal invocation of ddnsView (%s) ERROR ERROR doDNS:failed doDNS:Result = FAILED doDNS:Result SUCCESS Write Old Entry: %s %s %s: to %s DEBUG DEBUG DEBUG DEBUG sqlite3QueryResGet failed.Query:%s sqlite3QueryResGet failed.Query:%s ddns: SQL error: %s Illegal operation interface got deleted ERROR ERROR ERROR ERROR Write New Entry: %s %s #%s : to %s Write Old Entry: %s %s %s: to %s DEBUG DEBUG sqlite3QueryResGet failed.Query:%s sqlite3QueryResGet failed.Query:%s ERROR ERROR Write New Entry: %s %s #%s : to %s ifStaticMgmtDBUpdateHandler: returning with " nimfLinkStatusGet: buffer: \ nimfLinkStatusGetErr: returning with status: %d nimfAdvOptSetWrap: current Mac Option: %d nimfAdvOptSetWrap: current Port Speed Option: %d nimfAdvOptSetWrap: current Mtu Option: %d nimfAdvOptSetWrap: looks like we are reconnecting. " DEBUG sqlite3QueryResGet failed.Query:%s ERROR DEBUG DEBUG ddnsDisable failed ddns: SQL error: %s ERROR ERROR DEBUG Failed to call ddns enable ERROR DEBUG ddns: SQL error: %s ERROR DEBUG sqlite3QueryResGet failed.Query:%s ERROR DEBUG Failed to call ddns enable ERROR DEBUG ddns: SQL error: %s ERROR nimfAdvOptSetWrap: Mtu Size: %d nimfAdvOptSetWrap: NIMF table is %s nimfAdvOptSetWrap:WAN_MODE TRIGGER nimfAdvOptSetWrap: MTU: %d DEBUG DEBUG ddnsDisable failed ddns: SQL error: %s ERROR ERROR DEBUG DEBUG sqlite3QueryResGet failed.Query:%s Failed to call ddns enable ERROR ERROR nimfAdvOptSetWrap: MacAddress: %s nimfAdvOptSetWrap: old Mtu Flag: %d DEBUG DEBUG ddns: SQL error: %s ddnsDisable failed ERROR ERROR DEBUG 201 ERROR ERROR ERROR ERROR Unified Services Router nimfAdvOptSetWrap: user has changed MTU option nimfAdvOptSetWrap: MTU: %d nimfAdvOptSetWrap: old MTU size: %d nimfAdvOptSetWrap: old Port Speed Option: %d nimfAdvOptSetWrap: old Mac Address Option: %d nimfAdvOptSetWrap: MacAddress: %s Setting LED [%d]:[%d] For %s User Manual DEBUG DEBUG DEBUG ddns: SQL error: %s sqlite3QueryResGet failed.Query:%s sqlite3QueryResGet failed.Query:%s ERROR ERROR ERROR DEBUG ddnsDisable failed ERROR DEBUG DEBUG DEBUG ddns: SQL error: %s sqlite3QueryResGet failed.Query:%s sqlite3QueryResGet failed.Query:%s ERROR ERROR ERROR l2tpEnable: command string: %s nimfAdvOptSetWrap: handling reboot scenario DEBUG ddnsDisable failed ERROR DEBUG failed to call ddns enable ERROR nimfAdvOptSetWrap: INDICATOR = %d nimfAdvOptSetWrap: UpdateFlag: %d nimfAdvOptSetWrap: returning with status: %s nimfGetUpdateMacFlag: MacTable Flag is: %d DEBUG DEBUG ddns: SQL error: %s ddnsDisable failed ERROR ERROR DEBUG sqlite3QueryResGet failed.Query:%s ERROR DEBUG ERROR nimfMacGet: Mac Option changed DEBUG nimfMacGet: Update Flag: %d nimfMacGet: MacAddress: %s DEBUG DEBUG Error in executing DB update handler Failed to open the resolv.conf file. Exiting./n Could not write to the resolv.conf file. Exiting. Error opening the lanUptime File nimfMacGet: MacAddress: %s nimfMacGet: MacAddress: %s DEBUG DEBUG Error Opening the lanUptime File. failed to open %s ERROR ERROR nimfMacGet: MacAddress: %s nimfMacGet: MacAddress: %s nimfMacGet:Mac option Not changed \ nimfMacGet: MacAddress: %s DEBUG DEBUG DEBUG DEBUG failed to open %s failed to query networkInterface table failed to query networkInterface table sqlite3QueryResGet failed.Query:%s ERROR ERROR ERROR ERROR nimfMacGet: MacAddress: %s nimfMacGet: MacAddress: %s DEBUG DEBUG failed to enable IPv6 forwarding failed to set capabilities on the " ERROR ERROR nimfMacGet: returning with status: %s Now in enableing LanBridge function sucessfully executed the command %s Now in disableing LanBridge function DEBUG DEBUG DEBUG DEBUG failed to enable IPv6 forwarding failed to set capabilities on the " failed to disable IPv6 forwarding failed to set capabilities on the " ERROR ERROR ERROR ERROR sucessfully executed the command %s configPortTblHandler:Now we are in Sqlite Update " The Old Configuration of ConfiPort was:%s The New Configuration of ConfiPort was:%s The user has deselected the configurable port DEBUG failed to open %s ERROR DEBUG Could not create ISATAP Tunnel ERROR DEBUG Could not destroy ISATAP Tunnel ERROR DEBUG ERROR failed query %s DEBUG failed query %s DEBUG failed query %s %s:DBUpdate event: Table: %s opCode:%d rowId:%d DEBUG Could not configure ISATAP Tunnel Could not de-configure ISATAP Tunnel nimfStatusUpdate: updating NimfStatus failed nimfStatusUpdate: updating NimfStatus failed nimfLinkStatusGet: determinig link's status failed nimfLinkStatusGet: opening status file failed DEBUG DEBUG 202 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual %s:DBUpdate event: Table: %s opCode:%d rowId:%d %s:%d SIP ENABLE: %s sipTblHandler:failed to update ifStatic DEBUG DEBUG DEBUG Failed to commit ifStatusDBUpdate: Failed to begin " %s: SQL error: %s ERROR ERROR ERROR sipTblHandler:failed to update Configport DEBUG ERROR %s:%d SIP DISABLE: %s DEBUG %s:%d SIP SET CONF: %s DEBUG Failed to open %s: %s Failed to start sipalg DEBUG DEBUG Failed to stop sipalg DEBUG Failed to get config info DEBUG Network Mask: 0x%x DEBUG RTP DSCP Value: 0x%x DEBUG Need more arguments DEBUG Invalid lanaddr DEBUG Invalid lanmask DEBUG Invalid option DEBUG Failed to set config info DEBUG Unknown option DEBUG sshdTblHandler DEBUG pPort: %s DEBUG pProtocol: %s DEBUG pListerAddr: %s DEBUG pKeyBits: %s DEBUG pRootEnable: %s DEBUG pRsaEnable: %s DEBUG pDsaEnable: %s DEBUG pPassEnable: %s DEBUG pEmptyPassEnable: %s DEBUG pSftpEnable: %s DEBUG pScpEnable: %s DEBUG pSshdEnable: %s DEBUG %s: Failed to commit " nimfNetIfaceTblHandler: unable to get LedPinId nimfNetIfaceTblHandler: unable to get LedPinId nimfNetIfaceTblHandler: unable to get LedPinId %s: unable to kill dhclient nimfAdvOptSetWrap: unable to get current Mac Option nimfAdvOptSetWrap: unable to get current Port " nimfAdvOptSetWrap: unable to get current MTU Option nimfAdvOptSetWrap: error getting Mac Address from " nimfAdvOptSetWrap: unable to get the MTU nimfAdvOptSetWrap: error setting interface advanced " nimfAdvOptSetWrap: error getting MTU size nimfAdvOptSetWrap: unable to get Mac Address nimfAdvOptSetWrap: error setting interface advanced " nimfAdvOptSetWrap: failed to get old connectiontype nimfAdvOptSetWrap: old connection type is: %s nimfAdvOptSetWrap: failed to get old MTU Option nimfAdvOptSetWrap: error getting MTU size nimfOldFieldValueGet: failed to get old " nimfOldFieldValueGet: user has changed MTU size nimfAdvOptSetWrap: failed to get old Port Speed " nimfAdvOptSetWrap: user has changed Port Speed nimfAdvOptSetWrap: failed to get old Mac Address " nimfAdvOptSetWrap: user has changed Mac Address " nimfAdvOptSetWrap: unable to get Mac Address nimfAdvOptSetWrap:Failed to RESET the flag nimfAdvOptSetWrap: setting advanced options failed nimfAdvOptSetWrap: interface advanced options applied 203 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual pPrivSep: %s %s:DBUpdate event: Table: %s opCode:%d rowId:%d DEBUG DEBUG nimfGetUpdateMacFlag: unable to get Flag from MacTable nimfMacGet: Updating MAC address failed Re-Starting sshd daemon.... sshd re-started successfully. DEBUG DEBUG sqlite3QueryResGet failed.Query:%s error executing the command %s ERROR ERROR sshd stopped . failed query %s vlan disabled, not applying vlan configuration.. DEBUG DEBUG error executing the command %s error executing the command %s disableLan function is failed to disable ConfigPort" ERROR ERROR failed query %s failed query %s DEBUG DEBUG ERROR ERROR no ports present in this vlanId %d failed query %s vlan disabled, not applying vlan configuration.. disabling vlan enabling vlan vlan disabled, not applying vlan configuration.. DEBUG DEBUG sqlite3QueryResGet failed.Query:%s sqlite3QueryResGet failed.Query:%s Unable to Disable configurable port from configPortTblHandler has failed ERROR ERROR ERROR no ports present in this vlanId %d DEBUG failed query %s vlan disabled, not applying vlan configuration.. DEBUG sqlite3QueryResGet failed.Query:%s Error in executing DB update handler sqlite3QueryResGet failed Failed to execute switchConfig for port\ Failed to execute switchConfig for port enable Failed to execute ifconfig for port enable ERROR removing %s from bridge%s... %s DEBUG adding %s to bridge%d... %s DEBUG Failed to execute ethtool for\ Failed to execute switchConfig for port disable Failed to execute ifconfig for port disable restarting bridge... [switchConfig] Ignoring event on port number %d DEBUG sqlite3QueryResGet failed ERROR DEBUG sqlite3_mprintf failed ERROR restarting bridge... DEBUG ERROR executing %s ... %s DEBUG removing %s from bridge%s... %s adding %s to bridge%d... %s DEBUG DEBUG [switchConfig] Ignoring event on %s restarting bridge... [switchConfig] Ignoring event on port number %d DEBUG DEBUG sqlite3QueryResGet failed Failed to execute switchConfig for port mirroring Usage:%s <DB Name> <Entry Name> <logFile> <subject> sqlite3QueryResGet failed Could not get all the required variables to email the Logs. runSmtpClient failed DEBUG getaddrinfo returned %s ERROR [switchConfig] executing %s ... %s restarting bridge... UserName: %s Password: %s DEBUG DEBUG DEBUG DEBUG file not found sqlite3QueryResGet failed.Query:%s sqlite3QueryResGet failed.Query:%s sqlite3QueryResGet failed.Query:%s ERROR ERROR ERROR ERROR IspName: %s DEBUG ERROR DialNumber: %s DEBUG Apn: %s DEBUG No memory to allocate Failed to Open SSHD Configuration File Ipaddress should be provided with accessoption 1 DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG 204 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual GetDnsFromIsp: %s IdleTimeOutFlag: %s IdleTimeOutValue: %d DEBUG DEBUG DEBUG Subnetaddress should be provided with accessoption 2 Failed to restart sshd unable to open the " ERROR ERROR ERROR AuthMetho: %d executing %s ... %s DEBUG DEBUG sqlite3QueryResGet failed.Query:%s Error in executing DB update handler ERROR ERROR removing %s from bridge%d... %s adding %s to bridge%d... %s DEBUG DEBUG ERROR ERROR stopping bridge... DEBUG Error in executing DB update handler unknown vlan state Failed to execute vlanConfig binary for vlanId %d restarting bridge... Could not configure 6to4 Tunnel Interface Could not de-configure 6to4 Tunnel Interface DEBUG sqlite3_mprintf failed Access port can be present only in single vlan Failed to execute vlanConfig binary for vlanId %d ERROR failed to restart 6to4 tunnel interfaces BridgeConfig: too few arguments to command %s BridgeConfig: unsupported command %d DEBUG ERROR BridgeConfig returned error=%d DEBUG unknown vlan state Failed to execute vlanConfig binary for port number %d Failed to clear vlan for oldPVID %d Failed to execute vlanConfig binary for port number %d sqlite3QueryResGet failed Error in executing DB update handler DEBUG DEBUG ERROR ERROR sqlite3QueryResGet failed Failed to remove vlan Interface for vlanId \ DEBUG Failed to clear vlan for %d Failed to set vlan entry for vlan %d Failed to set vlan entries, while enabling \ ERROR sqlite3QueryResGet failed DEBUG Invalid oidp passed Invalid oidp passed Failed to get oid from the tree DEBUG DEBUG DEBUG threegEnable: Input to wrapper %s DEBUG sqlite3QueryResGet failed Failed to execute vlanConfig binary for port number %d Failed to execute vlanConfig binary for vlanId %d Failed to enable vlan Failed to disable vlan Failed to set vlanPort table entries, while \ threegEnable: spawning command %s threegMgmtHandler: query string: %s threegMgmtHandler: returning with status: %s adding to dhcprealy ifgroup failed DEBUG DEBUG Failed to enable vlan unknown vlan state ERROR ERROR DEBUG DEBUG ERROR ERROR adding to ipset fwDhcpRelay failed Disabling Firewall Rule for DHCP Relay Protocol Enabling Firewall Rule for DHCP Relay Protocol prerouting Firewall Rule add for Relay failed prerouting Firewall Rule add for Relay failed DEBUG Error in executing DB update handler unknown vlan state Failed to execute vlanConfig binary for vlanId %d sqlite3_mprintf failed Access port can be present only in single vlan Failed to execute vlanConfig binary for vlanId %d ERROR ERROR %s: SQL get query: %s DEBUG unknown vlan state Failed to execute vlanConfig binary for port number %d %s: sqlite3QueryResGet failed DEBUG ERROR %s: no result found DEBUG Failed to clear vlan for oldPVID %d Failed to execute vlanConfig binary for port number %d DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG 205 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual %s: buffer overflow DEBUG Failed to clear vlan for %d ERROR %s: value of %s in %s table is: %s DEBUG ERROR %s: returning with status: %s dnsResolverConfigure: addressFamily: %d dnsResolverConfigure: LogicalIfName: %s chap-secrets File found PID File for xl2tpd found DEBUG pid: %d options.xl2tpd file found DEBUG DEBUG Failed to set vlan entry for vlan %d Failed to set vlan entries, while enabling \ Failed to execute vlanConfig binary for port number %d Failed to execute vlanConfig binary for vlanId %d Failed to enable vlan Failed to disable vlan Failed to set vlanPort table entries, while \ Failed to enable vlan options.xl2tpd file not found DEBUG ERROR Conf File for xl2tpd found DEBUG xl2tpd.conf not found DEBUG unknown vlan state threegMgmtInit: unable to open the database file %s threegConnEnable: failed to get the WanMode Chap Secrets file found DEBUG ERROR Chap Secrets file not found %s:DBUpdate event: Table: %s opCode:%d rowId:%d DEBUG threegEnable:spawning failed threegDisable: unable to kill ppp daemon ERROR chap-secrets File found PID File for pptpd found pid: %d DEBUG DEBUG DEBUG threegMgmtHandler: Query: %s threegMgmtHandler: error in executing database update Error in executing DB update handler are we getting invoked twice ?? PID File for pptpd interface found pid: %d DEBUG DEBUG could not open %s to append could not write nameserver %s to %s ERROR ERROR options.pptpd file found options.pptpd file not found DEBUG DEBUG ERROR ERROR Conf File for pptpd found DEBUG pptpd.conf not found DEBUG could not write nameserver %s to %s could not open %s to truncate dnsResolverConfigMgmtInit: unable to open the " resolverConfigDBUpateHandler: sqlite3QueryResGet " Chap Secrets file found DEBUG ERROR Chap Secrets file not found %s:DBUpdate event: Table: %s opCode:%d rowId:%d DEBUG could not configure DNS resolver dnsResolverConfigure: could not write nameserver:%s," ERROR chap-secrets File found pppoeMgmtTblHandler: MtuFlag: %d pppoeMgmtTblHandler: Mtu: %d pppoeMgmtTblHandler: IdleTimeOutFlag: %d pppoeMgmtTblHandler: IdleTimeOutValue: %d pppoeMgmtTblHandler: UserName: %s DEBUG DEBUG DEBUG unboundMgmt: unable to open the " ioctl call Failed-could not update active user Details sqlite3QueryResGet failed.Query:%s Can't kill xl2tpd DEBUG xl2tpd restart failed ERROR DEBUG DEBUG failed to get field value failed to get field value ERROR ERROR pppoeMgmtTblHandler: Password: %s pppoeMgmtTblHandler: DNS specified: %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR DEBUG sqlite3QueryResGet failed.Query:%s ERROR pppoeMgmtTblHandler: Service: %s pppoeMgmtTblHandler: StaticIp: %s DEBUG DEBUG unboundMgmt: unable to open the " writing options.xl2tpd failed ERROR ERROR DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG 206 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual pppoeMgmtTblHandler: NetMask: %s DEBUG xl2tpdStop failed ERROR pppoeMgmtTblHandler: AuthOpt: %d pppoeMgmtTblHandler: Satus: %d pppoeEnable: ppp dial string: %s pppoeMgmtDBUpdateHandler: returning with status: %s DEBUG DEBUG DEBUG writing xl2tpd.conf failed writing options.xl2tpd failed xl2tpdStop failed ERROR ERROR ERROR DEBUG xl2tpdStart failed ERROR pptpMgmtTblHandler: MtuFlag: %d DEBUG ERROR pptpMgmtTblHandler: Mtu: %d pptpMgmtTblHandler: IdleTimeOutFlag: %d pptpMgmtTblHandler: IdleTimeOutValue: %d pptpMgmtTblHandler: GetDnsFromIsp: %d DEBUG sqlite3QueryResGet failed.Query:%s writing Chap-secrets/Pap-Secrets failed DEBUG xl2tpdStop failed ERROR DEBUG xl2tpdStart failed ERROR DEBUG ERROR pptpMgmtTblHandler: UserName: %s pptpMgmtTblHandler: Password: %s pptpMgmtTblHandler: dynamic MyIp configured DEBUG DEBUG sqlite3QueryResGet failed.Query:%s writing Chap-secrets/Pap-Secrets failed xl2tpdStop failed DEBUG xl2tpdStart failed ERROR pptpMgmtTblHandler: MyIp: %s DEBUG ERROR pptpMgmtTblHandler: ServerIp: %s pptpMgmtTblHandler: StaticIp: %s DEBUG DEBUG sqlite3QueryResGet failed.Query:%s writing Chap-secrets/Pap-Secrets failed Error in executing DB update handler pptpMgmtTblHandler: NetMask: %s pptpMgmtTblHandler: MppeEncryptSupport: %s DEBUG unboundMgmt: unable to open the " ERROR DEBUG Can't kill pptpd ERROR pptpMgmtTblHandler: SplitTunnel: %s pptpEnable: ppp dial string: %s DEBUG DEBUG pptpd restart failed Can't kill pptpd ERROR ERROR pptpEnable: spawning command %s PID File for dhcpc found pid: %d pptpMgmtDBUpdateHandler: query string: %s pptpMgmtDBUpdateHandler: returning with status: %s dhcpcReleaseLease: dhcpc release command: %s DEBUG DEBUG DEBUG failed to get field value failed to get field value unboundMgmt: unable to open the " ERROR ERROR ERROR DEBUG writing options.pptpd failed ERROR DEBUG pptpdStop failed ERROR DEBUG writing pptpd.conf failed ERROR dhcpcMgmtTblHandler: MtuFlag: %d dhcpcMgmtTblHandler: Mtu: %d DEBUG DEBUG writing options.pptpd failed pptpdStop failed ERROR ERROR DHCPv6 Server started successfully. DEBUG ERROR DHCPv6 Server stopped successfully DHCPv6 Client started successfully. DEBUG DEBUG DHCPv6 Client stopped successfully. DEBUG DHCPv6 Client Restart successful DEBUG l2tpMgmtTblHandler: MtuFlag: %d DEBUG l2tpMgmtTblHandler: Mtu: %d DEBUG l2tpMgmtTblHandler: IspName: %s DEBUG pptpdStart failed writing Chap-secrets/Pap-Secrets failed Error in executing DB update handler pppStatsUpdate: unable to get default MTU pppoeMgmtInit: unable to open the database file %s pppoeDisable: unable to kill ppp daemon pppoeMultipleEnableDisable: pppoe enable failed pppoeMultipleEnableDisable: pppoe disable failed 207 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual l2tpMgmtTblHandler: UserName: %s DEBUG l2tpMgmtTblHandler: Password: %s DEBUG l2tpMgmtTblHandler: AccountName: %s DEBUG l2tpMgmtTblHandler: DomainName: %s l2tpMgmtTblHandler: Secret: not specified DEBUG l2tpMgmtTblHandler: Secret: %s l2tpMgmtTblHandler: dynamic MyIp configured DEBUG l2tpMgmtTblHandler: MyIp: %s l2tpMgmtTblHandler: ServerIp: %s l2tpMgmtTblHandler: StaticIp: %s DEBUG DEBUG DEBUG l2tpMgmtTblHandler: NetMask: %s DEBUG l2tpMgmtTblHandler: SplitTunnel: %s needToStartHealthMonitor: returning with status: %s DEBUG l2tpEnable: command string: %s DEBUG l2tpEnable: command: %s DEBUG l2tpEnable: command string: %s DEBUG PID File for dhcpc found DEBUG pid: %d l2tpMgmtDBUpdateHandler: query string: %s l2tpMgmtDBUpdateHandler: returning with status: %s DEBUG RADVD started successfully RADVD stopped successfully DEBUG DEBUG empty update. nRows=%d nCols=%d WARN Wan is not up or in load balencing mode threegMgmtHandler: no row found. nRows = %d nCols = %d pppoeMgmtDBUpdateHandler: empty update. dhcpcEnable: dhclient already running on: %s WARN dhcpcDisable: deleted dhclient.leases l2tpMgmtInit: unable to open the database file %s l2tpEnable: unable to resolve address: %s WARN l2tpEnable: inet_aton failed ERROR pppoeMgmtTblHandler: unable to get current Mtu Option pppoeMgmtTblHandler: unable to get the Mtu pppoeMgmtTblHandler: pppoe enable failed pppoeMgmtDBUpdateHandler: failed query: %s pppoeMgmtDBUpdateHandler: error in executing " pptpMgmtInit: unable to open the database file %s pptpEnable: error executing command: %s pptpEnable: unable to resolve address: %s pptpEnable: inet_aton failed pptpEnable: inet_aton failed DEBUG DEBUG DEBUG DEBUG DEBUG WARN WARN WARN ERROR ERROR 208 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR pptpEnable:spawning failed pptpDisable: unable to kill ppp daemon pptpMgmtTblHandler: unable to get current MTU Option pptpMgmtTblHandler: unable to get the Mtu pptpMgmtTblHandler: dbRecordValueGet failed for %s " pptpMgmtTblHandler: pptp enable failed pptpMgmtTblHandler: pptp disable failed pptpMgmtDBUpdateHandler: sqlite3QueryResGet " pptpMgmtDBUpdateHandler: error in executing " ERROR Illegal invocation of dhcpConfig (%s) dhcpLibInit: unable to open the database file %s sqlite3QueryResGet failed.Query:%s dhcpcMgmtInit: unable to open the database file %s dhcpcReleaseLease: unable to release lease ERROR dhcpcEnable: unable to kill dhclient dhcpcEnable: enabling dhcpc failed on: %s ERROR dhcpcDisable: unable to kill dhclient dhcpcDisable: delete failed for dhclient.leases ERROR dhcpcDisable: failed to reset the ip dhcpcMgmtTblHandler: unable to get current Mtu Option dhcpcMgmtTblHandler: unable to get the Mtu ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual ERROR dhcpcMgmtTblHandler: dhclient enable failed dhcpcMgmtTblHandler: dhcpc release failed dhcpcMgmtTblHandler: dhcpc disable failed dhcpcMgmtDBUpdateHandler: failed query: %s dhcpcMgmtDBUpdateHandler: error in executing " ERROR DHCPv6 Client start failed. ERROR ERROR DHCPv6 Client stop failed. ERROR ERROR failed to create/open DHCPv6 client " failed to write DHCPv6 client configuration file ERROR failed to restart DHCPv6 Client failed to create/open DHCPv6 Server " ERROR ERROR ERROR ERROR Restoring old configuration.. DHCPv6 Server configuration update failed DHCPv6 Server Restart failed ERROR sqlite3QueryResGet failed.Query:%s ERROR Log Message %d command not supported by eapAuth pCtx NULL. Current cert subject name= %s X509_STORE_CTX_get_ex_data failed. Severity DEBUG DEBUG DEBUG DEBUG Log Message PEAP key derive: ERROR PEAP context is NULL: ERROR Constructing P2 response: ERROR innerEapRecv is NULL: ERROR Severity ERROR ERROR ERROR ERROR Cannot get cipher, no session est. %s: SSL_ERROR_WANT_X509_LOOKUP DEBUG Decrypting TLS data: ERROR ERROR DEBUG ERROR err code = (%d) in %s DEBUG Wrong identity size: ERROR Wrong size for extensions packet: ERROR BIO_write: Error Decrypting: BIO reset failed Encrypting BIO reset: ERROR BIO_read: Error EAP state machine changed from %s to %s. EAP state machine changed from %s to %s. DEBUG DEBUG DEBUG DEBUG ERROR ERROR ERROR ERROR Received EAP Packet with code %d DEBUG Response ID %d Response Method %d DEBUG DEBUG innerEapRecv is NULL: ERROR. Inner EAP processing: ERROR TLS handshake: ERROR. Sending P1 response: ERROR Unexpected tlsGlueContinue return value. No more fragments in message. ERROR No phase 2 data or phase 2 data buffer NULL: ERROR Allocating memory for PEAP Phase 2 payload: ERROR TLS encrypting response: ERROR The Enable Command is %s l2tpEnable:Executing the Command failed ERROR l2tpDisable: command string: %s ERROR l2tpDisable: unable to stop l2tp session l2tpMgmtTblHandler: unable to get current MTU option l2tpMgmtTblHandler: unable to get the Mtu l2tpMgmtTblHandler: dbRecordValueGet failed for %s " ERROR l2tpMgmtTblHandler: l2tpEnable failed l2tpMgmtTblHandler: disabling l2tp failed l2tpMgmtDBUpdateHandler: sqlite3QueryResGet " l2tpMgmtDBUpdateHandler: error in executing ERROR Illegal invocation of tcpdumpConfig (%s) ERROR Failed to start tcpdump Failed to stop tcpdump Invalid tcpdumpEnable value ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Facility: System (VPN) DEBUG DEBUG 209 ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual Created EAP/PEAP context: OK DEBUG Deleted EAP/PEAP context: OK Upper EAP sent us: decision = %d method state = %d DEBUG Setting message in fragment buffer: ERROR Allocating TLS read buffer is NULL: ERROR DEBUG Setting last fragment: ERROR ERROR P2 decision=(%d); methodState=(%d) Writing message to BIO: ERROR. Encrypted (%d) bytes for P2 P2: sending fragment. DEBUG DEBUG DEBUG DEBUG Getting message: ERROR Processing PEAP message: ERROR Setting fragment: ERROR Creating receive buffer: ERROR ERROR ERROR ERROR ERROR P2: message size = %d P2: sending unfragmented message. DEBUG DEBUG ERROR ERROR P1: Sending fragment. DEBUG P1: Total TLS message size = (%d) P1: sending unfragmented message. peapFragFirstProcess: TLS record size to receive = (%d) Setting version %d PEAP pkt rcvd: data len=(%d) flags=(%d) version=(%d) Got PEAP/Start packet. DEBUG DEBUG Setting first fragment: ERROR Sending P1 response: ERROR NULL request (or response) PDU or NULL context: ERROR Expecting start packet, got something else: ERROR Protocol version mismatch: ERROR Processing PEAP message (from frag): ERROR Processing PEAP message: ERROR ERROR ERROR Got first fragment DEBUG Got fragment (n) DEBUG Processing PEAP message: ERROR Indicated length not valid: ERROR Did not get Acknowledged result: ERROR Cannot understand AVP value: ERROR Got last fragment DEBUG ERROR Got unfragmented message DEBUG Got frag ack. Ext AVP parsed: flags=(0x%x) Mandatory bit not set: WARNING DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Got PEAPv0 success! DEBUG Got PEAPv0 failure! DEBUG pCtx NULL. DEBUG Authenticator response check: Error DEBUG eapExtResp is NULL: ERROR eapWscCtxCreate: EAPAUTH_MALLOC failed. eapWscProcess: umiIoctl req to WSC failed, status = %d eapWscCheck: Invalid frame eapWscBuildReq: Invalid state %d eapWscProcessWscResp: Invalid data recd pData = %p, dataLen" Data received for invalid context, dropping it eapWscProcessWscResp: Build Request failed eapWscProcessWscResp: Invalid state %d eapWscProcessWscResp: Message processing failed 0x%X eapWscProcessWscData: Invalid notification recd %d Authenticator response check: Failed MS-CHAP2 Response AVP size = %u DEBUG DEBUG unable to initialize MD5 MDString: adpDigestInit for md5 failed ERROR ERROR Created EAP/MS-CHAP2 context: OK. pCtx NULL. Deleted EAP/MS-CHAPv2 context: OK DEBUG DEBUG DEBUG EAPAUTH_MALLOC failed. EAPAUTH_MALLOC failed. NULL context created: Error ERROR ERROR ERROR Not authenticated yet. DEBUG NULL context received: Error ERROR Authenticator response invalid EAP-MS-CHAPv2 password changed. DEBUG DEBUG Authenticator ident invalid. Success request message invalid: ERROR ERROR Ext AVP parsed: type=(%d) DEBUG Ext AVP parsed: value=(%d) DEBUG 210 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual Error rcvd. opCode %d. pCtx NULL. TLS message len changed in the fragment, ignoring. no data to send while fragment ack received. TLS handshake successful. Created EAP/TTLS context: OK Deleted EAP/TTLS context: OK DEBUG DEBUG Plugin context is NULL Deriving implicit challenge: Error ERROR ERROR DEBUG Generating NT response: Error ERROR DEBUG DEBUG DEBUG DEBUG NULL in/out buffer: Error Incorrect vendor id. Allocating memory for outBuff: ERROR AVP code not recognized ERROR ERROR ERROR ERROR No more fragments in message. ERROR Upper EAP sent us: method state = %d; decision = %d P2: sending fragment. DEBUG EAPAUTH_MALLOC failed. ERROR DEBUG DEBUG ERROR ERROR P2 send unfragmented message. P1: sending fragment. DEBUG DEBUG P1: sending unfragmented message. DEBUG \tTLSMsgLen = 0x%x Send req ptr = 0x%x; Send resp ptr = 0x%x P2 decision=(%d); methodState=(%d) Default EAP: method state = %d; decision = %d DEBUG Converting password to unicode: Error Generating password hash: Error. Generating password hash hash: Error. Generating master key: Error. Generating first 16 bytes of session key: Error.n Generating second 16 bytes of session key: Error.n DEBUG DEBUG Converting password to unicode: Error Constructing failure response: ERROR ERROR ERROR DEBUG Error checking authenticator response. ERROR TTLS pkt: data len=(%d) flags=(0x%x) DEBUG ERROR Got start DEBUG Error generating NT response. Username string more than 256 ASCII characters: ERROR Got first fragment (n). DEBUG ERROR Got fragment (n). Got last fragment DEBUG DEBUG Invalid Value-Size. Invalid MS-Length. Got (%d), expected (%d) Error constructing response. Got unfragmented message. DEBUG ERROR Got frag ack. Rcvd. AVP Code-%u: flags-0x%x: len%u: vendorId-%u: " MOD EAP: method state from upper = %d; decision = %d Got AVP len = %ul. Should be less than 16777215 AVP length extract: Error pFB is NULL Requesting message before assembly complete DEBUG Got type (%d), expecting (%d) Cannot handle message; opCode = %d DEBUG EAPAUTH_MALLOC failed. ERROR DEBUG tlsGlueCtxCreate failed. client certificate must be set in the profile. received tls message length too big. total frags len > initial total tls length. ERROR ERROR pFB is NULL pFB is NULL DEBUG DEBUG Buffer cannot hold message: ERROR DEBUG total frags len > initial total tls length. total data rcvd(%d) doesnt match the initial " couldnt write %d data to TLS buffer. invalid flags %s passed to eapTlsBuildResp. pFB is NULL: Error DEBUG EAPAUTH_MALLOC failed. ERROR pFB is NULL TLS_FB* is NULL. DEBUG DEBUG tlsGlueCtxCreate failed. Context NULL: ERROR ERROR ERROR DEBUG DEBUG DEBUG DEBUG 211 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual pFB->msgBuff is NULL. DEBUG Setting profile to glue layer: ERROR. ERROR Error calculating binary. DEBUG ERROR Error calculating binary. DEBUG adpDigestInit for SHA1 failed. DEBUG _eapCtxCreate failed. %d authentication not enabled in the system. Initializing inner non-EAP auth plugin: ERROR adpDigestInit for SHA1 failed. DEBUG ERROR E = %d DEBUG R = %d Could not initialize des -ecb DEBUG DEBUG adpDigestInit for MD4 failed. DEBUG adpDigestInit for SHA1 failed. adpDigestInit for SHA1 failed. Error converting received auth reponse to bin. Gnerating challenge hash: Error DEBUG DEBUG TTLS key derive: ERROR TTLS context from EAP plugin is NULL: ERROR Allocating memory for TTLS Phase 2 payload: ERROR TLS Encrypting response: ERROR Allocating TLS read buffer is NULL: ERROR Inner authentication (id: %d) unhandled innerEapRecv is NULL: ERROR. DEBUG DEBUG Decrypting TLS data: ERROR Processing Phase 2 method: Error ERROR ERROR Generating password hash: Error Generating challenge response: Error DEBUG DEBUG ERROR ERROR Conn cipher name=%s ver=%s: %s Send req ptr = 0x%x; Send resp ptr = 0x%x Request ptr = 0x%x; DEBUG DEBUG DEBUG Writing message to BIO: ERROR. TLS handshake: ERROR. Unexpected tlsGlueContinue return value. NULL request (or response) PDU or NULL context Protocol version mismatch: ERROR Response ptr = 0x%x Rcvd. AVP Code - %ul DEBUG DEBUG Creating receive buffer: ERROR Setting first fragment: ERROR ERROR ERROR Rcvd. AVP flags - 0x%02x Rcvd. AVP len - %ul Rcvd. AVP vendor id - %ul \tCode = %d DEBUG DEBUG DEBUG DEBUG Setting fragment: ERROR Setting last fragment: ERROR Getting message: ERROR Processing TTLS message: ERROR ERROR ERROR ERROR ERROR \tIdent = %d \tLen = %d DEBUG DEBUG Processing TTLS message: ERROR Processing TTLS message: ERROR ERROR ERROR \tType = %d DEBUG Decapsulating AVP: ERROR ERROR \tOpCode = %d \tMSID = %d DEBUG DEBUG Processing EAP receive: Error AVP code not EAP: Error ERROR ERROR \tmsLen = %d \tvalSize = %d Frag Buffer bytes left = (%d) Stripped username=(%s) DEBUG DEBUG DEBUG DEBUG Encapsulating AVP: ERROR profile %s doesnt exist. profile %s is in use. profile %s already exists. ERROR ERROR ERROR ERROR digestLen = %d. ClearText = DEBUG DEBUG ERROR ERROR CipherText = DEBUG digestLen = %d. DEBUG digestLen1 = %d. DEBUG digestLen2 = %d. DEBUG EAPAUTH_MALLOC failed User not found. EAP-MD5 not enabled in system configuration. EAP-MSCHAPV2 not enabled in system configuration. EAP-TLS not enabled in system configuration. EAP-TTLS not enabled in system configuration. 212 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual password change is not allowed for this user DEBUG completed writing the policy DEBUG completed writing the SA DEBUG completed writing the proposal block DEBUG cmdBuf: %s X509_DEBUG : Invalid Certificate for the generated" DEBUG X590_ERROR : Failed to create File '%s' DEBUG x509TblHandler DEBUG pCertType: %s DEBUG pRowQueryStr: %s DEBUG x509SelfCertTblHandler pRowQueryStr: %s %s:DBUpdate event: Table: %s opCode:%d rowId:%d DEBUG DEBUG umiRegister failed eapAuthHandler: Invalid data received EAP-PEAP not enabled in system configuration. EAP-WSC not enabled in system configuration. PAP not enabled in system configuration. CHAP not enabled in system configuration. MSCHAP not enabled in system configuration. MSCHAPV2 not enabled in system configuration. PAP/Token not enabled in system configuration. EAP-MD5 not enabled in system configuration. EAP-MSCHAPV2 not enabled in system config. EAP-TLS not enabled in system configuration. EAP-TTLS and EAP-PEAP are not valid as inner" invalid innerAuth %d. DEBUG DEBUG ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR profile %s doesnt exist. Re-assembling fragments incorrect size Error creating cipher context. EAPAUTH_MALLOC failed. malloc failed. BIO_new_mem_buf failed. malloc failed. ERROR ERROR ERROR ERROR Error initializing cipher context. Error creating digest context. Error initializing digest context. Error initializing DES in Klite ERROR ERROR ERROR ERROR BIO_new_mem_buf failed. SSL_CTX_new (TLSv1_client_method) failed. unable to set user configured CIPHER list %s ERROR Error initializing MD4 in Klite ERROR ERROR Error initializing RC4 in Klite ERROR ERROR Error initializing SHA in Klite ERROR Certificate verification failed. Server name match failed. Got (%s) expected " SSL_CTX_use_certificate_file (cert, PEM) failed. ERROR Error cleaning cipher context. ERROR ERROR Error destroying cipher context. ERROR ERROR Error cleaning digest context. ERROR SSL_CTX_use_PrivateKey_file failed. private key does not match public key SSL_CTX_load_verify_locations failed SSL_new failed. Both SSL_VERIFY_PEER and SSL_VERIFY_NONE set: Error ERROR ERROR ERROR ERROR Error destroying digest context. Error stripping domain name. Error cleaning digest context. Error cleaning digest context. Challenge not present in failure packet. ERROR ERROR ERROR ERROR EAPAUTH_MALLOC failed. ERROR ERROR EAPAUTH_MALLOC failed. eapTimerCreate failed. ERROR ERROR Wrong challenge length. Incorrect password change version value. Error generating password hash. eapCtxDelete:pCtx == NULL eapRole != EAP_ROLE_PEER or EAP_ROLE_AUTHENTICATOR ERROR Error generating password hash. Error encrypting password hash with block ERROR ERROR ERROR 213 ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual pEapCtx == NULL or pPDU == NULL. received EAP pdu bigger than EAP_MTU_SIZE. received EAP pdu bigger than EAP_MTU_SIZE. state machine is in invalid state. ERROR Could not initialize des -ecb ERROR ERROR Error cleaning cipher context. ERROR ERROR ERROR Error cleaning cipher context. Error cleaning digest context. ERROR ERROR unable to create method context. method ctxCreate failed. method profile set failed. ERROR ERROR ERROR ERROR ERROR ERROR state machine is in invalid state. Only StandAlone authenticator supported currently. ERROR Error cleaning digest context. adpDigestInit for SHA1 failed. X509_ERROR : .Query:%s X509_ERROR : Invalid Certificate for the " ERROR invalid x509 certificate ERROR state machine is in invalid state. BuildReq operation failed No method ops defined for current method Process operation failed state machine is in invalid state. ERROR ERROR Couldn't get the x509 cert hash Memory allocation failed ERROR ERROR ERROR ERROR ERROR FileName too lengthy Couldn't execute command Memory allocation failed ERROR ERROR ERROR Packet length mismatch %d, %d eapAuthTypeToType: Invalid eapAuthType %d eapTypeToAuthType: Invalid eapType %d ERROR Memory allocation failed ERROR ERROR invalid certificate data ERROR ERROR .Query:%s ERROR unable to create method context. method ctxCreate failed. Invalid condition, methodState = %d, respMethod = %d A EAP Ctx map already exists eapTimerCreate: Currently unsupported for Peer role eapTimerStart: Currently unsupported for Peer role eapTimerDestroy: Currently unsupported for Peer role eapTimerCancel: Currently unsupported for Peer role eapTimerHandler: Currently unsupported for Peer role pCtx is NULL: ERROR ERROR ERROR ERROR ERROR ERROR ERROR .Query:%s Memory allocation failed X509_ERROR : Failed to validate the certficate " Memory allocation failed ERROR .Query:%s ERROR ERROR Invalid Sign Key Length : %d ERROR ERROR Invalid Hash Alg : %d ERROR ERROR Invalid Sign Alg : %d ERROR ERROR ERROR No Memory Available Certificate Request Failed ERROR ERROR tlsGlueCtxCreate failed eapVars is NULL Context NULL: ERROR Initializing inner EAP auth: ERROR ERROR ERROR ERROR ERROR File Open Failed File is Empty Memory Allocation Failed File Open Failed ERROR ERROR ERROR ERROR pCtx is NULL: ERROR Memory Allocation Failed ERROR ERROR File is Empty Error in executing DB update handler ERROR ERROR Severity DEBUG Log Message unable to register to UMI Severity ERROR ERROR ERROR ERROR Facility: System (Admin) Log Message Usage:%s <DBFile> 214 Unified Services Router User Manual Could not open database: %s DEBUG sqlite3QueryResGet failed ERROR CPU LOG File not found DEBUG ERROR MEM LOG File not found cpuMemUsageDBUpdateHandler: update query: %s DEBUG Printing the whole list after inserting %s at %d(minute) %d(hour) %d(dayOfMonth) %d(month)" DEBUG adpCmdExec exited with return code=%d DEBUG %s op=%d row=%d DEBUG sqlite3_mprintf failed DEBUG sqlite3QueryResGet failed: query=%s DEBUG radSendtoServer: socket: %s radSendtoServer: bind() Failed: %s: %s radRecvfromServer: recvfrom() Failed: %s radRecvfromServer: Packet too small from %s:%d: %s radCheckMsgAuth: Invalid MessageAuthenticator length in" radDictLoad: couldn't open dictionary %s: %s radBuildAndSendReq: Invalid Request Code %d radPairAssign: bad attribute value length radPairAssign: unknown attribute type %d Printing the whole list after delete %s at %d(minute) %d(hour) %d(dayOfMonth) %d(month)" DEBUG ERROR Printing the whole list after inserting %s at %d(minute) %d(hour) %d(dayOfMonth) %d(month)" DEBUG email logs: No logging events enabled DEBUG %s Mail sent and the Database is reset. DEBUG DEBUG Disabled syslog server DEBUG Event logs are full, sending logs to email DEBUG Email logs sending failed DEBUG Packing attribute: %s DEBUG Server found: %s, secret: %s Packed Auth. Reqest: code:%d, id:%d, len:%d DEBUG Sending Packet to %x:%d .... DEBUG Receiving Reply Packet.... DEBUG Verified Reply Packet Integrity DEBUG Generated Reply Attribute-Value pairs DEBUG Verified Message-Authenticator Unloaded RADIUS Dictionary DEBUG DEBUG Adding Dictionary Attribute %s DEBUG radPairNew: unknown attribute %d radPairGen: Attribute(%d) has invalid length radPairValue: unknown attribute type %d radPairValueLen: unknown attribute type %d radPairLocate: Attribute(%d) has invalid length radPairUnpackDefault: UnknownAttribute[%d]: radConfigure: can't open %s: %s radConfigure: %s: line %d: bogus format: %s radConfAssert: No AuthServer Specified radConfAssert: No Default Timeout Specified radConfAssert: No Default Retry Count Specified radExtractMppeKey: Invalid MSMPPE-Key Length radVendorMessage: Invalid Length in Vendor Message radVendorMessage: Unknown Vendor ID received:%d radVendorAttrGet: Invalid Length in Vendor Message radVendorAttrGet: Unknown Vendor ID:%d radVendorMessagePack: Unknown Vendor ID:%d radGetIPByName: couldn't resolve hostname: %s radGetHostIP: couldn't get hostname radGetHostIP: couldn't get host IP address Adding Dictionary Value %s Loaded Dictionary %s DEBUG DEBUG radius dictionary loading failed Failed to set default timeout value ERROR ERROR DEBUG DEBUG DEBUG DEBUG DEBUG 215 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual Adding Dictionary Attribute '%s' DEBUG ERROR DEBUG DEBUG Failed to set default retries value ERROR: incomplete DB update information. old values result does not contain 2 rows sqlite3QueryResGet failed Adding Dictionary Value %s DEBUG Receiving attribute: %s Processing attribute: %s Processing attribute: %s Processing attribute: %s Processing attribute: %s radConfGet: " DEBUG DEBUG DEBUG DEBUG empty update. nRows=%d nCols=%d Error in executing DB update handler sqlite3QueryResGet failed Invalid SQLITE operation code - %d ERROR ERROR ERROR ERROR Added Server %s:%d with " Added Server %s:%d with " DEBUG DEBUG sqlite3QueryResGet failed empty result. nRows=%d nCols=%d ERROR ERROR Default Timeout Set to %d Default Retry Count Set to %d %s - %s : %d Deleting Server %s:%d with " DEBUG DEBUG DEBUG DEBUG sqlite3QueryResGet failed empty result. nRows=%d nCols=%d RADIUS Accounting Exchange Failed Unable to set debug for radAcct. ERROR ERROR ERROR ERROR Adding RowId:%d to Server %s:%d with " rowIds: %d - %d DEBUG DEBUG Unable to set debug level for radAcct. ERROR: option value not specified ERROR ERROR Deleting Server %s:%d with " RADIUS Deconfigured DEBUG DEBUG ERROR ERROR Found Option %s on line %d of file %s DEBUG Setting Option %s with value %s DEBUG RADIUS Configured DEBUG %d : Server %s:%d with " DBUpdate event: Table: %s opCode:%d rowId:%d DEBUG DEBUG ERROR: option value not specified Unable to initialize radius radEapMsgQueueAdd: Invalid EAP packet length(%d) radEapRecvTask: invalid EAP code:%d radEapRecvTask: Packet length mismatch %d, %d No attributes received in AccessChallenge message No State Attribute in Access Challenge message Host IP address: %s Adding Packet for existing cookie:%p DEBUG DEBUG radEapRecvTask: " failed to initialize UMI ERROR ERROR Adding Packet and cookie:%p Releasing Packet and cookie:%p Releasing Packet with cookie:%p DEBUG DEBUG DEBUG ERROR ERROR ERROR Received EAP-Identity from Pnac: %s Filling User-Name: %s DEBUG DEBUG umiRegister failed. errno=%d Invalid arguments to ioctl handler radEapSendRtn: Invalid Arguments radEapSendRtn: failed to allocate buffer umiIoctl failed Filling State: Filling EAP-Message: Filling Service-Type: %d Filling Framed-MTU: %d DEBUG DEBUG DEBUG DEBUG failed to initialize EAP message queue Unable to set debug for radEap. Unable to set debug level for radEap. ERROR: option value not specified ERROR ERROR ERROR ERROR Received Access -Challenge from Server Sending Reply EAP Packet to Pnac DEBUG DEBUG ERROR: option value not specified could not initialize MGMT framework ERROR ERROR Error sending packet to Pnac RADIUS Authentication Failed; " RADIUS Authentication Successful; " Got Packet with cookie:%p DEBUG DEBUG DEBUG DEBUG Unable to initialize radius Unable to set debug for radEap. Unable to set debug level for radEap. ERROR: option value not specified ERROR ERROR ERROR ERROR Next DNS Retry after 1 min Next Synchronization after" DEBUG DEBUG Unable to initialize radius Invalid username or password ERROR ERROR 216 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual Next Synchronization after" DEBUG Unable to set debug for radAuth. ERROR Next Synchronization after %d \ Primary is not available, " Secondary is not available, " DEBUG DEBUG DEBUG ERROR ERROR ERROR Invalid value for use default servers, " DEBUG Unable to set debug level for radAuth. ERROR: option value not specified Unable to initialize radius Invalid username, challenge or response No server is configured, " Backing off for %d seconds Requesting time from %s Synchronized time with %s DEBUG DEBUG DEBUG DEBUG Unable to set debug for radAuth. Unable to set debug level for radAuth. ERROR: option value not specified Unable to initialize radius ERROR ERROR ERROR ERROR Received KOD packet from %s No suitable server found %s DEBUG DEBUG Invalid username or password usage : %s <DB fileName> ERROR ERROR Received Invalid Length packet from %s Received Invalid Version packet from %s Received Invalid Mode packet from %s DEBUG DEBUG DEBUG ERROR ERROR ERROR Request Timed out from %s Looking Up %s DEBUG DEBUG ntpd : umi initialization failed ntpd : ntpInit failed ntpd : ntpMgmtInit failed There was an error while getting the timeZoneChangeScript." unexpected reply from %d cmd=%d ! Timezone difference :%d Could not open file: %s Could not read data from file ntpTblHandler DEBUG DEBUG DEBUG DEBUG ERROR ERROR ERROR ERROR status: %d DEBUG cmd %d not supported. caller %d default reached Unable to initialize ntpControl ntpMgmt : Couldn't open database %s ERROR : incomplete DB update information tz: %d DayLightsaving: %d pNtpControl>ServerNames[PRIMARY_SERVER]: %s pNtpControl>ServerNames[SECONDARY_SERVER] : %s DEBUG DEBUG empty update. nRows=%d nCols=%d Error in executing DB update handler ERROR ERROR DEBUG requestNtpTime: Invalid addr ERROR DEBUG ERROR DS: %d DEBUG failed to take lock for compId: %d failed to convert ioctl args to buffer for" pPriServ %s pSecServ %s DEBUG DEBUG ERROR ERROR Making request from %d --> %d sent request dst(%d) <-- src(%d) using option %d DEBUG request timeout dst(%d) <-- src(%d) failed to take lock for compId: %d umiIoctlArgsToBuf: failed to allocate memory umiRecvFrom: could not allocate memory received request too small!(%d bytes) Received a UMI request from %d DEBUG DEBUG ERROR ERROR sent a reply src(%d) ---> dst(%d) DEBUG umiRegister (%x,%x,%x,%x) srcId=%d(%s) --> destId=%d(%s) cmd=%d inLen=%d outLen=%d DEBUG waiting for reply...Giving Up DEBUG adpMalloc failed context with ID: %d already registered Failed to allocate memory for creating UMI context Failed to create recvSem for UMI context Failed to create mutex locks for UMI context Failed to create mutex recvQLock for UMI context No request in the list after semTake reply timeout DEBUG DEBUG Invalid arguments to umiIoctl could not find the destination context ERROR ERROR DEBUG DEBUG 217 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual timeout after semTake srcId=%d(%s) <-- destId=%d(%s) cmd=%d DEBUG memPartAlloc for %d size failed ERROR DEBUG ERROR Un-registerting component with Id %d failed to send ioctl request: dst(%d) <--src(%d) processed a reply dst(%d) <-- src(%d) request with no result option dst(%d) <-src(%d) DEBUG cmd = %s cmdstring is %s %s:%d DEBUG DEBUG memPartAlloc for %d size failed No Handler registered for this UMI context Couldn't find component with ID (%d)," id=%d handler=%x Received NULL buffer in umiBufToIoctlArgs() usbMgmtInit: unable to open the database file %s call to printConfig failed Calling printerConfig binary ... DEBUG ERROR Calling unmount for USB ... DEBUG Calling mount for USB ... DEBUG Failed to Disable Network Storage" Some error occurred while removing device Some error occurred while removing device usbdevice is %d %s:%d Query string: %s DEBUG DEBUG Sqlite update failed Failed to enable printer properly ERROR ERROR sqlite3QueryResGet failed.Query:%s %s: 1. usb is already disconnected for old usb type. " %s: 2.call disable for new usb type ! %s: 3. usb is already disconnected for old usb type. " %s: 4. Disabled old usb type . Now " DEBUG ERROR DEBUG DEBUG Failed to mount device on system Failed to enable network storage device" Failed to mount device on system DEBUG DEBUG Sqlite update failed USB1 Touch failed ERROR ERROR usbdevice is %d %s:%d USB: failed to begin transaction: %s DEBUG DEBUG USB2 Touch failed Sqlite update failed ERROR ERROR USB: SQL error: %s pSetString = %s DEBUG ERROR USB: failed to commit transaction: %s DEBUG USB: updated table: %s USB: returning with status: %s %s:DBUpdate event: Table: %s opCode:%d rowId:%d executing %s status =%d DEBUG DEBUG Failed query: %s Failed to execute usb database update handler Usage:%s <DBFile> <opType> <tblName> <rowId> Illegal invocation of snmpConfig (%s) DEBUG DEBUG Invalid Community Access Type Invalid User Access Type ERROR ERROR executing %s %s returned status=%d DEBUG DEBUG Invalid Security Level Invalid Authentication Algorithm ERROR ERROR %s returned status=%d snmpd.conf not found DEBUG DEBUG ERROR ERROR [SNMP_DEBUG] : Fwrite Successful DEBUG [SNMP_DEBUG] : Fwrite failed radPairGen: received unknown attribute %d of length %d radPairGen: %s has unknown type radPairLocate: unknown attribute %ld of length %d DEBUG Invalid Privacy Algorithm Invalid Argument Failed to allocate memory for engineID [SNMP_DEBUG]: Failed to get host address WARN WARN [SNMP_DEBUG] : FOPEN failed sqlite3QueryResGet failed.Query:%s ERROR ERROR WARN sqlite3QueryResGet failed.Query:%s ERROR radPairLocate: %s has unknown type Illegal invocation of cpuMemUsage (%s) WARN ERROR Invalid Security Level Invalid Authentication Algorithm ERROR ERROR DEBUG DEBUG DEBUG 218 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual cpuMemUsageDBUpdateHandler: SQL error: %s unable to open the DB file %s umiInit failed ERROR ERROR ERROR Invalid Privacy Algorithm Failed to Get Host Address Invalid version ERROR ERROR ERROR unable to register to UMI Error Reading from the Database. ERROR ERROR snmp v3 Trap Configuration Failed sqlite3QueryResGet failed query:%s ERROR ERROR short DB update event request! ERROR ERROR Error in executing DB update handler adpListNodeRemove : Returned with an error command too long. Try increasing " failed to allocate memory for CRON_NODE sqlite3QueryResGet failed There was an error while reading the schedules. unable to register to UMI short DB update event request! ERROR sqlite3QueryResGet failed.Query:%s Failed to Open Snmp Configuration File ERROR ERROR Failed to write access control entries Failed to write snmpv3 users entries ERROR ERROR ERROR ERROR Failed to write snmp trap entries Failed to write system entries. ERROR ERROR ERROR ERROR ERROR Failed to restart snmp %s failed with status Error in executing DB update handler ERROR ERROR ERROR malloc(DB_UPDATE_NODE) failed short ifDev event request! ERROR ERROR %s: Unable to open file: %s RADVD start failed ERROR ERROR sqlite3_mprintf failed ERROR ERROR no component id matching %s umiIoctl (%s, UMI_CMD_DB_UPDATE(%d)) failed. ERROR RADVD stop failed failed to create/open RADVD configuration file %s ERROR sqlite3_mprintf failed sqlite3_mprintf failed no component id matching %s umiIoctl (%s, UMI_CMD_IFDEV_EVENT(%d)) failed. klogctl(9) failed ERROR ERROR ERROR Restoring old configuration.. failed to write/update RADVD configuration file upnpDisableFunc failed upnpEnableFunc failed ERROR ERROR sqlite3QueryResGet failed.Query:%s Error in executing DB update handler ERROR ERROR malloc failed for %d bytes klogctl(4) failed emailLogs: Invalid Number of Arguments!! Exiting. sqlite3QueryResGet failed Could not execute the smtpClient. Error while cleaning the database.Exiting. %s ERROR ERROR unable to open the DB file %s umiInit failed ERROR ERROR ERROR ERROR ERROR unable to register to UMI short DB update event request! short ifDev event request! ERROR ERROR ERROR ERROR sqlite3_mprintf failed ERROR %s failed. status=%d ERROR ERROR ERROR ERROR ERROR ERROR ERROR Facility: System (Firewall) Log Message Severity Log Message Severity Enabling rule for protocol binding. Disabling rule for protocol binding. DEBUG DEBUG Disable all NAT rules. Enable all NAT rules. DEBUG DEBUG Enabling Remote SNMP on WAN. Disabling Remote SNMP on WAN DEBUG DEBUG Enabling NAT URL filter rules. Restarting all NAT rules. DEBUG DEBUG 219 Unified Services Router User Manual wan traffic counters are restared DEBUG Deleting schedule based firewall rules. Deleting schedule based firewall rules from DB. Update schedule based firewall rules in DB. Restart schedule based firewall rules. DEBUG Traffic limit has been reached Traffic meter monthly limit has been changed to %d. Enabling traffic meter for only dowload. DEBUG Enabling traffic meter for both directions. Enabling traffic meter with no limit. Email alert in traffic meter disabled. Email alert in traffic meter enabled. Traffic Meter:Monthly limit %d MB has been " Traffic Metering: Adding rule to drop all traffic Traffic Metering: %sabling Email traffic DEBUG DEBUG DEBUG DEBUG inter vlan routing enabled inter vlan routing disabled Disabling Content Filter for %d Enabling Content Filter for %d ./src/firewall/linux/user/firewalld.c:59:#u ndef ADP_DEBUG2 ./src/firewall/linux/user/firewalld.c:61:#d efine ADP_DEBUG2 printf Enabling Source MAC Filtering DEBUG DEBUG DEBUG DEBUG Disabling attack checks for IPv6 rules. DEBUG Disabling Source MAC Filtering Adding MAC Filter Policy for Block & Permit Rest Adding MAC Filter Policy for Permit & Block Rest DEBUG Enabling attack checks for IPv6 rules. Configuring one to one NAT settings with %s private start IP " Deleting forward one to one NAT having setting %s private start" Disabling attack check for Block ping to WAN interface. Disabling attack check for Stealth mode for tcp Disabling attack check for Stealth mode for udp DEBUG Restarting Source MAC Address Policy Disabling Firewall Rule for DHCP Relay Protocol Enabling Firewall Rule for DHCP Relay Protocol prerouting Firewall Rule add for Relay failed prerouting Firewall Rule add for Relay failed Deleting MAC Filter Policy for Address %s Adding MAC Filter Policy for Address %s DEBUG Disabling attack check for TCP Flood. DEBUG Disabling attack check for UDP Flood. DEBUG Disabling attack check for IPsec. DEBUG Disabling attack check for PPTP. Disabling attack check for L2TP. DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Disabling Firewall Rules for DMZ host Enabling Firewall Rules for DMZ host Disabling Firewall Rules for Spill Over Load Balancing Disabling Firewall Rules for Load Balancing Enabling Firewall Rules for Load Balancing Enabling Firewall Rules for Spill Over Load Balancing Enabling Firewall Rules for Auto Failover Enabling Firewall Rules for Load Balancing . Enabling Firewall Rules for Spill Over Load Balancing . Enabling Firewall Rules for Auto Failover Deleting BlockSites Keyword \ Disabling attack check for UDP Flood. DEBUG Disabling attack check for IPsec. DEBUG Disabling attack check for PPTP. DEBUG Disabling attack check for L2TP. Enabling attack check for Block ping to WAN " Enabling attack check for Stealth Mode for tcp. Enabling attack check for Stealth Mode for udp. DEBUG Enabling attack check for TCP Flood. Enabling attack check for UDP Flood. Enabling attack check for IPsec. Enabling attack check for PPTP. DEBUG DEBUG Enabling BlockSites Keyword \ Disabling BlockSites Keyword \ DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG 220 DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Unified Services Router User Manual Enabling attack check for L2TP. DEBUG Updating BlockSites Keyword from \ DEBUG Enabling attack check for UDP Flood. Enabling attack check for IPsec. Enabling attack check for PPTP. DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Enabling attack check for L2TP. Enabling DoS attack check with %d SyncFlood detect rate, " Disabling DoS attack check having %d SyncFlood detect rate," Enabling ICSA Notification Item for ICMP notification. Enabling ICSA Notification Item for Fragmented Packets. Enabling ICSA Notification Item for Multi cast Packets. Disabling ICSA Notification Item for ICMP notification. Disabling ICSA Notification Item for Fragmented Packets. Disabling ICSA Notification Item for Multi cast Packets. Adding IP/MAC binding rule for %s MAC address " Deleting IP/MAC binding rule for %s MAC " ./src/firewall/linux/user/firewalld.c:60:#un def ADP_DEBUG ./src/firewall/linux/user/firewalld.c:62:#def ine ADP_DEBUG printf Restarting traffic meter with %d mins, %d hours, " Updating traffic meter with %d mins, %d hours, " DEBUG Inserting BlockSites Keyword \ Deleting Trusted Domain \ Adding Trusted Domain \ Restarting Schedule Based Firewall Rules DEBUG Enabling Remote SNMP DEBUG DEBUG Disabling Remote SNMP DEBUG DEBUG Enabling Remote SNMP DEBUG DEBUG Disabling DOS Attacks DEBUG DEBUG Enabling DOS Attacks DEBUG DEBUG Enabling DOS Attacks DEBUG DEBUG DEBUG DEBUG Restarting Firewall [%d]:[%d] For %s restartStatus = %d for LogicalIfName = %s DEBUG Deleting Lan Group %s DEBUG DEBUG Adding Lan Group %s DEBUG DEBUG Deleting lan host %s from group %s DEBUG DEBUG DEBUG Deleting traffic meter. DEBUG Disabling block traffic for traffic meter. DEBUG Enabling traffic meter. DEBUG Adding lan group %s. DEBUG Deleting lan group %s. DEBUG Renaming lan group from %s to %s. Deleting host %s from %s group. DEBUG DEBUG Adding lan host %s from group %s Disabling Firewall Rule for IGMP Protocol Enabling Firewall Rule for IGMP Protocol Deleting IP/MAC Bind Rule for MAC address %s and IP " Adding IP/MAC Bind Rule for MAC address %s and IP Deleting Protocol Bind Rule for Service %s Deleting Protocol Bind Rule for Service %s Deleting Protocol Bind Rule for Service %s Adding Protocol Bind Rule for Service %s %s Session Settings Adding host %s to %s group. Enabling Keyword blocking for %s keyword. Disabling keyword Blocking for %s keyword . Deleting trusted domain with keyword %s. DEBUG DEBUG Adding %s keyword to trusted domain. Enabling Management Access from DEBUG DEBUG Restarting IPv6 Firewall Rules... Deleting Port Trigger Rule for %d:%d:%d:%d:%d Deleting Port Trigger Rule for %d:%d:%d:%d:%d Enabling Port Trigger Rule for %d:%d:%d:%d:%d Disabling Port Trigger Rule for %d:%d:%d:%d:%d Enabling Port Trigger Rule for DEBUG DEBUG DEBUG DEBUG DEBUG 221 DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Unified Services Router User Manual Internet on port %d Enabling remote access management for IP address range" Enabling remote access management to only this PC. Disabling Management Access from Internet on port %d Disabling remote access management for IP address range" Disabling remote access management only to this PC. MAC Filtering %sabled for BLOCK and PERMIT REST. MAC Filtering %sabled for PERMIT and BLOCK REST. Enabling Content Filtering. Disabling Content Filtering. Deleting rule, port triggering for protocol TCP. Deleting rule, port triggering for protocol UDP. Deleting rule, port triggering for protocol TCP. Deleting rule, port triggering for protocol UDP. Enabling rule, port triggering for protocol TCP. Enabling rule, port triggering for protocol UDP. Enabling rule, port triggering for protocol TCP. Enabling rule, port triggering for protocol UDP. %d:%d:%d:%d:%d DEBUG Disabling Port Trigger Rule for %d:%d:%d:%d:%d Adding Port Trigger Rule for %d:%d:%d:%d:%d DEBUG Enabling Content Filter DEBUG DEBUG Disabling Content Filter DEBUG DEBUG Enabling Content Filter Setting NAT mode for pLogicalIfName = %s DEBUG DEBUG DEBUG DEBUG DEBUG Enabling DROP for INPUT Enabling DROP for FORWARD Enabling NAT based Firewall Rules Setting transparent mode for pLogicalIfName \ DEBUG Enabling Accept for INPUT DEBUG DEBUG DEBUG DEBUG Enabling Accept for FORWARD Setting Routing mode for pLogicalIfName \ DEBUG Enabling DROP for INPUT DEBUG DEBUG Enabling DROP for FORWARD DEBUG DEBUG Disabling NAT based Firewall Rules Enabling Firewall Rules for URL Filtering & " DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Enabling DNS proxy. DEBUG Restarting DNS proxy. DEBUG checking DNS proxy for Secure zone. DEBUG checking DNS proxy for Public zone. DEBUG Adding Firewall Rule for RIP Protocol Restarting Schedule Based Firewall Rules enabling IPS checks between %s and %s zones. disabling IPS checks between %s and %s zones. Enabling Block traffic from %s zone. Configuring firewall session settings for " DEBUG DEBUG Stopping IPS...%s IPS started. DEBUG DEBUG Disabling DMZ DEBUG DEBUG Disabling WAN-DMZ rules . Enabling WAN DMZ rules . Restarting DMZ rule having %s address with %s address. Enabling LAN DHCP relay. OneToOneNat configured successfully DEBUG DEBUG Route already exists Route addition failed: Network Unreachable Route addition failed: Network is down DEBUG DEBUG DEBUG OneToOneNat configuration failed DEBUG Deleting scheduled IPv6 rules. delete from FirewallRules6 where ScheduleName = '%s'. DEBUG Route addition failed Failed to add rule in iptables Failed to delete rule from iptables fwLBSpillOverConfigure: Something going wrong here fwLBSpillOverConfigure: unable to get interfaceName fwLBSpillOverConfigure: Could not set PREROUTING rules DEBUG DEBUG DEBUG DEBUG 222 DEBUG DEBUG DEBUG DEBUG DEBUG ERROR ERROR ERROR Unified Services Router User Manual Update FirewallRules6 where ScheduleName = '%s' to New " DEBUG Dns proxy Restart failed DEBUG deleting interface to ifgroup failed DEBUG adding interface to ifgroup failed deleting interface pVirtIface %s from ifgroup %d" adding interface pVirtIface %s to ifgroup %d failed DEBUG Deleting IP address %s. DEBUG Adding new IP address %s. Updating old IP address %s to new IP address %s. Restarting Firewall For %s Address Update from %s:%s Disabling Firewall Rule for MSS packet marking Enabling Firewall Rule for MSS packet marking Enabling packet marking rule for %s IDLE timer Deleted firewall rule %s for service %s with action %s %s firewall rule %s for service %s with action %s Added firewall rule %s for service %s with action %s Deleting inbound(WAN-LAN) firewall rule. Deleting inbound(WAN-DMZ) firewall rule. RIPng disabled. DEBUG RIPng enabled. Disable IPv6 firewall rule. Enable IPv6 firewall rule. fwLBSpillOverConfigure: Could not set POSTROUTING rules fwLBSpillOverConfigure: Something going wrong Here fwL2TPGenericRules.c: unable to open the database file " ERROR ERROR ERROR ERROR DEBUG fwL2TPGenericRules.c: inet_aton failed fwPPTPGenericRules.c: unable to open the database file " fwPPTPGenericRules.c: inet_aton failed DNS proxy firewall rule add failed for %s deleting interface %s from ifgroup %d failed adding interface %s to ifgroup %d failed nimfBridgeTblHandler: unable to get interfaceName DEBUG nimfBridgeTblHandler: \ ERROR DEBUG nimfBridgeTblHandler: unable to get \ Failed to %s traffic from %s to %s to IPS. Failed to %s traffic from %s to %s to IPS. ERROR failed to start IPS service. Timeout in waiting for IPS service to start. Usage:%s <DBFile> <opType> <tblName> <rowId> " ERROR ERROR ERROR DEBUG DEBUG DEBUG xlr8NatConfig: illegal invocation of (%s) Illegal invocation of [%s] xlr8NatMgmtTblHandler: failed query: %s Could not open file: %s Rip Error Command Too Long Deleting IGMP proxy rule. Enable IGMP proxy rule. DEBUG DEBUG No authentication for Ripv1 Invalid Rip Direction ERROR ERROR Restarting IGMP rule. Traffic meter enabled with no limit type. Traffic meter enabled for only download. Traffic meter enabled for both directions. Deleted firewall rule %s for service %s with action %s %s firewall rule %s for service %s with action %s Added firewall rule %s for service %s with action %s Enabling Inter VLAN routing. DEBUG DEBUG DEBUG DEBUG Invalid Rip Version Invalid Password for 1st Key Invalid Time for 1st Key Invalid Password for 2nd Key ERROR ERROR ERROR ERROR DEBUG Invalid Time for 2nd Key ERROR DEBUG Invalid First KeyId ERROR DEBUG DEBUG Invalid Second KeyId Invalid Authentication Type ERROR ERROR Updating inter VLAN routing status. Deleting inter VLAN routing. DEBUG DEBUG ripDisable failed ripEnable failed ERROR ERROR DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG 223 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual Facility: Local0 (Wireless) Log Message (node=%s) setting %s to val = %d Severity DEBUG Log Message sqlite3QueryResGet failed Severity ERROR Custom wireless event: '%s' Wireless event: cmd=0x%x len=%d New Rogue AP (%02x:%02x:%02x:%02x:%02x:%02x) detected WPS session in progress, ignoring enrolle assoc request DEBUG DEBUG sqlite3QueryResGet failed VAP(%s) set beacon interval failed ERROR ERROR DEBUG VAP(%s) set DTIM interval failed ERROR DEBUG ERROR ran query %s DBUpdate event: Table: %s opCode:%d rowId:%d %sing VAPs using profile %s DEBUG VAP(%s) set RTS Threshold failed VAP(%s) set Fragmentation Threshold failed DEBUG DEBUG VAP(%s) set Protection Mode failed VAP(%s) set Tx Power failed ERROR ERROR %sing VAP %s ran query %s DEBUG DEBUG WDS Profile %s not found Failed to initalize WPS on %s ERROR ERROR %sing VAP instance %s DEBUG failed to get profile %s ERROR VAP(%s) set Short Preamble failed VAP(%s) set Short Retry failed DEBUG DEBUG could not initialize MGMT framework could not initialize MGMT framework ERROR ERROR VAP(%s) set Long Retry failed Decrypting context with key %s DEBUG DEBUG ERROR ERROR Unknown IAPP command %d received. unexpected reply from %d cmd=%d ! unexpected reply from %d cmd=%d ! Recvied DOT11_EAPOL_KEYMSG DEBUG DEBUG DEBUG DEBUG dot11VapBssidUpdt SQL error: %s sqlite3QueryResGet failed.Query:%s KDOT11_GET_PARAM(IEEE80211_I OC_CHANNEL) failed Failed to get the channel setting for %s sqlite3QueryResGet failed.Query:%s sqlite3QueryResGet failed.Query:%s shutting down AP:%s APCtx Found DEBUG DEBUG ERROR ERROR APCtx Not-Found DEBUG node not found *:*:*:%x:%x:%x error installing unicast key for %s DEBUG DEBUG profile %s not found sqlite3QueryResGet failed.Query:%s Interface name and policy must be specified Interface name and policy must be specified invalid ACL type %d cmd =%d i_type =%d i_val=%d join event for new node %s wpa/rsn IE id %d/%d not supported wpa IE id %d not supported DEBUG DEBUG DEBUG DEBUG interface name not specified interface name not specified Invalid interface - %s specified buffer length not specified ERROR ERROR ERROR ERROR leave event for node %s NodeFree request for node : %s DEBUG DEBUG Invalid length(%d) specified failed created iappdLock ERROR ERROR installing key to index %d DEBUG failed to create cipher contexts. ERROR iReq.i_val : %d pIfName : %s DEBUG DEBUG ERROR ERROR iReq.i_val : %d DEBUG setting mode: %d DEBUG Global counter wrapped, re-generating... DEBUG unable to register to UMI iappSockInit() failed iappInit got error, unregistering it with UMI umiIoctl(UMI_COMP_UDOT11,%d,%d ) failed umiIoctl(UMI_COMP_KDOT11,%d,%d ) failed 224 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router Got PNAC_EVENT_PREAUTH_SUCCESS event for : %s event for non-existent node %s PNAC_EVENT_EAPOL_START event received PNAC_EVENT_EAPOL_LOGOFF event received PNAC_EVENT_REAUTH event received PNAC_EVENT_AUTH_SUCCESS event received PNAC_EVENT_PORT_STATUS_CHAN GED event received User Manual DEBUG DEBUG unsupported event %d from PNAC event for non-existent node %s. Create new node. Add new node to DOT11 Node list DEBUG UDP failed, received Length is %d umiIoctl(UMI_COMP_KDOT11, umiIoctl(UMI_COMP_UDOT11,%d,%d )\ umiIoctl(UMI_COMP_KDOT11,%d,%d )\ No IAPP Node found for req id %d umiIoctl(UMI_COMP_UDOT11,%d,%d )\ umiIoctl(UMI_COMP_KDOT11,%d,%d )\ umiIoctl(UMI_COMP_UDOT11,%d,%d ) failed DEBUG DEBUG UDP socket is not created UDP send failed ERROR ERROR Update dot11STA database Add PMKSA to the list eapolRecvAuthKeyMsg: received key message DEBUG DEBUG IAPP: socket (SOCK_STREAM) failed. IAPP: TCP connect failed to %s. ERROR ERROR DEBUG ERROR node not found eapolRecvKeyMsg: replay counter not incremented eapolRecvKeyMsg: replay counter is not same processing pairwise key message 2 RSN IE matching: OK DEBUG DEBUG DEBUG DEBUG cmd %d not supported.sender=%d umiIoctl(UMI_COMP_KDOT11,%d,%d ) failed IAPP-CACHE-NOTIFY-REQUEST send to ./src/dot11/iapp/iappLib.c:1314: ADP_ERROR ( BSSID value passed is NULL reserved requestId is passed processing pairwise key message 4 processing group key message 2 processing key request message from client DEBUG DEBUG interface name is NULL IP address value passed is NULL ERROR ERROR DEBUG ERROR WPA version %2x %2x not supported DEBUG (%s) group cipher %2x doesn't match DEBUG (%s)Pairwise cipher %s not supported (%s) authentication method %d not supported %s:Auth method=%s pairwise cipher=%s IE size=%d WPA version %2x %2x not supported Unable to obtain IE of type %d DEBUG DEBUG DEBUG DEBUG opening receive UDP socket failed enabling broadcast for UDP socket failed opening receive TCP socket for new AP failed ./src/dot11/iapp/iappLib.c:1784: ADP_ERROR( ./src/dot11/iapp/iappLib.c:1794: ADP_ERROR( ./src/dot11/iapp/iappLib.c:1803: ADP_ERROR( failed created dot11dLock. failed initialize profile library. PTK state changed from %s to %s using PMKSA from cache DEBUG DEBUG failed to create cipher contexts. unable to register to UMI ERROR ERROR PTK GK state changed from %s to %s GK state changed from %s to %s DEBUG DEBUG ERROR ERROR Sending PTK Msg1 DEBUG could not create MIB tree unable to register to PNAC Max registration attempts by DOT11 to PNAC exceeded Sending PTK Msg3 Sending GTK Msg1 DEBUG DEBUG Creation of EAP WPS Profile Failed umiIoctl(UMI_COMP_IAPP,%d ) failed ERROR ERROR DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG 225 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual sending EAPOL pdu to PNAC... creating pnac authenticator with values %d %d - %s DEBUG DOT11_RX_EAPOL_KEYMSG: unknown ifname %s ERROR DEBUG cmd %d not supported.sender=%d ERROR Profile %s does not exist IAPP initialized. DEBUG DEBUG inteface name passed is NULL BSSID passed is NULL ERROR ERROR Encrypting context key=%s for could not find access point context for %s join event for existing node %s failed to send PNAC_FORCE_AUTHORIZED " failed to send PNAC_AUTHORIZED " failed to send PNAC_VAR_KEY_AVAIL ABLE (TRUE) " failed to send PNAC_VAR_KEY_TX_EN (TRUE) " failed to send PNAC_VAR_KEY_TX_EN (FALSE) " failed to send PNAC_FORCE_AUTHORIZED " DEBUG ERROR DEBUG DEBUG inteface name passed is NULL unable to allocate memory for DOT11_CTX unable to install wme mapping on %s DEBUG DEBUG unable to get %s mac address Failed to set %s SSID ERROR ERROR DEBUG Failed to set SSID broadcast status ERROR DEBUG Failed to set PreAuth mode ERROR DEBUG ERROR failed to send PNAC_AUTHORIZED " DEBUG unable to install key KDOT11_SET_PARAM:IEEE80211_I OC_AUTHMODE failed KDOT11_SET_PARAM:IEEE80211_I OC_PRIVACY failed mic verification: OK DEBUG ERROR pnacIfConfig: Invalid supplicant" Failed to process user request DEBUG DEBUG wpaInit failed dot11InstallProfile: unable to get interface index adpHmacInit(%s) failed Failed to process user request - %s(%d) pnacIfConfigUmiIoctl: umiIoctl failed pnacIfConfigUmiIoctl: usrPnac returned %d pnacIfConfigUmiIoctl: usrPnac returned %d pnacIfConfigUmiIoctl: usrPnac returned %d pnacKernNotifier: invalid PAE configuration " From pnacEapDemoAuthRecv: unsupported response " From pnacEapDemoAuthRecv: invalid codes received From pnacRadXlateDemoRecv: received unknown " From pnacRadXlateDemoRecv: invalid codes received Error from pnacRadXlateDemoRecv: malloc failed From pnacRadXlateRadPktHandle: received a non-supported" Only md5 authentication scheme currently supported. " DEBUG DEBUG interface %s not found AP not found on %s ERROR ERROR DEBUG keyLen > PNAC_KEY_MAX_SIZE ERROR DEBUG Invalid profile name passed ERROR DEBUG Creation of WPS EAP Profile failed ERROR DEBUG unsupported command %d ERROR DEBUG device %s not found ERROR DEBUG unsupported command %d ERROR DEBUG dot11NodeAlloc failed ERROR DEBUG Getting WPA IE failed for %s ERROR DEBUG ERROR DEBUG Getting WPS IE failed for %s Failed initialize authenticator for node %s Failed to get the system up time while adding node %s Message from authenticator: from pnacPDUXmit: bufsize = %d, pktType = %d," pnacPDUXmit: sending eap packet. code = %d, " DEBUG error creating PNAC port for node %s ERROR DEBUG dot11NodeAlloc failed ERROR DEBUG Invalid arguments. ERROR DEBUG DEBUG 226 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router pnacRecvRtn: no corresponding pnac port pae found sending unicast key User Manual DEBUG DEBUG umiIoctl(UMI_COMP_IAPP,%d) failed Invalid IE. umiIoctl(UMI_COMP_KDOT11_VAP, %d ) failed umiIoctl(UMI_COMP_KDOT11,%d ,%d) failed KDOT11_SET_PARAM:IEEE80211_I OC_WME_CWMIN failed KDOT11_SET_PARAM:IEEE80211_I OC_WME_CWMAX failed KDOT11_SET_PARAM:IEEE80211_I OC_WME_AIFS failed KDOT11_SET_PARAM:80211_IOC_ WME_TXOPLIMIT failed KDOT11_SET_PARAM:IEEE80211_I OC_WME_ACM failed KDOT11_SET_PARAM:IEEE80211_I OC_WME failed ERROR ERROR ERROR sending broadcast key from pnacAuthPAEDisconnected: calling pnacTxCannedFail from pnacAuthPAEForceUnauth: calling pnacTxCannedFail DEBUG state changed from %s to %s PNAC user comp id not set. dropping event %d DEBUG sending event %d to %d DEBUG requesting keys informantion from %d pnacUmiPortPaeParamSet: error in getting port pae pnacUmiPortPaeParamSet: invalid param - %d pnacRecvASInfoMessage: Skey of length %d set pnacRecvASInfoMessage: reAuthPeriod set to: %d pnacRecvASInfoMessage: suppTimeout set to: %d DEBUG PORT SUCCESSFULLY DESTROYED DEBUG creating physical port for %s pnacAuthInit: using defualt pnacAuthParams pnacSuppInit: using defualt pnacSuppParams Error from pnacCombinedStMachTriggerFunc: " Error from pnacCombinedStMachTriggerFunc: " Error from pnacCombinedStMachTriggerFunc: " Error from pnacCombinedStMachTriggerFunc: " Error from pnacCombinedStMachTriggerFunc: " Error from pnacCombinedStMachTriggerFunc: " Error from pnacCombinedStMachTriggerFunc: " Error from pnacCombinedStMachTriggerFunc: " Error from pnacCombinedStMachTriggerFunc: " DEBUG invalid group cipher %d KDOT11_SET_PARAM:IEEE80211_I OC_MCASTCIPHER failed KDOT11_SET_PARAM:IEEE80211_I OC_MCASTKEYLEN failed KDOT11_SET_PARAM:IEEE80211_I OC_UCASTCIPHERS failed KDOT11_SET_PARAM:IEEE80211_I OC_KEYMGTALGS failed KDOT11_SET_PARAM:IEEE80211_I OC_WPA failed DEBUG unknow cipher type = %d ERROR DEBUG umiIoctl(UMI_COMP_IAPP,%d) failed ERROR DEBUG invalid media value=%d ERROR DEBUG invalid mediaOpt value=%d ERROR DEBUG invalid mode value=%d ERROR DEBUG dot11PnacIfCreate failed ERROR DEBUG wpaPRF failed ERROR DEBUG ERROR DEBUG Error generating global key counter wpaCalcMic: unsupported key descriptor version integrity failed. need to stop all stations " couldn't find AP context for %s interface received a pdu on %s pnacRecvMapi: protoType: %04x pPhyPort->authToASSendRtn:%p DEBUG dot11Malloc failed ERROR DEBUG ERROR port not found DEBUG dot11Malloc failed eapolRecvKeyMsg: unknown descType =%d DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG 227 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router from pnacRecvMapi: pkt body len = %d, pktType = %d from pnacPDUProcess: received PNAC_EAP_PACKET User Manual from pnacPDUProcess: currentId = %d from pnacPDUProcess: code = %d, identifier = %d, " from pnacPDUProcess: setting rxResp true from pnacPDUProcess: code = %d, identifier = %d, " DEBUG from pnacPDUProcess: received " DEBUG from pnacPDUProcess: received " from pnacPDUProcess: received PNAC_EAPOL_KEY_PACKET DEBUG doing pnacTxCannedFail DEBUG doing pnacTxCannedSuccess doing pnacTxReqId DEBUG DEBUG doing pnacTxReq DEBUG doing pnacTxStart DEBUG doing pnacTxLogoff DEBUG doing pnacTxRspId: 1st cond DEBUG doing pnacTxRspId: entering 2nd cond from pnacTxRspId: code = %d, identifier = %d, length = %d, " doing pnacTxRspId: 2nd cond DEBUG eapolRecvKeyMsg: invalid descriptor version eapolRecvKeyMsg: incorrect descriptor version eapolRecvKeyMsg: Ack must not be set eapolRecvKeyMsg: MIC bit must be set wpaAuthRecvPTKMsg2: unexpected packet received wpaAuthRecvPTKMsg2: mic check failed wpaAuthRecvPTKMsg2: rsn ie mismatch wpaAuthRecvPTKMsg4: unexpected packet received wpaAuthRecvPTKMsg4: keyDataLength not zero wpaAuthRecvPTKMsg4: mic check failed wpaAuthRecvGTKMsg2: unexpected packet received secureBit not set in GTK Msg2 wpaAuthRecvGTKMsg2: keyDataLength not zero wpaAuthRecvGTKMsg2: mic check failed wpaAuthRecvKeyReq: unexpected packet received wpaAuthRecvKeyReq: keyDataLength not zero wpaAuthRecvKeyReq: mic check failed DEBUG DEBUG invalid OUI %x %x %x (%s) invalid OUI %x %x %x ERROR ERROR doing pnacTxRspAuth: 1st cond doing pnacTxRspAuth: 2nd cond message for unknown port PAE from pnacACToSuppRecvRtn: calling pnacEapPktRecord from pnacEapPktRecord: code = %d, identifier = %d, " from pnacEapPktRecord: received success pkt from pnacEapPktRecord: received failure pkt from pnacEapPktRecord: received request pkt unknown EAP-code %d DEBUG DEBUG DEBUG [%s:%d] Cipher in WPA IE : %x (%s) invalid OUI %x %x %x short WPA IE (length = %d) received ERROR ERROR ERROR DEBUG PTK state machine in unknown state. ERROR DEBUG ERROR DEBUG dot11InstallKeys failed group state machine entered into WPA_AUTH_GTK_INIT DEBUG dot11Malloc failed ERROR DEBUG DEBUG dot11Malloc failed dot11Malloc failed ERROR ERROR Authenticator[%d]: Auth PAE state = %s Auth Reauth state = %s DEBUG DEBUG DEBUG aesWrap failed unknown key descriptor version %d dot11Malloc failed ERROR ERROR ERROR Back auth state = %s DEBUG could not initialize AES128ECB ERROR Supplicant[%d]: Supp Pae state = %s DEBUG DEBUG could not initialize AES-128-ECB MD5 initialization failed ERROR ERROR DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG 228 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router from pnacBackAuthFail: calling pnacTxCannedFail %s returned ERROR pnacUmiIoctlHandler: cmd: %s(%d) User Manual DEBUG DEBUG DEBUG RC4 framework initialization failed PNAC framework initialization failed ERROR: option value not specified ERROR ERROR ERROR %s not configured for 802.1x could not process PDU received from the wire pnacPDUForward: failed to foward the received PDU Creating PHY port with AUTH backend : %s SendRtn: %p RecvRtn:%p pnacUmiAuthConfig: %s not configured for 802.1x pnacSuppRegisterUserInfo: not a valid AC DEBUG ERROR: -u can be used only with -s ERROR DEBUG ERROR: user-name not specified ERROR DEBUG failed to enable debug ERROR DEBUG [%s]: failed to convert string to MAC " ERROR DEBUG ERROR pnacIfConfig: autoAuth Enabled pnacSendRtn: no pnac port pae found for " DEBUG sending portStatus: %s[%d] to dot11 pnacRecvASInfoMessage: Rkey of length %d set DEBUG ASSendRtn: %p ASToAuthRecv: %p adpRand failed:unable to generate random unicast key using group key as unicast key Integrity check failed more than once in last 60 secs. MIC failed twice in last 60 secs, taking countermeasures DEBUG WARN WARN failed to initialize UMI pnacPhyPortParamSet:invalid arguments pnacPhyPortParamSet:Failed to create socket Error from pnacPhyPortParamSet:%s device invalid Error from pnacPhyPortParamSet:%s Getting MAC address " pnacPhyPortParamSet:Failed to add 802.1X multicast " pnacIsInterfaceUp: failed to create a raw socket pnacIsInterfaceUp: failed to get interface flags failed to allocate buffer WARN UMI initialization failed ERROR WARN ERROR Failed to set dot11 port status WARN PTK state machine in NO_STATE. WARN PTK state machine in NO_STATE!! WARN PMKSA refcount not 1 WARN IV verification failednknown subtype> pnacIfConfig: overwriting previous interface " WARN UMI initialization failed Error from pnacEapDemoAuthLibInit: malloc failed Error from pnacEapDemoAuthRecv: received null EAP pkt Error from pnacEapDemoAuthRecv: send " Error from pnacRadXlateASAdd: cannot open socket Error from pnacRadXlateDemoRecv: received null EAP pkt ERROR pnacIfConfig: overwriting previous " pnacIfConfig: overwriting previous username" WARN ERROR DEBUG DEBUG DEBUG WARN pnacIfConfig: overwriting previous password" WARN %s: Failed to set port status WARN %s: Failed to notify event to dot11 WARN From pnacRadXlateDemoRecv: send " Error from pnacRadXlateDemoRecv: radius " Error from pnacRadXlateDemoRecv: radius " Error from pnacRadXlateRadIdRespSend: send to failed Error from pnacRadXlateRadNonIdRespSend: send to failed Error from pnacRadXlateRadRecvProc: recvfrom failed pnacLibDeinit: Failed to destroy the WARN From WARN 229 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual phyPort:%s pnacBackAuthSuccess: failed to notify the destination " WARN could not initialize MGMT framework ERROR umiInit failed ERROR iappInit failed ERROR could not initialize IAPP MGMT. ERROR dot11Malloc failed ERROR buffer length not specified ERROR pnacRadXlateRadPktIntegrityChk: no corresponding " Error from pnacRadXlateRadPktIntegrityChk: no message " Error from pnacRadXlateRadPktIntegrityChk: " From pnacRadXlateRadChalPktHandle: no encapsulated eap " Error from pnacRadXlateRadChalPktHandle: malloc for eap " Error from pnacEapDemoSuppUserInfoRegister: invalid " Error from pnacEapDemoSuppRecv: received null EAP pkt Error from pnacEapDemoSuppRecv: send ptr to pnac supplicant" From pnacEapDemoSuppRecv: user info not entered yet Error from pnacEapDemoSuppRecv: couldn't " Invalid length(%d) specified Failed to get information about authorized AP list. Recd IE data for non-existent AP %s ERROR MDString: adpDigestInit for md5 failed ERROR ERROR ERROR pnacUmiInit: UMI initialization failed could not start PNAC task ERROR ERROR Recd IE data for wrong AP %s Received Invalid IE data from WSC ERROR ERROR ERROR ERROR Recd IE data for non-existent AP %s Recd WSC Start command without interface name ERROR Recd WSC start for non-existent AP %s ERROR Recd WSC start for wrong AP %s Unable to send WSC_WLAN_CMD_PORT to WSC Failed to get the ap context for %s WPS can only be applied to WPA/WPA2 security profiles ERROR invalid aruments pnacIfNameToIndex failed pnacPhyPortParamSet: device invalid %s%d pnacPhyPortParamSet: EIOCGADDR ioctl failed pnacPhyPortParamSet: multicast addr add ioctl failed pnacPhyPortParamUnset: multicast addr del ioctl failed ERROR ERROR wpsEnable: running wsccmd failed Failed to get the ap context for %s WPS conf. under non WPA/WPA2 security setting Failed to reset the Beacon Frame IE in the driver Failed to reset the Beacon Frame IE in the driver ERROR ERROR WPS method cannot be NULL PIN value length should be a multiple of 4 !! Failed to initiate PIN based association, PIN = %s ERROR ERROR pnacPDUXmit: Invalid arguments pnacPDUXmit: failed to get M_BLK_ID from pnacIsInterfaceUp: device %s%d invalid pnacRecvRtn: dropping received packet as port is" pnacSendRtn: Invalid arguments pnacSendRtn: no physical port corresponding to" pnacSendRtn: dropping packet as port" pnacAuthBuildRC4KeyDesc: adpEncryptInit(RC4) failed pnacAuthBuildRC4KeyDesc: adpCipherContextCtrl" pnacDot11UserSet: incorrect buffer length ERROR PNAC user component id not set. ERROR pnacPortPaeDeconfig:kpnacPortPaeDec onfig failed pnacPortPaeDeconfig:kpnacPortPaeDec onfig failed WARN WARN ERROR ERROR ERROR ERROR ERROR ERROR ERROR 230 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router Failed to initiate PBC based enrolle association Invalid association mode. (Allowed modes : PIN/PBC) User Manual pnacKeyInfoGet:failed to allocate buffer PNAC user comp id not set. dropping EAPOL key pkt pnacUmiPortPaeParamSet: invalid buffer received ERROR ERROR wpsEnable: running wsccmd failed Failed to send QUIT command to WSC from DOT11 Failed to clear off the WPS process ERROR missing profile name A profile exists with the same name Error in allocating memory for profile ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Error from pnacRecvASInfoMessage: " pnacRecvASInfoMessage: " pnacRecvASInfoMessage: Bad info length Error from pnacLibInit: malloc failed could not create phy ports lock missing profile name missing profile name Profile name and interface name must be specified Profile %s does not exist Could not set profile %s on the interface %s ERROR ERROR could not create nodes ports lock port exists for iface - %s ERROR ERROR ERROR ERROR pnacPhyPortCreate failed kpnacPhyPortCreate failed ERROR ERROR ERROR ERROR missing profile name Profile %s does not exist ERROR ERROR Profile %s does not exist ERROR SSID should not be longer than %d ERROR invalid argument pnacAuthConfig: maxAuth limit reached pnacAuthConfig: malloc failed Error from pnacAuthConfig: pAsArg cannot be NULL Error from pnacAuthConfig: receive routine hook " Profile %s does not exist Profile %s does not exist ERROR ERROR pnacAuthConfig: pnacAuthInit failed kpnacPortPaeConfig failed ERROR ERROR Profile %s does not exist ERROR ERROR Profile %s does not exist ERROR Profile %s does not exist ERROR Profile %s does not exist SSID not set. SSID is needed to generate password hash ERROR Invalid arguments Error from pnacSuppConfig: malloc failed Error from pnacSuppConfig: receive routine hook " Error from pnacSuppConfig: pnacSuppInit failed ERROR Password string too big ERROR dot11Malloc failed ERROR Profile %s does not exist Hex string should only have %d hex chars ERROR kpnacPortPaeConfig failed pnacAuthDeconfig failed: pPortPae NULL Error from pnacPhyPortDestroy: port not configured pnacPhyPortDestroy: Failed to deconfigure port ERROR dot11Malloc failed ERROR Profile %s does not exist invalid key index %d. key index should be 0-3. ERROR wepKey length incorrect ERROR Profile %s does not exist ERROR pnacPhyPortParamUnset FAILED Error from pnacPhyPortCreate: malloc failed Error from pnacPhyPortCreate: pnacPhyPortParamSet" error from pnacPhyPortCreate: malloc failed Error from pnacAuthInit: pnacPortTimersInit failed Error from pnacAuthInit: pnacAuthPAEInit failed ERROR ERROR ERROR 231 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual Invalid Cipher type %d Profile supports WEP stas,Group cipher must be WEP ERROR Profile %s does not exist ERROR Profile %s does not exist ERROR Profile %s does not exist invalid pairwise cipher type %d ERROR ERROR Cipher %s is already in the list. ERROR Profile %s does not exist ERROR Invalid Cipher type %d ERROR Cipher %s not found in the list. ERROR Profile %s does not exist ERROR Profile %s does not exist ERROR Auth method %s is already in the list ERROR Profile %s does not exist ERROR Auth method %s not found in the list. ERROR Profile %s does not exist ERROR Profile %s does not exist ERROR Profile %s does not exist invalid type value %d. supported values are 1,2,3,4 ERROR Profile %s does not exist invalid type value %d. supported values are 1,2,3,4 ERROR Profile %s does not exist invalid type value %d. supported values are 1,2,3,4 ERROR Profile %s does not exist invalid type value %d. supported values are 1,2,3,4 ERROR Profile %s does not exist invalid type value %d. supported values are 1,2,3,4 ERROR Profile %s does not exist ERROR: incomplete DB update information. ERROR old values result does not contain 2 rows sqlite3QueryResGet failed Error from pnacAuthInit: pnacAuthKeyTxInit failed Error from pnacAuthInit: pnacReauthTimerInit failed Error from pnacAuthInit: pnacBackAuthInit failed Error from pnacAuthInit: pnacCtrlDirInit failed Error from pnacAuthInit: pnacKeyRecvInit failed Error from pnacSuppInit: malloc failed Error from pnacSuppInit: pnacPortTimersInit failed Error from pnacSuppInit: pnacKeyRecvInit failed Error from pnacSuppInit: pnacSuppKeyTxInit failed Error from pnacSuppInit: pnacSuppPAEInit failed Error from pnacRecvRtn: invalid arguments Error from pnacRecvMapi: unsupported PDU received ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR suppToACSendRtn returned not OK! Error from pnacBasicPktCreate: malloc failed Error from pnacEAPPktCreate: basic pkt create failed Error from pnacTxCannedFail: eap pkt create failed Error from pnacTxCannedSuccess: eap pkt create failed Error from pnacTxReqId: eap pkt create failed Error from pnacTxReq: eap pkt create failed Error from pnacSendRespToServer: malloc failed Error from pnacSendRespToServer: no AS configured Error from pnacTxStart: basic pkt create failed Error from pnacTxStart: basic pkt create failed Error from pnacTxRspId: eap pkt create failed Error from pnacTxRspAuth: eap pkt create failed Error from pnacEapPktRecord: EAP packet too" ERROR ERROR ERROR Error from pnacEapPktRecord: " from pnacBackAuthTimeout: calling pnacTxCannedFail hmac_md5: adpHmacContextCreate failed ERROR ERROR hmac_md5:adpHmacInit failed pnacUmiIoctlHandler: invalid cmd: %d ERROR ERROR ERROR ERROR ERROR ERROR ERROR 232 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual Error in executing DB update handler ERROR sqlite3QueryResGet failed ERROR: incomplete DB update information. ERROR pnacEapRadAuthSend: Invalid arguments pnacEapRadAuthSend: failed to allocate inbuffer ERROR pnacXmit : umiIoctl failed[%d] ERROR old values result does not contain 2 rows ERROR ERROR sqlite3QueryResGet failed ERROR Error in executing DB update handler ERROR sqlite3QueryResGet failed.Query:%s ERROR sqlite3QueryResGet failed.Query:%s ERROR sqlite3QueryResGet failed.Query:%s ERROR sqlite3QueryResGet failed.Query:%s ERROR startStopVap failed to stop %s ERROR Invalid SQLITE operation code - %d ./src/dot11/mgmt/dot11Mgmt.c:1177: ADP_ERROR ( only delete event expected on dot11RogueAP. ERROR pnacPDUForward: Invalid input pnacPDUForward: error in getting port pae information pnacPDUForward: error allocating memory pnacUmiIfMacAddrChange: %s not configured for 802.1x pnacUmiIfMacAddrChange: could not process PDU received" pnacUmiPhyPortConfig: Invalid config data pnacUmiPhyPortConfig: Invalid backend name specified pnacUmiPhyPortConfig: could not create PNAC physical" pnacUmiAuthConfig: Invalid config data pnacUmiAuthConfig: Invalid backend name specified ERROR sqlite3QueryResGet failed ERROR unhandled database operation %d ERROR sqlite3QueryResGet failed ERROR failed to configure WPS on %s ERROR sqlite3QueryResGet failed ERROR sqlite3QueryResGet failed ERROR sqlite3QueryResGet failed ERROR sqlite3QueryResGet failed ERROR sqlite3QueryResGet failed no VAP rows returned. expected one multiple VAP rows returned. expected one ERROR ERROR unable to create new EAP context. unable to apply %s profile on the EAP context. pnacUmiAuthConfig: could not configure PNAC PAE " pnacUmiSuppConfig: Invalid config data pnacUmiSuppConfig: Invalid backend name specified pnacUmiSuppConfig: %s not configured for 802.1x pnacUmiSuppConfig: could not PNAC port Access" pnacUmiSuppConfig: Failed to register user information pnacPortByMacDeconfig: port not found pnacPortByMacDeconfig: port not found pnacUmiIfDown: Invalid config data ERROR sqlite3QueryResGet failed ERROR invalid query result. ncols=%d nrows=%d ERROR %s:VAP(%s) create failed ERROR sqlite3QueryResGet failed ERROR invalid query result. ncols=%d nrows=%d ERROR pnacUmiIfDown: Invalid config data Error from pnacPortDeconfig: port not configured pnacUmiIfDown: could not deconfigure port pnacUmiPhyPortDestroy: Invalid config data pnacUmiPhyPortDestroy: Invalid config data pnacUmiPhyPortDestroy: Failed to destroy the port ERROR ERROR ERROR 233 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual Invalid config data ERROR Facility: Kernel Log Message DNAT: multiple ranges no longer supported DNAT: Target size %u wrong for %u ranges, Severity Log Message Severity DEBUG %s: %s%s:%d -> %s:%d %s, DEBUG DEBUG DEBUG DNAT: wrong table %s, tablename DNAT: hook mask 0x%x bad, hook_mask %s%d: resetting MPPC/MPPE compressor, DEBUG %s%d: wrong offset value: %d, %s%d: wrong length of match value: %d, %s%d: too big offset value: %d, DEBUG DEBUG DEBUG %s: %s%s:%d %s, %s: Failed to add WDS MAC: %s, dev>name, %s: Device already has WDS mac address attached, %s: Added WDS MAC: %s, dev>name, %s: WDS MAC address %s is not known by this interface, [madwifi] %s() : Not enough space., __FUNCTION__ Returning to chan %d, ieeeChan %s%d: cannot decode offset value, %s%d: wrong length code: 0x%X, %s%d: short packet (len=%d), __FUNCTION__, %s%d: bad sequence number: %d, expected: %d, %s%d: bad sequence number: %d, expected: %d, DEBUG DEBUG WEP AES DEBUG DEBUG DEBUG AES_CCM DEBUG DEBUG CKIP DEBUG DEBUG TKIP DEBUG PPPIOCDETACH file->f_count=%d, PPP: outbound frame not passed PPP: VJ decompression error DEBUG DEBUG DEBUG %s: cannot map channel to mode; freq %u flags 0x%x, %s: %s, vap->iv_dev->name, buf %s: [%s] %s, vap->iv_dev->name, DEBUG DEBUG DEBUG PPP: inbound frame not passed DEBUG PPP: reconstructed packet DEBUG PPP: no memory for DEBUG missed pkts %u..%u, %s%d: resetting MPPC/MPPE compressor, DEBUG %s%d: wrong offset value: %d, %s%d: wrong length of match value: %d, DEBUG DEBUG %s: [%s] %s, vap->iv_dev->name, ether_sprintf(mac), buf [%s:%s] discard %s frame, %s, vap>iv_dev->name, [%s:%s] discard frame, %s, vap>iv_dev->name, [%s:%s] discard %s information element, %s, [%s:%s] discard information element, %s, [%s:%s] discard %s frame, %s, vap>iv_dev->name, [%s:%s] discard frame, %s, vap>iv_dev->name, %s%d: too big offset value: %d, %s%d: cannot decode offset value, %s%d: wrong length code: 0x%X, %s%d: short packet (len=%d), __FUNCTION__, %s%d: bad sequence number: %d, expected: %d, DEBUG DEBUG DEBUG ifmedia_add: null ifm Adding entry for ifmedia_set: no match for 0x%x/0x%x, DEBUG DEBUG DEBUG DEBUG ifmedia_set: target DEBUG DEBUG ifmedia_set: setting to DEBUG DEBUG DEBUG DEBUG 234 DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Unified Services Router User Manual %s%d: bad sequence number: %d, expected: %d, DEBUG PPPIOCDETACH file->f_count=%d, DEBUG DEBUG ifmedia_ioctl: no media found for 0x%x, ifmedia_ioctl: switching %s to , dev>name PPP: outbound frame not passed PPP: VJ decompression error DEBUG DEBUG ifmedia_match: multiple match for <unknown type> DEBUG DEBUG PPP: inbound frame not passed PPP: reconstructed packet PPP: no memory for missed pkts %u..%u, DEBUG DEBUG DEBUG DEBUG desc->ifmt_string mode %s, desc->ifmt_string <unknown subtype> %s, desc->ifmt_string DEBUG DEBUG DEBUG DEBUG %s: INC_USE_COUNT, now %d, __FUNCTION__, mod_use_count \ DEBUG %s%s, seen_option++ ? , : , DEBUG %s: DEC_USE_COUNT, now %d, __FUNCTION__, mod_use_count \ DEBUG %s%s, seen_option++ ? , : , DEBUG PPPOL2TP %s: _fmt, PPPOL2TP: --> %s, __FUNCTION__) DEBUG DEBUG DEBUG DEBUG PPPOL2TP: <-- %s, __FUNCTION__) DEBUG %s: recv: , tunnel->name DEBUG %s: xmit:, session->name DEBUG %s: xmit:, session->name DEBUG %s, seen_option ? > : %s: %s, dev->name, buf %s: no memory for sysctl table!, __func__ %s: no memory for VAP name!, __func__ %s: failed to register sysctls!, vap>iv_dev->name %s: no memory for new proc entry (%s)!, __func__, %s: module use_count is %d, __FUNCTION__, mod_use_count DEBUG %s: 0x%p len %u, tag, p, len DEBUG PPPOL2TP %s: _fmt, PPPOL2TP: --> %s, __FUNCTION__) PPPOL2TP: <-- %s, __FUNCTION__) %s: recv: , tunnel->name DEBUG DEBUG DEBUG DEBUG %03d:, i %02x, ((u_int8_t *)p)[i] first difference at byte %u, i %s: , t->name DEBUG DEBUG DEBUG DEBUG %s: xmit:, session->name %s: xmit:, session->name DEBUG DEBUG FAIL: ieee80211_crypto_newkey failed FAIL: ieee80211_crypto_setkey failed DEBUG DEBUG PPPOL2TP %s: _fmt, PPPOL2TP: --> %s, __FUNCTION__) PPPOL2TP: <-- %s, __FUNCTION__) DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG %s: recv: , tunnel->name %s: xmit:, session->name DEBUG DEBUG FAIL: unable to allocate skbuff FAIL: wep decap failed FAIL: decap botch; length mismatch FAIL: decap botch; data does not compare FAIL: wep encap failed %s: xmit:, session->name IRQ 31 is triggered [%s:%d] , __func__, __LINE__\ \t[R%s %#0x %#0x 0x%08x%08x], (status == ERROR ? # : ), page, addr, (uint32_t)(*pValue >> 32), (uint32_t)(*pValue & 0xffffffff) \t[W%s %#0x %#0x 0x%08x%08x], (status == ERROR ? # : ), page, addr, (uint32_t)(value >> 32), (uint32_t)(value & 0xffffffff) %s: mac_add %02X:%02X:%02X:%02X:%02X:%02X, dev->name, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5] DEBUG DEBUG DEBUG FAIL: encap data length mismatch FAIL: encrypt data does not compare PASS DEBUG DEBUG DEBUG DEBUG %u of %u 802.11i WEP test vectors passed, pass, total DEBUG DEBUG %s: 0x%p len %u, tag, p, len DEBUG DEBUG %03d:, i DEBUG 235 DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Unified Services Router %s: mac_del %02X:%02X:%02X:%02X:%02X:%02X, dev->name, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5] %s: mac_kick %02X:%02X:%02X:%02X:%02X:%02X, dev->name, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5] %s: mac_undefined %02X:%02X:%02X:%02X:%02X:%02X, dev->name, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5] %s: addr_add %02X:%02X:%02X:%02X:%02X:%02X, dev->name, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5] %s: addr_del %02X:%02X:%02X:%02X:%02X:%02X, dev->name, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5] %s: mac_undefined %02X:%02X:%02X:%02X:%02X:%02X, dev->name, addr[0], addr[1], addr[2], addr[3], addr[4], addr[5] %s: set_float %d;%d, IRQ 32 is triggered ip_finish_output2: No header cache and no neighbour! User Manual DEBUG %02x, ((u_int8_t *)p)[i] DEBUG DEBUG first difference at byte %u, i DEBUG DEBUG %s: , t->name DEBUG DEBUG FAIL: ieee80211_crypto_newkey failed DEBUG DEBUG FAIL: ieee80211_crypto_setkey failed DEBUG DEBUG DEBUG DEBUG FAIL: unable to allocate skbuff FAIL: ccmp encap failed FAIL: encap data length mismatch DEBUG DEBUG DEBUG DEBUG FAIL: encrypt data does not compare DEBUG a guy asks for address mask. Who is it? icmp v4 hw csum failure) DEBUG DEBUG DEBUG DEBUG expire>> %u %d %d %d, expire, expire++ %u %d %d %d, expire, DEBUG DEBUG FAIL: ccmp decap failed FAIL: decap botch; length mismatch FAIL: decap botch; data does not compare PASS rt_cache @%02x: %u.%u.%u.%u, hash, rt_bind_peer(0) @%p, NET_CALLER(iph) DEBUG %u of %u 802.11i AES-CCMP test vectors passed, pass, total DEBUG DEBUG %s: 0x%p len %u, tag, p, len DEBUG ip_rt_advice: redirect to ip_rt_bug: %u.%u.%u.%u -> %u.%u.%u.%u, %s, DEBUG %03d:, i DEBUG DEBUG %02x, ((u_int8_t *)p)[i] DEBUG udp cork app bug 2) udp cork app bug 3) udp v4 hw csum failure.) UDP: short packet: From %u.%u.%u.%u:%u %d/%d to %u.%u.%u.%u:%u, UDP: bad checksum. From %d.%d.%d.%d:%d to %d.%d.%d.%d:%d ulen %d, %s: lookup policy [list] found=%s, %s: called: [output START], __FUNCTION__ DEBUG DEBUG DEBUG first difference at byte %u, i ieee80211_crypto_newkey failed ieee80211_crypto_setkey failed DEBUG DEBUG DEBUG DEBUG unable to allocate skbuff DEBUG DEBUG DEBUG tkip enmic failed enmic botch; length mismatch DEBUG DEBUG DEBUG enmic botch DEBUG %s: flow dst=%s, __FUNCTION__, XFRMSTRADDR(fl->fl4_dst, family) DEBUG tkip encap failed DEBUG %s: flow src=%s, __FUNCTION__, XFRMSTRADDR(fl->fl4_src, family) DEBUG encrypt phase1 botch DEBUG 236 DEBUG DEBUG Unified Services Router User Manual %s: flow dst=%s, __FUNCTION__, XFRMSTRADDR(fl->fl6_dst, family) DEBUG encrypt data length mismatch DEBUG %s: flow src=%s, __FUNCTION__, XFRMSTRADDR(fl->fl6_src, family) DEBUG encrypt data does not compare DEBUG a guy asks for address mask. Who is it? icmp v4 hw csum failure) DEBUG DEBUG tkip decap failed decrypt phase1 botch DEBUG DEBUG expire>> %u %d %d %d, expire, DEBUG decrypt data does not compare DEBUG expire++ %u %d %d %d, expire, rt_cache @%02x: %u.%u.%u.%u, hash, rt_bind_peer(0) @%p, NET_CALLER(iph) ip_rt_advice: redirect to ip_rt_bug: %u.%u.%u.%u -> %u.%u.%u.%u, %s, UDP: short packet: From %u.%u.%u.%u:%u %d/%d to %u.%u.%u.%u:%u, UDP: bad checksum. From %d.%d.%d.%d:%d to %d.%d.%d.%d:%d ulen %d, a guy asks for address mask. Who is it? DEBUG DEBUG decap botch; length mismatch decap botch; data does not compare DEBUG DEBUG DEBUG DEBUG tkip demic failed 802.11i TKIP test vectors passed DEBUG DEBUG DEBUG %s, buf DEBUG DEBUG Atheros HAL assertion failure: %s: line %u: %s, DEBUG DEBUG DEBUG ath_hal: logging to %s %s, ath_hal_logfile, ath_hal: logging disabled DEBUG DEBUG fib_add_ifaddr: bug: prim == NULL DEBUG fib_del_ifaddr: bug: prim == NULL DEBUG expire>> %u %d %d %d, expire, DEBUG expire++ %u %d %d %d, expire, rt_cache @%02x: %u.%u.%u.%u, hash, DEBUG DEBUG rt_bind_peer(0) @%p, %s%s, sep, ath_hal_buildopts[i] ath_pci: No devices found, driver not installed. DEBUG DEBUG DEBUG _fmt, __VA_ARGS__ %s: Warning, using only %u entries in %u key cache, %s: TX99 support enabled, dev->name %s:grppoll Buf allocation failed ,__func__ ip_rt_advice: redirect to ip_rt_bug: %u.%u.%u.%u -> %u.%u.%u.%u, %s, DEBUG %s: %s: unable to start recv logic, DEBUG DEBUG %s: %s: unable to start recv logic, DEBUG %s: lookup policy [list] found=%s, %s: called: [output START], __FUNCTION__ DEBUG %s: no skbuff, __func__ %s: hardware error; resetting, dev>name DEBUG %s: flow dst=%s, __FUNCTION__, XFRMSTRADDR(fl->fl4_dst, family) %s: flow src=%s, __FUNCTION__, XFRMSTRADDR(fl->fl4_src, family) DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG %s: rx FIFO overrun; resetting, dev>name %s: unable to reset hardware: '%s' (HAL status %u) %s: flow dst=%s, __FUNCTION__, XFRMSTRADDR(fl->fl6_dst, family) DEBUG %s: unable to start recv logic, dev>name %s: flow src=%s, __FUNCTION__, XFRMSTRADDR(fl->fl6_src, family) a guy asks for address mask. Who is it? icmp v4 hw csum failure) DEBUG DEBUG DEBUG expire>> %u %d %d %d, expire, DEBUG %s: %s: unable to reset hardware: '%s' (HAL status %u), %s: %s: unable to start recv logic, ath_mgtstart: discard, no xmit buf %s: [%02u] %-7s , tag, ix, ciphers[hk>kv_type] expire++ %u %d %d %d, expire, rt_cache @%02x: %u.%u.%u.%u, hash, rt_bind_peer(0) @%p, NET_CALLER(iph) ip_rt_advice: redirect to DEBUG DEBUG %02x, hk->kv_val[i] mac %s, ether_sprintf(mac) DEBUG DEBUG DEBUG DEBUG %s , sc->sc_splitmic ? mic : rxmic %02x, hk->kv_mic[i] DEBUG DEBUG DEBUG 237 DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Unified Services Router ip_rt_bug: %u.%u.%u.%u -> %u.%u.%u.%u, %s, UDP: short packet: From %u.%u.%u.%u:%u %d/%d to %u.%u.%u.%u:%u, UDP: bad checksum. From %d.%d.%d.%d:%d to %d.%d.%d.%d:%d ulen %d, REJECT: ECHOREPLY no longer supported. ipt_rpc: only valid for PRE_ROUTING, FORWARD, POST_ROUTING, LOCAL_IN and/or LOCAL_OUT targets. User Manual DEBUG txmic DEBUG DEBUG %02x, hk->kv_txmic[i] DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG move data from NORMAL to XR moved %d buffers from NORMAL to XR, index move buffers from XR to NORMAL moved %d buffers from XR to NORMAL, count %s:%d %s, __FILE__, __LINE__, __func__ %s:%d %s, __FILE__, __LINE__, __func__ %s: no buffer (%s), dev->name, __func__ %s: no skbuff (%s), dev->name, __func__ %s: HAL qnum %u out of range, max %u!, grppoll_start: grppoll Buf allocation failed %s: HAL qnum %u out of range, max %u!, DEBUG %s: AC %u out of range, max %u!, DEBUG DEBUG %s: unable to update hardware queue %s: bogus frame type 0x%x (%s), dev>name, DEBUG ath_stoprecv: rx queue 0x%x, link %p, %s: %s: unable to reset channel %u (%u MHz) DEBUG %s: %s: unable to restart recv logic, %s: unable to allocate channel table, dev->name %s: unable to allocate channel table, dev->name %s: unable to collect channel list from HAL; R (%p %llx) %08x %08x %08x %08x %08x %08x %c, DEBUG ip_nat_init: can't setup rules. ip_nat_init: can't register in hook. DEBUG DEBUG ip_nat_init: can't register out hook. DEBUG ip_nat_init: can't register adjust in hook. ip_nat_init: can't register adjust out hook. DEBUG ip_nat_init: can't register local out hook. DEBUG ip_nat_init: can't register local in hook. DEBUG ipt_hook: happy cracking. ip_conntrack: can't register pre-routing defrag hook. ip_conntrack: can't register local_out defrag hook. ip_conntrack: can't register pre-routing hook. ip_conntrack: can't register local out hook. ip_conntrack: can't register local in helper hook. ip_conntrack: can't register postrouting helper hook. ip_conntrack: can't register post-routing hook. ip_conntrack: can't register local in hook. DEBUG ip_conntrack: can't register to sysctl. ip_conntrack_rtsp v IP_NF_RTSP_VERSION loading ip_conntrack_rtsp: max_outstanding must be a positive integer ip_conntrack_rtsp: setup_timeout must be a positive integer DEBUG ip_conntrack_rtsp: ERROR registering port %d, ports[i] ip_nat_rtsp v IP_NF_RTSP_VERSION loading %s: Sorry! Cannot find this match option., __FILE__ %s: unable to update h/w beacon queue parameters, %s: stuck beacon; resetting (bmiss count %u), DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG T (%p %llx) %08x %08x %08x %08x %08x %08x %08x %08x %c, %s: no memory for sysctl table!, __func__ %s: no memory for device name storage!, __func__ 238 DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Unified Services Router User Manual %s: failed to register sysctls!, sc>sc_dev->name %s: mac %d.%d phy %d.%d, dev>name, 5 GHz radio %d.%d 2 GHz radio %d.%d, radio %d.%d, ah->ah_analog5GhzRev >> 4, radio %d.%d, ah->ah_analog5GhzRev >> 4, ipt_time loading DEBUG ipt_time unloaded ip_conntrack_irc: max_dcc_channels must be a positive integer ip_conntrack_irc: ERROR registering port %d, ip_nat_h323: ip_nat_mangle_tcp_packet ip_nat_h323: ip_nat_mangle_udp_packet DEBUG ip_nat_h323: out of expectations DEBUG ip_nat_h323: out of RTP ports DEBUG ip_nat_h323: out of TCP ports DEBUG ip_nat_q931: out of TCP ports DEBUG ip_nat_ras: out of TCP ports ip_nat_q931: out of TCP ports DEBUG DEBUG ip_conntrack_core: Frag of proto %u., DEBUG Broadcast packet! DEBUG Should bcast: %u.%u.%u.%u>%u.%u.%u.%u (sk=%p, ptype=%u), DEBUG ip_conntrack version %s (%u buckets, %d max) ERROR registering port %d, netfilter PSD loaded - (c) astaro AG DEBUG DEBUG DEBUG xlr8NatSoftCtxEnqueue: Calling xlr8NatIpFinishOutput () .., status xlr8NatSoftCtxEnqueue: xlr8NatIpFinishOutput () returned [%d], status icmpExceptionHandler: Exception! fragExceptionHandler: Exception! netfilter PSD unloaded - (c) astaro AG %s , SELF DEBUG DEBUG algExceptionHandler: Exception! dnsExceptionHandler: Exception! DEBUG DEBUG %s , LAN DEBUG IPsecExceptionHandler: Exception! DEBUG DEBUG ESP Packet Src:%x Dest:%x Sport:%d dport:%d secure:%d spi:%d isr:%p, DEBUG %s , WAN DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG %s: Use hw queue %u for %s traffic, %s: Use hw queue %u for CAB traffic, dev->name, %s: Use hw queue %u for beacons, dev->name, Could not find Board Configuration Data Could not find Radio Configuration data ath_ahb: No devices found, driver not installed. _fmt, __VA_ARGS__ DEBUG _fmt, __VA_ARGS__ xlr8NatIpFinishOutput: Err.. skb2 == NULL ! DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG TRUNCATED SRC=%u.%u.%u.%u DST=%u.%u.%u.%u , LEN=%u TOS=0x%02X PREC=0x%02X TTL=%u ID=%u , FRAG:%u , ntohs(ih->frag_off) & IP_OFFSET DEBUG TRUNCATED DEBUG PROTO=TCP DEBUG xlr8NatConntrackPreHook: We found the valid context, xlr8NatConntrackPreHook: Not a secured packet. xlr8NatConntrackPreHook: isr=[%p], pIsr xlr8NatConntrackPreHook: secure=[%d], secure Context found for ESP %p,pFlowEntry>post.pIsr[0] xlr8NatConntrackPreHook: New connection. INCOMPLETE [%u bytes] , DEBUG xlr8NatConntrackPostHook: postSecure=[%d] postIsr=[%p %p], DEBUG SPT=%u DPT=%u , SEQ=%u ACK=%u , DEBUG DEBUG proto %d spi %d <-------> proto %d spi %d,pPktInfo->proto,pPktInfo->spi, IPSEC_INF Clock skew detected DEBUG DEBUG DEBUG DEBUG DEBUG 239 DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Unified Services Router User Manual WINDOW=%u , ntohs(th->window) RES=0x%02x , (u8)(ntohl(tcp_flag_word(th) & TCP_RESERVED_BITS) >> 22) URGP=%u , ntohs(th->urg_ptr) DEBUG TRUNCATED DEBUG %02X, op[i] DEBUG PROTO=UDP DEBUG INCOMPLETE [%u bytes] , DEBUG SPT=%u DPT=%u LEN=%u , DEBUG SPT=%u DPT=%u LEN=%u , PROTO=ICMP DEBUG DEBUG INCOMPLETE [%u bytes] , TYPE=%u CODE=%u , ich->type, ich>code DEBUG INCOMPLETE [%u bytes] , ID=%u SEQ=%u , PARAMETER=%u , GATEWAY=%u.%u.%u.%u , MTU=%u , ntohs(ich->un.frag.mtu) DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG PROTO=AH DEBUG INCOMPLETE [%u bytes] , DEBUG SPI=0x%x , ntohl(ah->spi) DEBUG PROTO=ESP DEBUG INCOMPLETE [%u bytes] , SPI=0x%x , ntohl(eh->spi) DEBUG DEBUG PROTO=%u , ih->protocol UID=%u , skb->sk->sk_socket->file>f_uid <%d>%sIN=%s OUT=%s , loginfo>u.log.level, level_string DEBUG %sIN=%s OUT=%s , %s , prefix == NULL ? loginfo->prefix : prefix DEBUG IN= OUT= PHYSIN=%s , physindev->name DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG IPSEC_ERR [%s:%d]: Max (%d) No of SA Limit reached, IPSEC_ERR [%s:%d]: Max (%d) No of SA Limit reached, IPSEC_ERR [%s:%d]: time(secs): %u ERROR: Failed to add entry to IPsec sa table ERROR: Failed to add entry to IPsec sa table ERROR: Failed to add entry to IPsec sa table ERROR: Failed to add entry to IPsec sa table ERROR: Failed to add entry to IPsec sa table ERROR: Failed to add entry to IPsec sa table unknown oid '%s', varName could not find oid pointer for '%s', varName unRegistering IPsecMib ..... ERROR: Failed to add entry to sa table ERROR: Failed to add entry to sa table ERROR: Failed to add entry to sa table ERROR: Failed to add entry to sa table ERROR: Failed to add entry to sa table ERROR: Failed to add entry to sa table DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG IPsec DEBUG IPsec DEBUG IPsec DEBUG IPsec DEBUG IPsec DEBUG IPsec DEBUG unknown oid '%s', varName could not find oid pointer for '%s', varName DEBUG unRegistering IPsecMib ..... . %u.%u.%u.%u, NIPQUAD(trt>rt_dst) %02x, *p . %u.%u.%u.%u, NIPQUAD(trt>rt_dst) DEBUG %02x, *p . %u.%u.%u.%u, NIPQUAD(trt>rt_dst) %02x, *p . %u.%u.%u.%u, NIPQUAD(trt>rt_dst) DEBUG %02x, *p unable to register vIPsec kernel comp to UMI unregistering VIPSECK from UMI .... in vIPsecKIoctlHandler cmd - %d, cmd DEBUG 240 DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Unified Services Router User Manual PHYSOUT=%s , physoutdev->name DEBUG MAC= DEBUG %02x%c, *p, DEBUG NAT: no longer support implicit source local NAT NAT: packet src %u.%u.%u.%u -> dst %u.%u.%u.%u, SNAT: multiple ranges no longer supported format,##args) DEBUG DEBUG DEBUG DEBUG version offset_before=%d, offset_after=%d, correction_pos=%u, x->offset_before, x>offset_after, x->correction_pos DEBUG ip_ct_h323: DEBUG DEBUG %s: Error. DST Refcount value less than 1 (%d), for %s DEVICE refcnt: %d ,pDst>dev->name, %s: Got Null m:%p *m:%p sa:%p *sa:%p,__func__,ppBufMgr, %s Got Deleted SA:%p state:%d,__func__,pIPsecInfo,pIPsecIn fo->state %s: %s: fmt, __FILE__, __FUNCTION__ , ## args) %s: %s: fmt, __FILE__, __FUNCTION__ , ## args) ipt_TIME: format, ## args) IPT_ACCOUNT_NAME : checkentry() wrong parameters (not equals existing table parameters). IPT_ACCOUNT_NAME : checkentry() too big netmask. IPT_ACCOUNT_NAME : checkentry() failed to allocate %zu for new table %s., sizeof(struct t_ipt_account_table), info->name DEBUG DEBUG DEBUG DEBUG INFO INFO INFO INFO INFO INFO ip_ct_h323: incomplete TPKT (fragmented?) DEBUG ip_ct_h245: decoding error: %s, DEBUG IPT_ACCOUNT_NAME : checkentry() wrong network/netmask. account: Wrong netmask given by netmask parameter (%i). Valid is 32 to 0., netmask DEBUG IPT_ACCOUNT_NAME : checkentry() failed to create procfs entry. INFO ip_ct_q931: decoding error: %s, ip_ct_q931: packet dropped DEBUG DEBUG IPT_ACCOUNT_NAME : checkentry() failed to register match. failed to create procfs entry . INFO INFO ip_ct_ras: decoding error: %s, DEBUG MPPE/MPPC encryption/compression module registered INFO ip_ct_ras: packet dropped DEBUG ERROR registering port %d, DEBUG MPPE/MPPC encryption/compression module unregistered PPP generic driver version PPP_VERSION ERROR registering port %d, ipt_connlimit [%d]: src=%u.%u.%u.%u:%d dst=%u.%u.%u.%u:%d %s, ipt_connlimit [%d]: src=%u.%u.%u.%u:%d dst=%u.%u.%u.%u:%d new, DEBUG MPPE/MPPC encryption/compression module registered INFO DEBUG MPPE/MPPC encryption/compression module unregistered INFO DEBUG PPP generic driver version PPP_VERSION INFO ipt_connlimit: Oops: invalid ct state ? ipt_connlimit: Hmm, kmalloc failed :-( ipt_connlimit: src=%u.%u.%u.%u mask=%u.%u.%u.%u _lvl PPPOL2TP: _fmt, ##args DEBUG DEBUG PPPoL2TP kernel driver, %s, PPPoL2TP kernel driver, %s, INFO INFO DEBUG DEBUG PPPoL2TP kernel driver, %s, failed to create procfs entry . INFO INFO %02X, ptr[length] %02X, ((unsigned char *) m - DEBUG DEBUG proc dir not created .. Initialzing Product Data modules INFO INFO ip_ct_h245: packet dropped 241 INFO INFO INFO INFO Unified Services Router User Manual >msg_iov[i].iov_base)[j] %02X, skb->data[i] _lvl PPPOL2TP: _fmt, ##args %02X, ptr[length] %02X, ((unsigned char *) m >msg_iov[i].iov_base)[j] DEBUG DEBUG DEBUG De initializing by \ kernel UMI module loaded kernel UMI module unloaded INFO INFO INFO DEBUG Loading bridge module INFO %02X, skb->data[i] _lvl PPPOL2TP: _fmt, ##args %02X, ptr[length] %02X, ((unsigned char *) m >msg_iov[i].iov_base)[j] DEBUG DEBUG DEBUG Unloading bridge module unsupported command %d, cmd Loading ifDev module INFO INFO INFO DEBUG INFO %02X, skb->data[i] KERN_EMERG THE value read is %d,value*/ KERN_EMERG Factory Reset button is pressed DEBUG Unloading ifDev module ERROR#%d in alloc_chrdev_region, result DEBUG ERROR#%d in cdev_add, result INFO DEBUG using bcm switch %s, bcmswitch INFO DEBUG privlegedID %d wanporttNo: %d, privlegedID,wanportNo INFO DEBUG Loading mii INFO DEBUG Unloading mii INFO DEBUG DEBUG INFO INFO KERN_EMERG Returing error in INTR registration KERN_EMERG Initialzing Factory defaults modules Failed to allocate memory for pSipListNode SIPALG: Memeory allocation failed for pSipNodeEntryTbl pkt-err %s, pktInfo.error INFO pkt-err %s, pktInfo.error pkt-err %s, pktInfo.error DEBUG DEBUG %s Len=%d, msg, len DEBUG %02x , ((uint8_t *) ptr)[i] DEBUG %s: Version 0.1 %s: driver unloaded, dev_info wlan: %s backend registered, be>iab_name wlan: %s backend unregistered, wlan: %s acl policy registered, iac>iac_name wlan: %s acl policy unregistered, iac>iac_name End CVM_MOD_EXP_BASE MISMATCH cmd=%x base=%x, cmd, DEBUG %s, tmpbuf INFO DEBUG VLAN2 INFO op->sizeofptr = %ld, op->sizeofptr opcode cmd = %x, cmd DEBUG DEBUG VLAN3 VLAN4 <%d %d>, INFO INFO modexp opcode received Memory Allocation failed modexpcrt opcode received kmalloc failed DEBUG DEBUG DEBUG DEBUG %s: %s, dev_info, version %s: driver unloaded, dev_info %s, buf %s: %s (, dev_info, ath_hal_version INFO INFO INFO INFO kmalloc failed DEBUG INFO kmalloc failed kmalloc failed kmalloc Failed kmalloc failed unknown cyrpto ioctl cmd received %x, cmd DEBUG DEBUG DEBUG DEBUG %s: driver unloaded, dev_info %s: %s: mem=0x%lx, irq=%d hw_base=0x%p, %s: %s, dev_info, version %s: driver unloaded, dev_info %s: %s: mem=0x%lx, irq=%d, DEBUG %s: %s: mem=0x%lx, irq=%d, INFO register_chrdev returned ZERO DEBUG %s: %s, dev_info, version INFO const char *descr, krb5_keyblock *k) { F password, &pdata DEBUG DEBUG %s: driver unloaded, dev_info %s, buf INFO INFO 242 INFO INFO INFO INFO INFO INFO INFO INFO Unified Services Router User Manual test key, key DEBUG %s: %s (, dev_info, ath_hal_version INFO pre-hashed key, key const char *descr, krb5_keyblock *k) { AES 128-bit key, &key const char *descr, krb5_keyblock *k) { DEBUG DEBUG DEBUG DEBUG %s: driver unloaded, dev_info %s: driver unloaded, dev_info %s: Version 2.0.0 %s: driver unloaded, dev_info INFO INFO INFO INFO test key, key DEBUG INFO pre-hashed key, key const char *descr, krb5_keyblock *k) { DEBUG DEBUG 128-bit AES key,&dk DEBUG 256-bit AES key, &dk WARNING: bwMonMultipathNxtHopSelect:: checking rates hop :%d dev:%s usableBwLimit = %d currBwShare = %d lastHopSelected = %d weightedHopPrefer = %d , DEBUG DEBUG %s: driver unloaded, dev_info wlan: %s backend registered, be>iab_name wlan: %s backend unregistered, wlan: %s acl policy registered, iac>iac_name wlan: %s acl policy unregistered, iac>iac_name %s: %s, dev_info, version DEBUG %s: driver unloaded, dev_info INFO DEBUG %s: %s (, dev_info, ath_hal_version INFO DEBUG %s: driver unloaded, dev_info INFO DEBUG %s: %s: mem=0x%lx, irq=%d, INFO 2. selecting hop: %d lastHopSelected = %d , selHop, lastHopSelected DEBUG %s: %s, dev_info, version INFO 3. selecting hop: %d lastHopSelected = %d , selHop, lastHopSelected 1. selecting hop: %d lastHopSelected = %d , selHop, lastHopSelected 4. hop :%d dev:%s usableBwLimit = %d currBwShare = %d lastHopSelected = %d weightedHopPrefer = %d , INFO INFO INFO INFO INFO DEBUG %s: driver unloaded, dev_info INFO bwMonitor multipath selection enabled bwMonitor multipath selection disabled weightedHopPrefer set to %d ,weightedHopPrefer bwMonitor sysctl registration failed DEBUG DEBUG ath_pci: switching rfkill capability %s, Unknown autocreate mode: %s, INFO INFO DEBUG DEBUG %s: %s: mem=0x%lx, irq=%d, %s: %s, dev_info, version INFO INFO bwMonitor sysctl registered bwMonitor sysctl not registered Unregistered bwMonitor sysctl CONFIG_SYSCTL enabled ... DEBUG DEBUG DEBUG DEBUG %s: driver unloaded, dev_info %s: %s, dev_info, version %s: unloaded, dev_info %s: %s, dev_info, version INFO INFO INFO INFO Initialized bandwidth monitor ... Removed bandwidth monitor ... Oops.. AES_GCM_encrypt failed (keylen:%u),key->cvm_keylen Oops.. AES_GCM_decrypt failed (keylen:%u),key->cvm_keylen DEBUG DEBUG %s: unloaded, dev_info %s: %s, dev_info, version INFO INFO DEBUG %s: unloaded, dev_info INFO DEBUG failed to create procfs entry . INFO %s, msg %02x%s, data[i], DEBUG DEBUG INFO INFO Failed to set AES encrypt key DEBUG Failed to set AES encrypt key DEBUG ICMP: %u.%u.%u.%u: ICMP: %u.%u.%u.%u: Source Wrong address mask %u.%u.%u.%u from Redirect from %u.%u.%u.%u on %s about AES %s Encrypt Test Duration: %d:%d, hard ? Hard : Soft, DEBUG Failed to set AES encrypt key DEBUG IP: routing cache hash table of %u buckets, %ldKbytes, source route option %u.%u.%u.%u -> %u.%u.%u.%u, 243 INFO INFO INFO INFO Unified Services Router User Manual Failed to set AES encrypt key AES %s Decrypt Test Duration: %d:%d, hard ? Hard : Soft, DEBUG ICMP: %u.%u.%u.%u: INFO DEBUG INFO Failed to set AES encrypt key DEBUG Failed to set AES encrypt key DEBUG ICMP: %u.%u.%u.%u: Source Wrong address mask %u.%u.%u.%u from Redirect from %u.%u.%u.%u on %s about Failed to set AES encrypt key DEBUG Failed to set AES encrypt key DEBUG Failed to set DES encrypt key[%d], i DEBUG Failed to set DES decrypt key[%d], i Failed to set DES encrypt key[%d], i DEBUG DEBUG Failed to set DES decrypt key[%d], i Failed to set DES encrypt key DEBUG DEBUG Failed to set DES decrypt key DEBUG Failed to set DES encrypt key DEBUG IP: routing cache hash table of %u buckets, %ldKbytes, source route option %u.%u.%u.%u -> %u.%u.%u.%u, Wrong address mask %u.%u.%u.%u from Redirect from %u.%u.%u.%u on %s about source route option ICMP: %u.%u.%u.%u: ICMP: %u.%u.%u.%u: Source Wrong address mask %u.%u.%u.%u from Redirect from %u.%u.%u.%u on %s about DEBUG DEBUG IP: routing cache hash table of %u buckets, %ldKbytes, source route option %u.%u.%u.%u -> %u.%u.%u.%u, IPsec: device unregistering: %s, dev>name IPsec: device down: %s, dev->name DEBUG mark: only supports 32bit mark 3DES Software Test: 3DES Software Test %s, des3SoftTest(0) ? Failed : Passed DEBUG ipt_time: invalid argument DEBUG ipt_time: IPT_DAY didn't matched 3DES Hardware Test: 3DES Hardware Test %s, des3HardTest(0) ? Failed : Passed DEBUG ./Logs_kernel.txt:45:KERN_WARNING DEBUG DES Software Test: DES Software Test %s, desSoftTest(0) ? Failed : Passed DEBUG DES Hardware Test: DES Hardware Test %s, desHardTest(0) ? Failed : Passed DEBUG ./Logs_kernel.txt:59:KERN_WARNING ipt_LOG: not logging via system console %s: wrong options length: %u, fname, opt_len %s: options rejected: o[0]=%02x, o[1]=%02x, SHA Software Test: SHA Software Test %s, shaSoftTest(0) ? Failed : Passed DEBUG SHA Hardware Test: SHA Hardware Test %s, shaHardTest(0) ? Failed : Passed DEBUG DEBUG %s: don't know what to do: o[5]=%02x, %s: wrong options length: %u, fname, opt_len %s: options rejected: o[0]=%02x, o[1]=%02x, MD5 Software Test: DEBUG %s: wrong options length: %u, Failed to set DES decrypt key DEBUG AES Software Test: AES Software Test %s, aesSoftTest(0) ? Failed : Passed AES Hardware Test: AES Hardware Test %s, aesHardTest(0) ? Failed : Passed DEBUG DEBUG DEBUG DEBUG %s: wrong options length: %u, %s: options rejected: o[0]=%02x, o[1]=%02x, 244 INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G Unified Services Router MD5 Software Test %s, md5SoftTest(0) ? Failed : Passed User Manual DEBUG %s: options rejected: o[0]=%02x, o[1]=%02x, MD5 Hardware Test: MD5 Hardware Test %s, md5HardTest(0) ? Failed : Passed DEBUG DEBUG %s: don't know what to do: o[5]=%02x, *** New port %d ***, ntohs(expinfo>natport) AES Software Test: %d iterations, iter DEBUG ** skb len %d, dlen %d,(*pskb)->len, AES Software Test Duration: %d:%d, DEBUG ********** Non linear skb AES Hardware Test: %d iterations, iter DEBUG End of sdp %p, nexthdr AES Hardware Test Duration: %d:%d, DEBUG %s: unknown pairwise cipher %d, 3DES Software Test: %d iterations, iter DEBUG %s: unknown group cipher %d, 3DES Software Test Duration: %d:%d, DEBUG %s: unknown SIOCSIWAUTH flag %d, 3DES Hardware Test: %d iterations, iter DEBUG %s: unknown SIOCGIWAUTH flag %d, 3DES Hardware Test Duration: %d:%d, DEBUG %s: unknown algorithm %d, DES Software Test: %d iterations, iter DEBUG %s: key size %d is too large, DES Software Test Duration: %d:%d, DEBUG try_module_get failed DES Hardware Test: %d iterations, iter DEBUG %s: request_irq failed, dev->name DES Hardware Test Duration: %d:%d, DEBUG try_module_get failed SHA Software Test: %d iterations, iter DEBUG try_module_get failed SHA Software Test Duration: %d:%d, DEBUG %s: unknown pairwise cipher %d, SHA Hardware Test: %d iterations, iter DEBUG %s: unknown group cipher %d, SHA Hardware Test Duration: %d:%d, DEBUG %s: unknown SIOCSIWAUTH flag %d, MD5 Software Test: %d iterations, iter DEBUG %s: unknown SIOCGIWAUTH flag %d, MD5 Software Test Duration: %d:%d, DEBUG %s: unknown algorithm %d, MD5 Hardware Test: %d iterations, iter DEBUG MD5 Hardware Test Duration: %d:%d, DEBUG %s: key size %d is too large, unable to load %s, scan_modnames[mode] ./pnac/src/pnac/linux/kernel/xcalibur.c:2 09:#define DEBUG_PRINTK printk DEBUG Failed to mkdir /proc/net/madwifi bcmDeviceInit: registration failed DEBUG try_module_get failed bcmDeviceInit: pCdev Add failed DEBUG REG Size == 8 Bit Value = %x ::: At Page = %x : Addr = %x DEBUG %s: request_irq failed, dev->name too many virtual ap's (already got %d), sc->sc_nvaps REG Size == 16 Bit DEBUG DEBUG \ \ %s: request_irq failed, dev->name rix %u (%u) bad ratekbps %u mode %u, 245 WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G Unified Services Router Value = %x ::: At Page = %x : Addr = %x REG Size == 32 Bit Value = %x ::: At Page = %x : Addr = %x User Manual DEBUG WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G DEBUG %s: no rates for %s?, no rates yet! mode %u, sc>sc_curmode DEBUG %u.%u.%u.%u sent an invalid ICMP REG Size is not in 8/16/32/64 Written Value = %x ::: At Page = %x : Addr = %x DEBUG dst cache overflow DEBUG Neighbour table overflow. bcm_ioctl :Unknown Ioctl Case : DEBUG host %u.%u.%u.%u/if%d ignores DEBUG martian destination %u.%u.%u.%u from DEBUG martian source %u.%u.%u.%u from DEBUG ll header: DEBUG %u.%u.%u.%u sent an invalid ICMP DEBUG dst cache overflow DEBUG Neighbour table overflow. DEBUG host %u.%u.%u.%u/if%d ignores DEBUG martian destination %u.%u.%u.%u from DEBUG martian source %u.%u.%u.%u from Cannot Set Rate: %x, value Getting Rate Series: %x,vap>iv_fixed_rate.series Getting Retry Series: %x,vap>iv_fixed_rate.retries DEBUG ll header: DEBUG %u.%u.%u.%u sent an invalid ICMP DEBUG dst cache overflow IC Name: %s,ic->ic_dev->name DEBUG Neighbour table overflow. WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G usage: rtparams rt_idx <0|1> per <0..100> probe_intval <0..100> DEBUG host %u.%u.%u.%u/if%d ignores WARNIN G DEBUG martian source %u.%u.%u.%u from DEBUG REG Size == 64 Bit =========Register Dump for Port Number # %d=========,port %s : Read Status=%s data=%#x,regName[j], %s : Read Status=%s data=%#x,regName[j], powerDeviceInit: device registration failed powerDeviceInit: adding device failed %s: Error: Big jump in pn number. TID=%d, from %x %x to %x %x. %s: The MIC is corrupted. Drop this frame., __func__ %s: The MIC is OK. Still use this frame and update PN., __func__ ADDBA send failed: recipient is not a 11n node usage: acparams ac <0|3> RTS <0|1> aggr scaling <0..4> min mbps <0..250> usage: hbrparams ac <2> enable <0|1> per_low <0..50> DEBUG cix %u (%u) bad ratekbps %u mode %u, %s(): ADDBA mode is AUTO, __func__ DEBUG ll header: martian destination %u.%u.%u.%u from %s(): Invalid TID value, __func__ DEBUG %u.%u.%u.%u sent an invalid ICMP %s(): ADDBA mode is AUTO, __func__ DEBUG dst cache overflow %s(): Invalid TID value, __func__ DEBUG Neighbour table overflow. %s(): Invalid TID value, __func__ Addba status IDLE DEBUG DEBUG host %u.%u.%u.%u/if%d ignores martian destination %u.%u.%u.%u 246 WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN G WARNIN Unified Services Router User Manual from G WARNIN G WARNIN G ERROR %s(): ADDBA mode is AUTO, __func__ DEBUG martian source %u.%u.%u.%u from %s(): Invalid TID value, __func__ Error in ADD- no node available %s(): Channel capabilities do not match, chan flags 0x%x, %s: cannot map channel to mode; freq %u flags 0x%x, DEBUG DEBUG ll header: Unable to create ip_set_list DEBUG ERROR ic_get_currentCountry not initialized yet Country ie is %c%c%c, %s: wrong state transition from %d to %d, %s: wrong state transition from %d to %d, %s: wrong state transition from %d to %d, %s: wrong state transition from %d to %d, DEBUG DEBUG Unable to create ip_set_hash ip_conntrack_in: Frag of proto %u (hook=%u), Unable to register netfilter socket option Unable to create ip_conntrack_hash Unable to create ip_conntrack slab cache Unable to create ip_expect slab cache Unable to create ip_set_iptreeb slab cache Unable to create ip_set_iptreed slab cache ERROR %s: wrong state transition from %d to %d, %s: wrong state transition from %d to %d, ieee80211_deliver_l2uf: no buf available %s: %s, vap->iv_dev->name, buf /* NB: no */ %s: [%s] %s, vap->iv_dev->name, %s: [%s] %s, vap->iv_dev->name, ether_sprintf(mac), buf [%s:%s] discard %s frame, %s, vap>iv_dev->name, [%s:%s] discard frame, %s, vap>iv_dev->name, [%s:%s] discard %s information element, %s, [%s:%s] discard information element, %s, [%s:%s] discard %s frame, %s, vap>iv_dev->name, [%s:%s] discard frame, %s, vap>iv_dev->name, HBR list dumpNode\tAddress\t\t\tState\tTrigger\t Block Nodes informationAddress\t\t\tBlock\t\tDroped VI frames %d\t %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2 x\t%s\t%s\t%s, %2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.2 x\t%s\t\t%d, [%d]\tFunction\t%s, j, ni>node_trace[i].funcp DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG %s: cannot allocate space for %scompressor, fname, %s: cannot allocate space for MPPC history, %s: cannot allocate space for MPPC history, ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR DEBUG %s: cannot load ARC4 module, fname %s: cannot load SHA1 module, fname %s: CryptoAPI SHA1 digest size too small, fname %s: cannot allocate space for SHA1 digest, fname DEBUG %s%d: trying to write outside history ERROR DEBUG %s%d: trying to write outside history ERROR DEBUG ERROR DEBUG %s%d: trying to write outside history %s%d: too big uncompressed packet: %d, %s%d: encryption negotiated but not an DEBUG %s%d: error - not an MPPC or MPPE frame ERROR DEBUG Kernel doesn't provide ARC4 and/or SHA1 algorithms ERROR DEBUG PPP: not interface or channel?? ERROR DEBUG PPP: no memory (VJ compressor) ERROR DEBUG failed to register PPP device (%d), err ERROR DEBUG DEBUG 247 ERROR ERROR ERROR ERROR Unified Services Router User Manual [%d]\tMacAddr\t%s, j, [%d]\tDescp\t\t%s, j, ni>node_trace[i].descp [%d]\tValue\t\t%llu(0x%llx), j, ni>node_trace[i].value, ifmedia_add: null ifm DEBUG PPP: no memory (VJ comp pkt) ERROR DEBUG PPP: no memory (comp pkt) ERROR DEBUG DEBUG ppp: compressor dropped pkt PPP: no memory (fragment) ERROR ERROR Adding entry for ifmedia_set: no match for 0x%x/0x%x, DEBUG DEBUG ERROR ERROR ifmedia_set: target DEBUG PPP: VJ uncompressed error ppp_decompress_frame: no memory ppp_mp_reconstruct bad seq %u < %u, ifmedia_set: setting to ifmedia_ioctl: switching %s to , dev>name DEBUG PPP: couldn't register device %s (%d), ppp: destroying ppp struct %p but dead=%d ERROR ifmedia_match: multiple match for DEBUG ERROR <unknown type> desc->ifmt_string DEBUG DEBUG ppp: destroying undead channel %p !, PPP: removing module but units remain! PPP: failed to unregister PPP device mode %s, desc->ifmt_string DEBUG <unknown subtype> DEBUG %s, desc->ifmt_string %s%s, seen_option++ ? , : , DEBUG DEBUG %s%s, seen_option++ ? , : , DEBUG %s, seen_option ? > : DEBUG %s: %s, dev->name, buf %s: no memory for sysctl table!, __func__ %s: failed to register sysctls!, vap>iv_dev->name Atheros HAL assertion failure: %s: line %u: %s, ath_hal: logging to %s %s, ath_hal_logfile, ath_hal: logging disabled DEBUG %s%s, sep, ath_hal_buildopts[i] ath_pci: No devices found, driver not installed. DEBUG DEBUG %s: cannot allocate space for %scompressor, fname, %s: cannot allocate space for MPPC history, %s: cannot allocate space for MPPC history, %s: cannot load ARC4 module, fname ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR DEBUG %s: cannot load SHA1 module, fname %s: CryptoAPI SHA1 digest size too small, fname %s: cannot allocate space for SHA1 digest, fname DEBUG %s%d: trying to write outside history ERROR DEBUG %s%d: trying to write outside history ERROR DEBUG ERROR DEBUG %s%d: trying to write outside history %s%d: too big uncompressed packet: %d, %s%d: encryption negotiated but not an %s%d: error - not an MPPC or MPPE frame Kernel doesn't provide ARC4 and/or SHA1 algorithms ---:%d pri:%d qd:%u ad:%u sd:%u tot:%u amp:%d %02x:%02x:%02x, DEBUG PPP: not interface or channel?? ERROR SC Pushbutton Notify on %s::%s,dev>name,vap->iv_dev->name Could not find Board Configuration Data DEBUG DEBUG PPP: no memory (VJ compressor) failed to register PPP device (%d), err ERROR ERROR Could not find Radio Configuration data %s: No device, __func__ ath_ahb: No devices found, driver not installed. PKTLOG_TAG %s:proc_dointvec failed, __FUNCTION__ DEBUG DEBUG PPP: no memory (comp pkt) ppp: compressor dropped pkt ERROR ERROR DEBUG PPP: no memory (VJ comp pkt) ERROR DEBUG PPP: no memory (comp pkt) ERROR PKTLOG_TAG %s:proc_dointvec failed, DEBUG PPP: no memory (fragment) ERROR DEBUG 248 ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual __FUNCTION__ %s: failed to register sysctls!, proc_name PKTLOG_TAG %s: proc_mkdir failed, __FUNCTION__ PKTLOG_TAG %s: pktlog_attach failed for %s, PKTLOG_TAG %s:allocation failed for pl_info, __FUNCTION__ PKTLOG_TAG %s:allocation failed for pl_info, __FUNCTION__ PKTLOG_TAG %s: create_proc_entry failed for %s, PKTLOG_TAG %s: sysctl register failed for %s, PKTLOG_TAG %s: page fault out of range, __FUNCTION__ PKTLOG_TAG %s: page fault out of range, __FUNCTION__ PKTLOG_TAG %s: Log buffer unavailable, __FUNCTION__ DEBUG PPP: VJ uncompressed error ERROR DEBUG ppp_decompress_frame: no memory ppp_mp_reconstruct bad seq %u < %u, ERROR PPP: couldn't register device %s (%d), ppp: destroying ppp struct %p but dead=%d ERROR ERROR DEBUG ppp: destroying undead channel %p !, PPP: removing module but units remain! DEBUG PPP: failed to unregister PPP device ERROR DEBUG JBD: bad block at offset %u, ERROR DEBUG DEBUG DEBUG DEBUG ERROR ERROR ERROR DEBUG JBD: corrupted journal superblock ERROR PKTLOG_TAG Logging should be disabled before changing bufer size %s:allocation failed for pl_info, __func__ DEBUG JBD: bad block at offset %u, ERROR DEBUG DEBUG JBD: Failed to read block at offset %u, JBD: error %d scanning journal, err ERROR ERROR %s: Unable to allocate buffer, __func__ %s:allocation failed for pl_info, __func__ %s: Unable to allocate buffer, __func__ Atheros HAL assertion failure: %s: line %u: %s, ath_hal: logging to %s %s, ath_hal_logfile, DEBUG DEBUG DEBUG JBD: IO error %d recovering block ./Logs_kernel.txt:303:KERN_ERR ./Logs_kernel.txt:304:KERN_ERR ERROR ERROR ERROR DEBUG JBD: recovery pass %d ended at ERROR DEBUG %s: %s:%d: BAD SESSION MAGIC \ ERROR ath_hal: logging disabled DEBUG %s: %s:%d: BAD TUNNEL MAGIC \ ERROR %s%s, sep, ath_hal_buildopts[i] failed to allocate rx descriptors: %d, error DEBUG DEBUG msg->msg_namelen wrong, %d, msg>msg_namelen addr family wrong: %d, usin>sin_family ath_stoprecv: rx queue %p, link %p, DEBUG udp addr=%x/%hu, usin>sin_addr.s_addr, usin->sin_port ERROR no mpdu (%s), __func__ Reset rx chain mask. Do internal reset. (%s), __func__ OS_CANCEL_TIMER failed!! %s: unable to allocate channel table, __func__ %s: unable to collect channel list from hal; %s: cannot map channel to mode; freq %u flags 0x%x, %s: unable to reset channel %u (%uMhz) DEBUG %s: %s:%d: BAD TUNNEL MAGIC ERROR DEBUG DEBUG %s: %s:%d: BAD TUNNEL MAGIC socki_lookup: socket file changed! ERROR ERROR DEBUG %s: %s:%d: BAD TUNNEL MAGIC ERROR DEBUG %s: %s:%d: BAD SESSION MAGIC \ ERROR DEBUG ERROR %s: unable to restart recv logic, DEBUG %s: %s:%d: BAD TUNNEL MAGIC \ msg->msg_namelen wrong, %d, msg>msg_namelen addr family wrong: %d, usin>sin_family DEBUG udp addr=%x/%hu, usin>sin_addr.s_addr, usin->sin_port %s: start DFS WAIT period on channel %d, __func__,sc->sc_curchan.channel DEBUG 249 ERROR ERROR ERROR ERROR ERROR Unified Services Router %s: cancel DFS WAIT period on channel %d, __func__, sc>sc_curchan.channel Non-DFS channel, cancelling previous DFS wait timer channel %d, sc>sc_curchan.channel %s: unable to reset hardware; hal status %u %s: unable to start recv logic, __func__ %s: unable to start recv logic, __func__ %s: unable to reset hardware; hal status %u, User Manual DEBUG %s: %s:%d: BAD TUNNEL MAGIC ERROR DEBUG %s: %s:%d: BAD TUNNEL MAGIC ERROR DEBUG DEBUG DEBUG socki_lookup: socket file changed! %s: %s:%d: BAD TUNNEL MAGIC %s: %s:%d: BAD SESSION MAGIC \ ERROR ERROR ERROR DEBUG ERROR hardware error; reseting DEBUG rx FIFO overrun; reseting DEBUG %s: %s:%d: BAD TUNNEL MAGIC \ msg->msg_namelen wrong, %d, msg>msg_namelen addr family wrong: %d, usin>sin_family DEBUG udp addr=%x/%hu, usin>sin_addr.s_addr, usin->sin_port ERROR DEBUG DEBUG %s: %s:%d: BAD TUNNEL MAGIC %s: %s:%d: BAD TUNNEL MAGIC ERROR ERROR BK\t%s\t\t%d\t%6d\t\t%s\t%d, VI\t%s\t\t%d\t%6d\t\t%s\t%d, DEBUG DEBUG socki_lookup: socket file changed! %s: %s:%d: BAD TUNNEL MAGIC ERROR ERROR VO\t%s\t\t%d\t%6d\t\t%s\t%d, --%d,%p,%lu:0x%x 0x%x 0x%p 0x%x 0x%x 0x%x 0x%x, bb state: 0x%08x 0x%08x, bbstate(sc, 4ul), bbstate(sc, 5ul) DEBUG rebootHook: null function pointer ERROR DEBUG Bad ioctl command ERROR DEBUG fResetMod: Failed to configure gpio pin ERROR DEBUG fResetMod: Failed to register interrupt handler ERROR DEBUG registering char device failed ERROR DEBUG unregistering char device failed ERROR DEBUG proc entry delete failed ERROR DEBUG proc entry initialization failed ERROR DEBUG testCompHandler: received %s from %d, (char *)pInBuf, ERROR DEBUG DEBUG UMI proto registration failed %d,ret AF_UMI registration failed %d,ret ERROR ERROR DEBUG DEBUG DEBUG ERROR ERROR ERROR DEBUG DEBUG umi initialization failed %d,ret kernel UMI registration failed! ./Logs_kernel.txt:447:KERN_ERR ERROR msm not found properly %d, len %d, msm, ModExp returned Error DEBUG DEBUG ModExp returned Error %s: 0x%p len %u, tag, p, (unsigned ERROR ERROR %s: During Wow Sleep and got BMISS, __func__ AC\tRTS \tAggr Scaling\tMin Rate(Kbps)\tHBR \tPER LOW THRESHOLD BE\t%s\t\t%d\t%6d\t\t%s\t%d, %08x %08x %08x %08x %08x %08x %08x %08x%08x %08x %08x %08x, noise floor: (%d, %d) (%d, %d) (%d, %d), %p: %08x %08x %08x %08x %08x %08x %08x %08x %08x %08x %08x %08x, --%d,%p,%lu:0x%x 0x%x 0x%p 0x%x 0x%x 0x%x 0x%x, %08x %08x %08x %08x %08x %08x %08x %08x%08x %08x %08x %08x, %s: unable to allocate device object., __func__ %s: unable to attach hardware; HAL status %u, %s: HAL ABI msmatch; %s: Warning, using only %u entries in %u key cache, unable to setup a beacon xmit queue! unable to setup CAB xmit queue! unable to setup xmit queue for BE traffic! %s DFS attach failed, __func__ %s: Invalid interface id = %u, __func__, if_id %s:grppoll Buf allocation failed 250 ERROR ERROR ERROR ERROR Unified Services Router User Manual ,__func__ int)len %s: unable to start recv logic, %s: Invalid interface id = %u, __func__, if_id %s: unable to allocate channel table, __func__ %s: Tx Antenna Switch. Do internal reset., __func__ Radar found on channel %d (%d MHz), End of DFS wait period DEBUG %03d:, i ERROR DEBUG %02x, ((unsigned char *)p)[i] ERROR DEBUG ERROR DEBUG DEBUG DEBUG mic check failed %s: 0x%p len %u, tag, p, (unsigned int)len %03d:, i %02x, ((unsigned char *)p)[i] %s error allocating beacon, __func__ failed to allocate UAPSD QoS NULL tx descriptors: %d, error failed to allocate UAPSD QoS NULL wbuf %s: unable to allocate channel table, __func__ %s: unable to update h/w beacon queue parameters, ALREADY ACTIVATED DEBUG mic check failed ERROR DEBUG [%s] Wrong parameters, __func__ ERROR DEBUG [%s] Wrong Key length, __func__ ERROR DEBUG [%s] Wrong parameters, __func__ ERROR DEBUG DEBUG [%s] Wrong Key length, __func__ [%s] Wrong parameters, __func__ ERROR ERROR %s: missed %u consecutive beacons, %s: busy times: rx_clear=%d, rx_frame=%d, tx_frame=%d, __func__, rx_clear, rx_frame, tx_frame %s: unable to obtain busy times, __func__ %s: beacon is officially stuck, DEBUG [%s] Wrong Key length, __func__ ERROR DEBUG [%s] Wrong parameters, __func__ ERROR DEBUG DEBUG ERROR ERROR Busy environment detected DEBUG Inteference detected rx_clear=%d, rx_frame=%d, tx_frame=%d, %s: resume beacon xmit after %u misses, %s: stuck beacon; resetting (bmiss count %u), DEBUG DEBUG [%s] Wrong Key length, __func__ [%s]: Wrong parameters, __func__ [%s] Wrong Key Length %d, __func__, des_key_len [%s] Wrong parameters %d, __func__, des_key_len [%s] Wrong Key Length %d, __func__, des_key_len DEBUG [%s] Wrong parameters, __func__ ERROR DEBUG [%s] Wrong Key Length, __func__ ERROR EMPTY QUEUE SWRInfo: seqno %d isswRetry %d retryCnt %d,wh ? (*(u_int16_t *)&wh>i_seq[0]) >> 4 : 0, bf->bf_isswretry,bf>bf_swretries Buffer #%08X --> Next#%08X Prev#%08X Last#%08X,bf, TAILQ_NEXT(bf,bf_list), Stas#%08X flag#%08X Node#%08X, bf->bf_status, bf>bf_flags, bf->bf_node Descr #%08X --> Next#%08X Data#%08X Ctl0#%08X Ctl1#%08X, bf>bf_daddr, ds ->ds_link, ds->ds_data, ds->ds_ctl0, ds->ds_ctl1 Ctl2#%08X Ctl3#%08X Sta0#%08X Sta1#%08X,ds ->ds_hw[0], ds->ds_hw[1], lastds ->ds_hw[2], lastds >ds_hw[3] Error entering wow mode DEBUG [%s] Wrong parameters, __func__ ERROR DEBUG [%s] Wrong Key Length, __func__ ERROR DEBUG [%s] Wrong parameters, __func__ ERROR DEBUG [%s] Wrong parameters, __func__ ERROR DEBUG [%s] Wrong parameters, __func__ ERROR DEBUG DEBUG [%s] Wrong parameters, __func__ device name=%s not found, pReq- ERROR ERROR 251 ERROR ERROR ERROR ERROR ERROR ERROR Unified Services Router User Manual >ifName Wakingup due to wow signal %s, wowStatus = 0x%x, __func__, wowStatus DEBUG Pattern added already Error : All the %d pattern are in use. Cannot add a new pattern , MAX_NUM_PATTERN DEBUG Pattern added to entry %d ,i Remove wake up pattern mask = %p pat = %p ,maskBytes,patternBytes mask = %x pat = %x ,(u_int32_t)maskBytes, (u_int32_t)patternBytes Pattern Removed from entry %d ,i DEBUG DEBUG Error : Pattern not found DEBUG PPM STATE ILLEGAL %x %x, forcePpmStateCur, afp->forceState FORCE_PPM %4d %6.6x %8.8x %8.8x %8.8x %3.3x %4.4x, failed to allocate tx descriptors: %d, error failed to allocate beacon descripotrs: %d, error failed to allocate UAPSD descripotrs: %d, error DEBUG DEBUG DEBUG DEBUG DEBUG unable to register KIFDEV to UMI ERROR: %s: Timeout at page %#0x addr %#0x ERROR: %s: Timeout at page %#0x addr %#0x ERROR Invalid IOCTL %#08x, cmd %s: unable to register device, dev>name ath_pci: 32-bit DMA not available ath_pci: cannot reserve PCI memory region ERROR ath_pci: cannot remap PCI memory region) ; ath_pci: no memory for device state %s: unable to register device, dev>name ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR DEBUG ath_dev_probe: no memory for device state %s: no memory for device state, __func__ DEBUG kernel MIBCTL registration failed! ERROR DEBUG Bad ioctl command ERROR DEBUG ERROR DEBUG hal qnum %u out of range, max %u!, HAL AC %u out of range, max %zu!, HAL AC %u out of range, max %zu!, DEBUG DEBUG DEBUG WpsMod: Failed to configure gpio pin WpsMod: Failed to register interrupt handler registering char device failed unregistering char device failed %s: unable to update hardware queue %u!, DEBUG %s:%d - ERROR: non-NULL node pointer in %p, %p<%s>! ERROR ERROR ERROR ERROR ERROR ERROR Multicast Q: %p , buf buf flags - 0x%08x --------- , buf>bf_flags DEBUG DEBUG buf status - 0x%08x, buf->bf_status # frames in aggr - %d, length of aggregate - %d, length of frame - %d, sequence number - %d, tidno - %d, isdata: %d isaggr: %d isampdu: %d ht: %d isretried: %d isxretried: %d shpreamble: %d isbar: %d ispspoll: %d aggrburst: %d calcairtime: %d qosnulleosp: %d, %p: 0x%08x 0x%08x 0x%08x 0x%08x 0x%08x 0x%08x 0x%08x 0x%08x 0x%08x 0x%08x, DEBUG %s:%d - ERROR: non-NULL node pointer in %p, %p<%s>! can't alloc name %s, name %s: unable to register device, dev>name failed to automatically load module: %s; \ DEBUG Unable to load needed module: %s; no support for \ ERROR DEBUG Module \%s\ is not known, buf ERROR DEBUG Error loading module \%s\, buf ERROR DEBUG Module \%s\ failed to initialize, buf ERROR 0x%08x 0x%08x 0x%08x 0x%08x 0x%08x 0x%08x 0x%08x 0x%08x DEBUG 252 ERROR ERROR ERROR ERROR Unified Services Router User Manual 0x%08x 0x%08x, 0x%08x 0x%08x 0x%08x 0x%08x, DEBUG sc_txq[%d] : , i DEBUG tid %p pause %d : , tid, tid->paused %d: %p , j, tid->tx_buf[j] DEBUG DEBUG %p , buf axq_q: %s: unable to reset hardware; hal status %u, __func__, status DEBUG DEBUG ****ASSERTION HIT**** MacAddr=%s, DEBUG DEBUG TxBufIdx=%d, i DEBUG Tid=%d, tidno AthBuf=%p, tid->tx_buf[i] %s: unable to reset hardware; hal status %u, %s: unable to reset hardware; hal status %u, DEBUG DEBUG %s: unable to start recv logic, DEBUG _fmt, __VA_ARGS__ \ sample_pri=%d is a multiple of refpri=%d, sample_pri, refpri ===========ft>ft_numfilters=%u===========, ft>ft_numfilters filter[%d] filterID = %d rf_numpulses=%u; rf->rf_minpri=%u; rf>rf_maxpri=%u; rf->rf_threshold=%u; rf>rf_filterlen=%u; rf->rf_mindur=%u; rf>rf_maxdur=%u,j, rf->rf_pulseid, NOL DEBUG WARNING!!! 10 minute CAC period as channel is a weather radar channel %s disable detects, __func__ %s enable detects, __func__ %s disable FFT val=0x%x , __func__, val %s enable FFT val=0x%x , __func__, val %s debug level now = 0x%x , __func__, dfs_debug_level RateTable:%d, maxvalidrate:%d, ratemax:%d, pRc->rateTableSize,k,pRc>rateMaxPhy %s: txRate value of 0x%x is bad., __FUNCTION__, txRate Valid Rate Table:- ath_pci: 32-bit DMA not available ath_pci: cannot reserve PCI memory region ath_pci: cannot remap PCI memory region) ; ath_pci: no memory for device state %s: unable to attach hardware: '%s' (HAL status %u), %s: HAL ABI mismatch; ERROR ERROR DEBUG %s: failed to allocate descriptors: %d, %s: unable to setup a beacon xmit queue!, %s: unable to setup CAB xmit queue!, %s: unable to setup xmit queue for %s traffic!, %s: unable to register device, dev>name %s: autocreation of VAP failed: %d, ath_dev_probe: no memory for device state kdot11RogueAPEnable called with NULL argument. kdot11RogueAPEnable: can not add more interfaces kdot11RogueAPGetState called with NULL argument. kdot11RogueAPDisable called with NULL argument. DEBUG %s: SKB does not exist., __FUNCTION__ ERROR DEBUG DEBUG %s: recvd invalid skb unable to register KIFDEV to UMI ERROR ERROR DEBUG DEBUG DEBUG The system is going to factory defaults........!!! %s, msg %02x, *(data + i) CRITICAL CRITICAL CRITICAL DEBUG Inside crypt_open in driver ###### CRITICAL DEBUG CRITICAL DEBUG Inside crypt_release in driver ###### Inside crypt_init module in driver @@@@@@@@ DEBUG Inside crypt_cleanup module in driver @@@@@@@@ CRITICAL DEBUG DEBUG SKB is null : %p ,skb DST is null : %p ,dst CRITICAL CRITICAL DEBUG DEBUG DEBUG 253 ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR ERROR CRITICAL Unified Services Router Index:%d, value:%d, code:%x, rate:%d, flag:%x, i, (int)validRateIndex[i], RateTable:%d, maxvalidrate:%d, ratemax:%d, pRc->rateTableSize,k,pRc>rateMaxPhy User Manual DEBUG DEBUG Can't allocate memory for ath_vap. DEBUG Unable to add an interface for ath_dev. %s: [%02u] %-7s , tag, ix, ciphers[hk>kv_type] %02x, hk->kv_val[i] mac %02x-%02x-%02x-%02x-%02x%02x, mac[0], mac[1], mac[2], mac[3], mac[4], mac[5] DEBUG mac 00-00-00-00-00-00 DEBUG %02x, hk->kv_mic[i] DEBUG txmic DEBUG %02x, hk->kv_txmic[i] DEBUG Cannot support setting tx and rx keys individually DEBUG bogus frame type 0x%x (%s), DEBUG ERROR: ieee80211_encap ret NULL ERROR: ath_amsdu_attach not called %s: no memory for cwm attach, __func__ %s: error - acw NULL. Possible attach failure, __func__ %s: unable to abort tx dma, __func__ %s: no memory for ff attach, __func__ Failed to initiate PBC based enrolle association KERN_EMERG Returing error in INTR registration KERN_EMERG Initialzing Wps module DEBUG %s:%d %s, __FILE__, __LINE__, __func__ DEBUG DEBUG DEBUG DEV is null %p %p ,dev,dst Packet is Fragmented %d,pBufMgr>len Marked the packet proto:%d sip:%x dip:%x sport:%d dport:%d spi:%d,isr:%p:%p %p SAV CHECK FAILED IN DECRYPTION CRITICAL CRITICAL CRITICAL CRITICAL FAST PATH Breaks on BUF CHECK FAST PATH Breaks on DST CHECK FAST PATH Breaks on MTU %d %d %d,bufMgrLen(pBufMgr),mtu,dst_mtu( pDst->path) FAST PATH Breaks on MAX PACKET %d %d,bufMgrLen(pBufMgr),IP_MAX_PA CKET SAV CHECK FAILED IN ENCRYPTION Match Found proto %d spi %d,pPktInfo->proto,pFlowEntry>pre.spi PRE: proto: %u srcip:%u.%u.%u.%u sport :%u dstip: %u.%u.%u.%u dport: %u, POST: proto: %u srcip:%u.%u.%u.%u sport :%u dstip: %u.%u.%u.%u dport: %u, CRITICAL CRITICAL CRITICAL DEBUG DEBUG Clearing the ISR %p,p PROTO:%d %u.%u.%u.%u-->%u.%u.%u.%u, ESP-DONE: %p %p,sav,m DEBUG ESP-BAD: %p %p,sav,m CRITICAL DEBUG DEBUG DEBUG Bug in ip_route_input_slow(). Bug in ip_route_input_slow(). Bug in ip_route_input \ CRITICAL CRITICAL CRITICAL DEBUG Bug in ip_route_input_slow(). AH: Assigning the secure flags for sav :%p,sav ESP: Assigning the secure flags for sav :%p skb:%p src:%x dst:%x,sav,skb,ip->ip_src.s_addr,ip>ip_dst.s_addr %s Buffer %d mtu %d path mtu %d header %d trailer %d,__func__,bufMgrLen(pBufMgr),mtu ,dst_mtu(pDst->path),pDst>header_len,pDst->trailer_len CRITICAL DEBUG DEBUG 254 CRITICAL CRITICAL CRITICAL CRITICAL CRITICAL CRITICAL CRITICAL CRITICAL CRITICAL CRITICAL CRITICAL Unified Services Router User Manual Appendix E. RJ-45 Pin-outs RJ-45 Cable Adapter RJ-45 PIN DB-9 PIN CTS NC NC NC DTR NC NC NC TxD 6 3 RxD GND 5 5 GND GND 4 5 GND RxD 3 2 TxD DSR NC NC NC RTS NC NC NC Signal Signal 255 Unified Services Router User Manual Appendix F. Product Statement 1. DSR-1000N Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body. This device complies with Part 15 of the FCC Rules. Opera tion is subject to the following two conditions: 1) 2) This device may not cause harmful interference, and This device must accept any interference received, including undesired operation. interference that may cause This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. The antennas used for this transmitter must be installed to provide a spectrum distance of at least 20cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. This transmitter is restricted to indoor use in the 5150MHz to 5250MHz frequency range. Non-modification Statement Use only the integral antenna supplied by the manufacturer when operating this device. Unauthorized antennas, modifications, or attachments could damage the TI Navigator access point and violate FCC regulations. Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. Canadian Department of Communications Industry Canada (IC) Notice This Class B digital apparatus complies with Canadian ICES-003 and RSS-210. Cet appareil numérique de la classe B est conforme à la norme NMB-003 et CNR-210 du Canada. ndustry Canada Statement This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: 1) This device may not cause harmful interference, and 2) This device must accept any interference received, including interference that may cause undesired operation. 256 Unified Services Router User Manual IMPORTANT NOTE: Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance. To maintain compliance with IC RF exposure compliance requirements, please follow operation instruction as documented in this manual. This transmitter is restricted to indoor use in the 5150MHz to 5250MHz frequency range. Europe – EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of conformity with the essential requirements of the R&TTE Directive 1999/5/EC: - EN 60950-1: 2006+A11:2009 Safety of information technology equipment - EN 300 328 V1.7.1 (2006-10) Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband transmission systems; Data transmission equipment operating in the 2,4 GHz ISM band and using wide band modulation techniques; Harmonized EN covering essential requirements under article 3.2 of the R&TTE Directive - EN 301 893-1 V1.5.1 (2008-12) Broadband Radio Access Networks (BRAN); 5 GHz high performance RLAN; Harmonized EN covering essential requirements of article 3.2 of the R&TTE Directive - EN 301 489-17 V1.3.2 (2008-04) and EN 301 489-1 V1.8.1 (2008-04) Electromagnetic compatibility and Radio spectrum Matters (ERM); Electro Magnetic Compatibility (EMC) standard for radio equipment and services; Part 17: Specific conditions for 2,4 GHz wideband transmission systems and 5 GHz high performance RLAN equipment This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member states and EFTA countries under the following conditions and/or with the following restrictions: - In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain authorization to use the device for setting up outdoor radio links and/or for supplying public access to telecommunications and/or network services. - This device may not be used for setting up outdoor radio links in France and in some areas the RF output power may be limited to 10 mW EIRP in the frequency range of 2454 – 2483.5 MHz. For detailed information the enduser should contact the national spectrum authority in France. This device is a 5 GHz wideband transmission system (transceiver), intended for use in all EU member states and EFTA countries under the following conditions and/or with the following restrictions: - This device may only be used indoors in the frequency bands 5150 – 5250 MHz. - In France and Luxembourg a limited implementation of the frequency bands 5150 – 5250 MHz and 5250 – 5350 MHz. In Luxermbourg it is not allowed to make use of the frequency band 5470 – 5725 MHz. Endusers are encouraged to contact the national spectrum authorities in France and Luxembourg in order to obtain the latest information about any restrictions in the 5 GHz frequency band(s). 257 Unified Services Router User Manual Česky [Czech] [D-Link Corporation] tímto prohlašuje, že tento [DSR-1000N] je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES. Dansk [Danish] Undertegnede [D-Link Corporation] erklærer herved, at følgende udstyr [DSR -1000N] overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF. Deutsch [German] Hiermit erklärt [D-Link Corporation], dass sich das Gerät [DSR-1000N] in Übereinstimmung mit den grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der Richtlinie 1999/5/EG befindet. Eesti [Estonian] Käesolevaga kinnitab [D-Link Corporation] seadme [DSR-1000N] vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele. English Hereby, [D-Link Corporation], declares that this [DSR-1000N] is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. Español [Spanish] Por medio de la presente [D-Link Corporation] declara que el [DSR-1000N] cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE. Ελληνική [Greek] ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ [D-Link Corporation] ΔΗΛΩΝΕΙ ΟΤΙ [DSR-1000N] ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999/5/ΕΚ. Français [French] Par la présente [D-Link Corporation] déclare que l'appareil [DSR-1000N] est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE. Italiano [Italian] Con la presente [D-Link Corporation] dichiara che questo [DSR-1000N] è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dall a direttiva 1999/5/CE. Latviski [Latvian] Ar šo [D-Link Corporation] deklarē, ka [DSR-1000N] atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem. Lietuvių [Lithuanian] Šiuo [D-Link Corporation] deklaruoja, kad šis [DSR-1000N] atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. Nederlands [Dutch] Hierbij verklaart [D-Link Corporation] dat het toestel [DSR-1000N] in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG. Malti [Maltese] Hawnhekk, [D-Link Corporation], jiddikjara li dan [DSR-1000N] jikkonforma mal-ħtiġijiet essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC. Magyar [Hungarian] Alulírott, [D-Link Corporation] nyilatkozom, hogy a [DSR-1000N] megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak. Polski [Polish] Niniejszym [D-Link Corporation] oświadcza, że [DSR-1000N] jest zgodny z zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC. 258 Unified Services Router Português [Portuguese] Slovensko [Slovenian] Slovensky [Slovak] User Manual [D-Link Corporation] declara que este [DSR-1000N]está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE. [D-Link Corporation] izjavlja, da je ta [DSR-1000N] v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/ES. [D-Link Corporation] týmto vyhlasuje, že [DSR-1000N] spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES. Suomi [Finnish] [D-Link Corporation] vakuuttaa täten että [DSR-1000N] tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen. Svenska [Swedish] Härmed intygar [D-Link Corporation] att denna [DSR-1000N] står I överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EG. 259 Unified Services Router User Manual 2.DSR-500N Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure Statement This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with a minimum dista nce of 20 centimeters between the radiator and your body. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: 1) 2) This device may not cause harmful interference, and This device must accept any interference received, including interference that may cause undesired operation. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. The antennas used for this transmitter must be installed to provide a spectrum distance of at least 20cm from all persons and must not be co-located or operating in conjunction with any other antenna or transmitter. This transmitter is restricted to indoor use in the 5150MHz to 5250MHz frequency range. Non-modification Statement Use only the integral antenna supplied by the manufacturer when operating this device. Unauthorized antennas, modifications, or attachments could damage the TI Navigator access point and violate FCC regulations. Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. Canadian Department of Communications Industry Canada (IC) Notice This Class B digital apparatus complies with Canadian ICES-003 and RSS-210. Cet appareil numérique de la classe B est conforme à la norme NMB-003 et CNR-210 du Canada. Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: 1) This device may not cause harmful interference, and 2) This device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE: Radiation Exposure Statement This equipment complies with IC radiation expos ure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance. To maintain compliance with IC RF exposure compliance requirements, please follow operation instruction as documented in this manual. 260 Unified Services Router User Manual Europe – EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of conformity with the essential requirements of the R&TTE Directive 1999/5/EC: - EN 60950-1: 2006+A11:2009 Safety of information technology equipment - EN 300 328 V1.7.1 (2006-10) Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband transmission systems; Data transmission equipment operating in the 2,4 GHz ISM band and using wide band modulation techniques; Harmonized EN covering essential requirements under article 3.2 of the R &TTE Directive - EN 301 489-17 V1.3.2 (2008-04) and EN 301 489-1 V1.8.1 (2008-04) Electromagnetic compatibility and Radio spectrum Matters (ERM); Electro Magnetic Compatibility (EMC) standard for radio equipment and services; Part 17: Specific conditions for 2,4 GHz wideband transmission systems and 5 GHz high performance RLAN equipment This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member states and EFTA countries under the following conditions and/or with the following restrictions: - In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain authorization to use the device for setting up outdoor radio links and/or for supplying public access to telecommunications and/or network services. - This device may not be used for setting up outdoor radio links in France and in some areas the RF output power may be limited to 10 mW EIRP in the frequency range of 2454 – 2483.5 MHz. For detailed information the enduser should contact the national spectrum authority in France. 261 Unified Services Router User Manual Česky [Czech] [D-Link Corporation] tímto prohlašuje, že tento [DSR-500N] je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES. Dansk [Danish] Undertegnede [D-Link Corporation] erklærer herved, at følgende udstyr [DSR-500N] overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF. Deutsch [German] Hiermit erklärt [D-Link Corporation], dass sich das Gerät [DSR-500N] in Übereinstimmung mit den grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der Richtlinie 1999/5/EG befindet. Eesti [Estonian] Käesolevaga kinnitab [D-Link Corporation] seadme [DSR-500N] vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele. English Español [Spanish] Ελληνική [Greek] Français [French] Hereby, [D-Link Corporation], declares that this [DSR-500N] is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. Por medio de la presente [D-Link Corporation] declara que el [DSR-500N] cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE. ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ [D-Link Corporation] ΔΗΛΩΝΕΙ ΟΤΙ [DSR-500N] ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999/5/ΕΚ. Par la présente [D-Link Corporation] déclare que l'appareil [DSR-500N] est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE. Italiano [Italian] Con la presente [D-Link Corporation] dichiara che questo [DSR-500N] è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Latviski [Latvian] Ar šo [D-Link Corporation] deklarē, ka [DSR-500N] atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem. Lietuvių [Lithuanian] Šiuo [D-Link Corporation] deklaruoja, kad šis [DSR-500N] atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. Nederlands [Dutch] Hierbij verklaart [D-Link Corporation] dat het toestel [DSR-500N] in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG. Malti [Maltese] Hawnhekk, [D-Link Corporation], jiddikjara li dan [DSR-500N] jikkonforma mal-ħtiġijiet essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC. Magyar [Hungarian] Alulírott, [D-Link Corporation] nyilatkozom, hogy a [DSR-500N] megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak. Polski [Polish] Niniejszym [D-Link Corporation] oświadcza, że [DSR-500N] jest zgodny z zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC. 262 Unified Services Router Português [Portuguese] Slovensko [Slovenian] Slovensky [Slovak] User Manual [D-Link Corporation] declara que este [DSR-500N]está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE. [D-Link Corporation] izjavlja, da je ta [DSR-500N] v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/ES. [D-Link Corporation] týmto vyhlasuje, že [DSR-500N] spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES. Suomi [Finnish] [D-Link Corporation] vakuuttaa täten että [DSR-500N] tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen. Svenska [Swedish] Härmed intygar [D-Link Corporation] att denna [DSR-500N] står I överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EG. 263 Unified Services Router User Manual 3.DSR-250N Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occ ur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. RSS-GEN 7.1.4: User Manual for Transmitters with Detachable Antennas The user manual of transmitter devices equipped with detachable antennas shall contain the following information in a conspicuous location: This device has been designed to operate with the antennas listed below, and having a maximum gain of [1.8] dB. Antennas not included in this list or having a gain greater than [1.8] dB are strictly prohibited for use with this device. The required antenna impedance is [50] ohms. RSS-GEN 7.1.5 To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the equivalent isotropically radiated power (e.i.r.p.) is not more than that permitted for successful communication. Le présent appareil est conforme aux CNR d'Industrie Canada appli cables aux appareils radio exempts de licence. L'exploitation est autorisée aux deux conditions suivantes : (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le brouillage est susceptible d'en com Spromettre le fonctionnement. Is herewith confirmed to comply with the requirements set out in the Council Directive on the Approximation of the Laws of the Member States relating to Electromagnetic Compatibility (2004/108/EC), Low-voltage Directive (2006/95/EC), the procedures given in European Council Directive 99/5/EC and 2004/104/EC. The equipment was passed. The test was performed according to the following European standards: EN 300 328 V.1.7.1 EN 301 489-1 V.1. 8.1 / EN 301 489-17 V.2.1.1 EN 62311 EN 60950-1 264 Unified Services Router User Manual Regulatory statement (R&TTE) European standards dictate maximum radiated transmit power of 100mW EIRP and frequency range 2.400 2.4835GHz; In France, the equipment must be restricted to the 2.4465 -2.4835GHz frequency range and must be restricted to indoor use. Operation of this device is subjected to the following National regulations and may be prohibited to use if certain restriction should be applied. D=0.020m is the minimum safety distance between the EUT and human body when the E-Field strength is 61V/m. NCC Warning Statement Article 12 Without permission, any company, firm or user shall not alter the frequency, increase the power, or change the characteristics and functions of the original design of the certified lower power frequency electric machinery. Article 14 The application of low power frequency electric machineries shall not affect the navigation safety nor interfere a legal communication, if an interference is found, the service will be suspended until improvement is made and the interference no longer exists. 265 Unified Services Router User Manual 4. DSR-150N Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protecti on against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is en couraged to try to correct the interference by one of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference th at may cause undesired operation. IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. The availability of some specific channels and/or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user. Note: The country code selection is for non-US model only and is not available to all US model. Per FCC regulation, all WiFi product marketed in US must fixed to US operation channels only.. Europe – EU Declaration of Conformity This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following test methods have been applied in order to prove presumption of conformity with the essential requirements of the R&TTE Directive 1999/5/EC: EN 60950-1: Safety of Information Technology Equipment EN50385 : (2002-08) Product standard to demonstrate the compliance of radio base stations and fixed terminal stations for wireless telecommunication systems with the basic restrictions or the reference levels related to human exposure to radio frequency electromagnetic fields (110MHz - 40 GHz) - General public EN 300 328 V1.7.1: (2006-10) Electromagnetic compatibility and Radio spectrum Matters (ERM); Wideband Transmission systems; Data transmission equipment operating in the 2,4 GHz ISM band and using spread spectrum modulation techniques; Harmonized EN covering essential requirements under article 3.2 of the R& TTE Directive EN 301 489-1 V1.8.1: (2008-04) 266 Unified Services Router User Manual Electromagnetic compatibility and Radio Spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment and services; Part 1: Common technical requirements EN 301 489-17 V2.1.1 (2009-05) Electromagnetic compatibility and Radio spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC) standard for radio equipment; Part 17: Specific conditions for Broadband Data Transmission Systems This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member states and EFTA countries, except in France and Italy where restrictive use applies. In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain authorization to use the device for setting up outdoor radio links and/or for supplying public access to telecommunications and/or network services. This device may not be used for setting up outdoor radio links in France and in some areas the RF output power may be limited to 10 mW EIRP in the frequency range of 2454 – 2483.5 MHz. For detailed information the end-user should contact the national spectrum authority in France. Česky [Czech] [Jméno výrobce] tímto prohlašuje, že tento [typ zařízení] je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES. Dansk [Danish] Undertegnede [fabrikantens navn] erklærer herved, at følgende udstyr [udstyrets typebetegnelse] overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF. Deutsch [German] Hiermit erklärt [Name des Herstellers], dass sich das Gerät [Gerätetyp] in Übereinstimmung mit den grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der Richtlinie 1999/5/EG befindet. Eesti [Estonian] Käesolevaga kinnitab [tootja nimi = name of manufacturer] seadme [seadme tüüp = type of equipment] vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele. Hereby, [name of manufacturer], declares that this [type of equipment] is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. Por medio de la presente [nombre del fabricante] declara que el [clase de equipo] cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE. ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ [name of manufacturer] ΔΗΛΩΝΕΙ ΟΤΙ [type of equipment] ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999/5/ΕΚ. Par la présente [nom du fabricant] déclare que l'appareil [type d'appareil] est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE. English Español [Spanish] Ελληνική [Greek] Français [French] Italiano [Italian] Con la presente [nome del costruttore] dichiara che questo [tipo di apparecchio] è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. Latviski [Latvian] Lietuvių [Lithuanian] Ar šo [name of manufacturer / izgatavotāja nosaukums] deklarē, ka [type of equipment / iekārtas tips] atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem. Šiuo [manufacturer name] deklaruoja, kad šis [equipment type] atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. Nederlands [Dutch] Hierbij verklaart [naam van de fabrikant] dat het toestel [type van toestel] in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EG. Malti [Maltese] Hawnhekk, [isem tal-manifattur], jiddikjara li dan [il-mudel tal-prodott] jikkonforma malħtiġijiet essenzjali u ma provvedimenti oħrajn relevanti li hemm fid -Dirrettiva 1999/5/EC. Magyar Alulírott, [gyártó neve] nyilatkozom, hogy a [... típus] megfelel a vonatkozó alapvetõ 267 Unified Services Router User Manual [Hungarian] követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak. Polski [Polish] Niniejszym [nazwa producenta] oświadcza, że [nazwa wyrobu] jest zgodny z zasadniczymi wymogami oraz pozostałym i stosownymi postanowieniami Dyrektywy 1999/5/EC. Português [Portuguese] [Nome do fabricante] declara que este [tipo de equipamento] está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE. Slovensko [Slovenian] [Ime proizvajalca] izjavlja, da je ta [tip opreme] v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/ES. Slovensky [Slovak] [Meno výrobcu] týmto vyhlasuje, že [typ zariadenia] spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES. Suomi [Finnish] [Valmistaja = manufacturer] vakuuttaa täten että [type of equipment = laitteen tyyppimerkintä] tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen. Svenska [Swedish] Härmed intygar [företag] att denna [utrustningstyp] står I överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EG. Industry Canada statement: This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation. Ce dispositif est conforme à la norme CNR-210 d'Industrie Canada applicable aux appareils radio exempts de licence. Son fonctionnement est sujet aux deux conditions suivantes: (1) le dispositif ne doit pas produire de brouillage préjudiciable, et (2) ce dispositif doit accepter tout brouillage reçu, y compris un brouillage susceptible de provoquer un fonctionnement indésirable. Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. Déclaration d'exposition aux radiations: Cet équipement est conforme aux limites d'exposition aux rayonnemen ts IC établies pour un environnement non contrôlé. Cet équipement doit être installé et utilisé avec un minimum de 20 cm de distance entre la source de rayonnement et votre corps. Wall-Mount Option The Router has four wall-mount slots on its bottom panel. Before you begin, make sure you have two screws that are size #4 - this indicates a diameter measurement of 0.112inches (2.845mm). 1. Determine where you want to mount the Router. 2. Drill two holes into the wall. Make sure adjacent holes are 2.36 inches (60mm) apart. 3. Insert a screw into each hole, and leave 0.2inches (5mm) of its head exposed. 4. Maneuver the Router so the wall-mount slots line up with the two screws. 5. Place the wall-mount slots over the screws and slide the Router down until the screws fit snugly into the wall-mount slots. 268