DSR 1000N Manual 2 02 EN
DSR 1000N Manual 2 02 EN
DSR 1000N Manual 2 02 EN
D-Link Corporation
Copyright © 2014
http://www.dlink.com
Unified Services Router User Manual
User Manual
DSR-150 / 150N / 250 / 250N
DSR-500 / 500N / 1000 / 1000N
Copyright © 2014
Copyright Notice
This publication, including all photographs, illustrations and software, is protected under
international copyright laws, with all rights reserved. Neither this manual, nor any of the material
contained herein, may be reproduced without written consent of the author.
Disclaimer
The information in this document is subject to change without notice. The manufacturer makes
no representations or warranties with respect to the contents hereof and specifically disclaim any
implied warranties of merchantability or fitness for any particular purpose. The manufacturer
reserves the right to revise this publication and to make changes from time to time i n the content
hereof without obligation of the manufacturer to notify any person of such revision or changes.
Limitations of Liability
UNDER NO CIRCUMSTANCES SHALL D-LINK OR ITS SUPPLIERS BE LIABLE FOR
DAMAGES OF ANY CHARACTER (E.G. DAMAGES FOR LOSS OF PROFIT, SOFTWARE
RESTORATION, WORK STOPPAGE, LOSS OF SAVED DATA OR ANY OTHER
COMMERCIAL DAMAGES OR LOSSES) RESULTING FROM THE APPLICATION OR
IMPROPER USE OF THE D-LINK PRODUCT OR FAILURE OF THE PRODUCT, EVEN IF D -
LINK IS INFORMED OF THE POSSIBILITY OF SUCH D AMAGES. FURTHERMORE, D-
LINK WILL NOT BE LIABLE FOR THIRD-PARTY CLAIMS AGAINST CUSTOMER FOR
LOSSES OR DAMAGES. D-LINK WILL IN NO EVENT BE LIABLE FOR ANY DAMAGES IN
EXCESS OF THE AMOUNT D-LINK RECEIVED FROM THE END-USER FOR THE
PRODUCT.
1
Unified Services Router User Manual
Table of Contents
Chapter 1. Introduction ........................................................................................................................... 11
1.1 About this User Manual .......................................................................................... 12
1.2 Typographical Conventions ................................................................................... 12
2
Unified Services Router User Manual
3
Unified Services Router User Manual
4
Unified Services Router User Manual
Appendix C. Standard Services Available for Port Forwarding & Firewall Configuration .............. 244
5
Unified Services Router User Manual
List of Figures
Figure 1: Setup page for LAN TCP/IP settings (a) ................................................................................ 16
Figure 2: Setup page for LAN TCP/IP settings (b) ................................................................................ 16
Figure 3: LAN DHCP Reserved IPs ......................................................................................................... 18
Figure 4: LAN DHCP Leased Clients ...................................................................................................... 19
Figure 5: IPv6 LAN and DHCPv6 configuration ..................................................................................... 20
Figure 6: Configuring the Router Advertisement Daemon ................................................................... 23
Figure 7: IPv6 Advertisement Prefix settings ......................................................................................... 25
Figure 8: Adding VLAN memberships to the LAN ................................................................................. 27
Figure 9: Port VLAN list ............................................................................................................................. 29
Figure 10: Configuring VLAN membership for a port ............................................................................ 30
Figure 11: Multiple VLAN Subnets ........................................................................................................... 31
Figure 12: VLAN Configuration ................................................................................................................. 32
Figure 13: DMZ configuration ................................................................................................................... 34
Figure 14: UPnP Configuration ................................................................................................................. 36
Figure 15: Active Runtime sessions ........................................................................................................ 37
Figure 16: Captive Portal Profile List ....................................................................................................... 38
Figure 17: Customized Captive Portal Setup ......................................................................................... 39
Figure 18: Blocking specific clients by their MAC address ................................................................... 41
Figure 19: VLAN based configuration of Captive Portals ..................................................................... 42
Figure 20: Internet Connection Setup Wizard ........................................................................................ 44
Figure 21: Manual WAN configuration..................................................................................................... 48
Figure 22: PPPoE configuration for standard ISPs ............................................................................... 49
Figure 23: WAN configuration for Japanese Multiple PPPoE (part 1) ................................................ 50
Figure 24: WAN configuration for Japanese Multiple PPPoE (part 2)(its in figure 22 itself) ........... 51
Figure 25: Russia L2TP ISP configuration .............................................................................................. 52
Figure 26: Russia Dual access PPPoE configuration ........................................................................... 53
Figure 27: IPv6 WAN Setup page ............................................................................................................ 57
Figure 28: Connection Status information for both WAN ports ............................................................ 59
Figure 29: Enabling VLAN on WAN ......................................................................................................... 60
Figure 30: List of Configured Bandwidth Profiles ................................................................................... 61
Figure 31: Bandwidth Profile Configuration ............................................................................................ 62
Figure 32: Traffic Selector Configuration ................................................................................................ 63
Figure 33: Bridge Bandwidth Profile Configuration................................................................................ 65
Figure 34: Bridge Traffic Selector Configuration .................................................................................... 65
6
Unified Services Router User Manual
Figure 35: Load Balancing is available when multiple WAN ports are configured and Protocol
Bindings have been defined ................................................................................................... 68
Figure 36: Protocol binding setup to associate a service and/or LAN source to a WAN and/or
destination network .................................................................................................................. 69
Figure 37: Configuring the IP Alias .......................................................................................................... 69
Figure 38: IP Alias Configuration.............................................................................................................. 70
Figure 39: Routing Mode to determine traffic routing between WAN and LAN ................................. 72
Figure 40: Static route configuration fields ............................................................................................. 75
Figure 41: OSPFv2 configured parameters ............................................................................................ 76
Figure 42: OSPFv2 configuration ............................................................................................................. 77
Figure 43: OSPFv3 configured parameters ............................................................................................ 78
Figure 44: OSPFv3 configuration ............................................................................................................. 79
Figure 45: 6 to 4 tunneling ......................................................................................................................... 79
Figure 46: ISATAP Tunnels Configuration .............................................................................................. 81
Figure 47: WAN3 configuration for 3G internet ...................................................................................... 83
Figure 48: Physical WAN port settings .................................................................................................... 85
Figure 49: Wireless Network Setup Wizards .......................................................................................... 87
Figure 50: List of Available Profiles shows the options available to secure the wireless link ......... 91
Figure 51: Profile configuration to set network security ........................................................................ 92
Figure 52: Virtual AP configuration .......................................................................................................... 94
Figure 53: List of configured access points (Virtual APs) shows one enabled access point on the
radio, broadcasting its SSID ................................................................................................... 96
Figure 54: Radio card configuration options ........................................................................................... 98
Figure 55: Wi-Fi Multimedia ...................................................................................................................... 99
Figure 56: Wireless Distribution System ............................................................................................... 100
Figure 57: Advanced Wireless communication settings ..................................................................... 102
Figure 58: WPS configuration for an AP with WPA/WPA2 profile ..................................................... 103
Figure 59: List of Available Firewall Rules ............................................................................................ 106
Figure 60: List of Available Schedules to bind to a firewall rule ........................................................ 107
Figure 61: Example where an outbound SNAT rule is used to map an external IP address
(209.156.200.225) to a private DMZ IP address (10.30.30.30) ...................................... 111
Figure 62: The firewall rule configuration page allows you to define the To/From zone, service,
action, schedules, and specify source/destination IP addresses as needed. ............... 112
Figure 63: The IPv6 firewall rule configuration page allows you to define the To/From zone,
service, action, schedules, and specify source/destination IP addresses as needed. 114
Figure 64: List of Available IPv6 Firewall Rules ................................................................................... 115
Figure 65: Schedule configuration for the above example. ................................................................ 118
Figure 66: List of user defined services. ............................................................................................... 120
7
Unified Services Router User Manual
8
Unified Services Router User Manual
9
Unified Services Router User Manual
Figure 134: Web GUI Management from the WAN ............................................................................. 203
Figure 135: SNMP Users, Traps, and Access Control ........................................................................ 204
Figure 136: SNMP system information for this router ......................................................................... 205
Figure 137: Date, Time, and NTP server setup ................................................................................... 206
Figure 138: Facility settings for Logging ............................................................................................... 207
Figure 139: Log configuration options for traffic through router ......................................................... 209
Figure 140: IPv6 Log configuration options for traffic through router ................................................ 209
Figure 141: E-mail configuration as a Remote Logging option .......................................................... 210
Figure 142: Syslog server configuration for Remote Logging (continued) ....................................... 211
Figure 143: VPN logs displayed in GUI event viewer ......................................................................... 212
Figure 144: Restoring configuration from a saved file will result in the current configuration being
overwritten and a reboot ....................................................................................................... 213
Figure 145: Firmware version information and upgrade option ......................................................... 215
Figure 146: Firmware upgrade and configuration restore/backup via USB ..................................... 216
Figure 147: Dynamic DNS configuration ............................................................................................... 217
Figure 148: Router diagnostics tools available in the GUI ................................................................. 218
Figure 149: Sample trace route output .................................................................................................. 220
Figure 150: Localization........................................................................................................................... 221
Figure 151: Device Status display.......................................................................................................... 223
Figure 152: Device Status display (continued) ..................................................................................... 225
Figure 153: Resource Utilization statistics ............................................................................................ 226
Figure 154: Resource Utilization data (continued) .............................................................................. 226
Figure 155: Resource Utilization data (continued) .............................................................................. 226
Figure 156: Physical port statistics ........................................................................................................ 227
Figure 157: AP specific statistics ............................................................................................................ 228
Figure 158: List of current Active Firewall Sessions............................................................................ 228
Figure 159: List of connected 802.11 clients per AP ........................................................................... 229
Figure 160: List of LAN hosts ................................................................................................................. 229
Figure 161: List of current Active VPN Sessions ................................................................................. 231
10
Unified Services Router User Manual
Chapter 1. Introduction
D-Link Services Routers offer a secure, high performance networking solution to address
the growing needs of small and medium businesses. Integrated high-speed IEEE 802.11n
and 3G wireless technologies offer comparable performance to traditional wired
networks, but with fewer limitations. Optimal network security is provided via features
such as virtual private network (VPN) tunnels, IP Security (IPsec), Point-to-Point
Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), and Secure Sockets
Layer (SSL). Empower your road warriors with clientless remote access anywhere and
anytime using SSL VPN tunnels.
With the D-Link Services Router you are able to experience a diverse set of benefits:
Comprehensive Management Capabilities
The DSR-500, DSR-500N, DSR-1000 and DSR-1000N include dual-WAN
Gigabit Ethernet which provides policy-based service management ensuring
maximum productivity for your business operations. The failover feature
maintains data traffic without disconnecting when a landline connection is lost.
The Outbound Load Balancing feature adjusts outgoing traffic across two WAN
interfaces and optimizes the system perfor mance resulting in high availability.
The solution supports configuring a port as a dedicated DMZ port allowing you
to isolate servers from your LAN.
DSR-150/150N/250/250N producst have a single WAN interface, and thus it does not
support Auto Failover and Load Balancing scenarios.
DSR-150N, DSR-250N and DSR-500N support the 2.4GHz radio band only.
11
Unified Services Router User Manual
Support for the 3G wireless WAN USB dongle is only available for DSR-1000
and DSR-1000N.
Important note –
12
Chapter 2. Configuring Your Network: LAN Setup
It is assumed that the user has a machine for management connected to the LAN to the router. The LAN
connection may be through the wired Ethernet ports available on the router, or once the initial setup is
complete, the DSR may also be managed through its wireless interface as it is bridged with the LAN.
Access the router’s graphical user interface (GUI) for management by using any web browser, such as
Microsoft Internet Explorer or Mozilla Firefox:
Go to http://192.168.10.1 (default IP address) to display the router’s management login screen.
Username: admin
Password: admin
If the router’s LAN IP address was changed, use that IP address in the navigation bar of the
browser to access the router’s management UI.
By default, the router functions as a Dynamic Host Configuration Protocol (DHCP) server to the hosts
on the WLAN or LAN network. With DHCP, PCs and other LAN devices can be assigned IP addresses
as well as addresses for DNS servers, Windows Internet Name Service (WINS) servers, and the default
gateway. With the DHCP server enabled the router’s IP address serves as the gateway address for LAN
and WLAN clients. The PCs in the LAN are assigned IP addresses from a pool of addresses specified
in this procedure. Each pool address is tested before it is assigned to avoid duplicate addresses on the
LAN.
For most applications the default DHCP and TCP/IP settings are satisfactory. If you want another PC
on your network to be the DHCP server or if you are manually configuring the network settings of all
of your PCs, set the DHCP mode to ‘none’. DHCP relay can be used to forward DHCP lease information
from another LAN device that is the network’s DHCP server; this is particularly useful for wireless
clients.
Instead of using a DNS server, you can use a Windows Internet Naming Service (WINS) server. A
WINS server is the equivalent of a DNS server but uses the NetBIOS protocol to resolve hostnames.
The router includes the WINS server IP address in the DHCP configuration when acknowledging a
DHCP request from a DHCP client.
You can also enable DNS proxy for the LAN. When this is enabled the router then as a proxy for all
DNS requests and communicates with the ISP’s DNS servers. When disabled all DHCP clients receive
the DNS IP addresses of the ISP.
If you change the IP address and click Save Settings, the GUI will not respond. Open a new
connection to the new IP address and log in again. Be sure the LAN host (the machine used to
manage the router) has obtained IP address from newly assigned pool (or has a static IP address
in the router’s LAN subnet) before accessing the router via changed IP address.
DHCP Server. With this option the router assigns an IP address within the specified range
plus additional specified information to any LAN device that requests DHCP served
addresses.
DHCP Relay: With this option enabled, DHCP clients on the LAN can receive IP address
leases and corresponding information from a DHCP server on a different subnet. Specify the
Relay Gateway, and when LAN clients make a DHCP request it will be passed along to the
server accessible via the Relay Gateway IP address .
Starting and Ending IP Addresses: Enter the first and last continuous addresses in the IP
address pool. Any new DHCP client joining the LAN is assigned an IP address in this range.
The default starting address is 192.168.10.2. The default ending address is 192.168.1 0.100.
These addresses should be in the same IP address subnet as the router’s LAN IP address. You
may wish to save part of the subnet range for devices with statically as signed IP addresses in
the LAN.
Primary and Secondary DNS servers: If configured domain name system (DNS) servers are
available on the LAN enter their IP addresses here.
Default Gateway: By default this setting has the router’s LAN IP address. It can be
customized to any valid IP within the LAN subnet, in the event that the network’s gateway
is not this router. In this case the DHCP server will give the configured IP address as the
Default Gateway to its DHCP clients.
Domain Name: This is the network domain name used for identification.
WINS Server (optional): Enter the IP address for the WINS server or, if present in your
network, the Windows NetBIOS server.
Lease Time: Enter the time, in hours, for which IP addresses are leased to clients.
Relay Gateway: Enter the gateway address. This is the only configuration parameter required
in this section when DHCP Relay is selected as its DHCP mode
Enable DNS Proxy: To enable the router to act as a proxy for all DNS requests and
communicate with the ISP’s DNS servers, click the checkbox.
15
Unified Services Router User Manual
16
Unified Services Router User Manual
The router’s DHCP server can assign TCP/IP configurations to computers in the LAN explicitly by
adding client's network interface hardware address and the IP address to be assigned to that client in
DHCP server's database. Whenever DHCP server receives a request from c lient, hardware address of
that client is compared with the hardware address list present in the database, if an IP address is already
assigned to that computer or device in the database , the customized IP address is configured otherwise
an IP address is assigned to the client automatically from the DHCP pool.
Computer Name: The user defined name for the LAN host.
IP Addresses: The LAN IP address of a host that is reserved by the DHCP server.
MAC Addresses: The MAC address that will be assigned the rese rved IP address when it is on the
LAN.
Associate with IP/MAC Binding: When the user enables this option the Computer Name, IP and MAC
addresses are associated with the IP/MAC binding.
Edit: Opens the LAN DHCP Reserved IP Configuration page to edit the selected binding rule.
Add: Opens the LAN DHCP Reserved IP Configuration page to add a new binding rule.
17
Unified Services Router User Manual
Note the following limits for the number of DHCP Reserved IP addresses per product:
DSR-150/150N: 32
DSR-250/250N: 64
DSR-500/500N: 96
18
Unified Services Router User Manual
DSR-1000/1000N: 128
This page provides the list of clients connect to LAN DHCP server.
IP Addresses: The LAN IP address of a host that matches the reserved IP list.
MAC Addresses: The MAC address of a LAN host that has a configured IP address reservation.
IPv4 / IPv6 mode must be enabled in the Advanced > IPv6 > IP mode to enable IPv6
configuration options.
19
Unified Services Router User Manual
LAN Settings
The default IPv6 LAN address for the router is fec0::1. You can change this 128 bit IPv6 address
based on your network requirements. The other field that defines the LAN settings for the router is
the prefix length. The IPv6 network (subnet) is identified by the initial bits of the address called the
prefix. By default this is 64 bits long. All hosts in the network have common initial bits for their IPv6
address; the number of common initial bits in the network’s addresses is set by the prefix length field.
Figure 5: IPv6 LAN and DHCPv6 configuration
If you change the IP address and click Save Settings, the GUI will not respond. Open a new
connection to the new IP address and log in again. Be sure the LAN host (the machine used to
manage the router) has obtained IP address from newly assigned pool (or has a static IP address
in the router’s LAN subnet) before accessing the router via changed IP address.
As with an IPv4 LAN network, the router has a DHCPv6 server. If enabled, the router assigns an IP
address within the specified range plus additional specified information to any LAN PC that requests
DHCP served addresses.
20
Unified Services Router User Manual
Server Preference is used to indicate the preference level of this DHCP server. DHCP advertise
messages with the highest server preference value to a LAN host are preferred over other DHCP
server advertise messages. The default is 255.
The DNS server details can be manually entered here (primary/secondary options. An alternative
is to allow the LAN DHCP client to receive the DNS server det ails from the ISP directly. By
selecting Use DNS proxy, this router acts as a proxy for all DNS requests and communicates with
the ISP’s DNS servers (a WAN configuration parameter).
Primary and Secondary DNS servers: If there is configured domain name system (DNS) servers
available on the LAN enter the IP addresses here.
Lease/Rebind time sets the duration of the DHCPv6 lease from this router to the LAN client.
Prefix Delegation
The following settings are used to configure the Prefix Delegation:
Prefix Delegation: Select this option to enable prefix delegation in DHCPv6 server. This option
can be selected only in Stateless Address Auto Configuration mode of DHCPv6 server.
Prefix Address: IPv6 prefix address in the DHCPv6 server prefix pool
21
Unified Services Router User Manual
RADVD
Advertise Interval: When advertisements are unsolicited multicast packets, this interval sets
the maximum time between advertisements from the interface. The actual duration between
advertisements is a random value between one third of this field and this field. The default is
30 seconds.
RA Flags: The router advertisements (RA’s) can be sent with one or both of these flags. Chose
Managed to use the administered /stateful protocol for address auto configuration. If the Other
flag is selected the host uses administered/stateful protocol for non-address auto
configuration.
Router Preference: this low/medium/high parameter determines the preference associated with
the RADVD process of the router. This is useful if there are other RADVD enabled devices
on the LAN as it helps avoid conflicts for IPv6 clients.
MTU: The router advertisement will set this maximum transmission unit (MTU) value for all
nodes in the LAN that are auto configured by the router. The default is 1500.
Router Lifetime: This value is present in RA’s and indicates the usefulness of this router as a
default router for the interface. The default is 3600 seconds. Upon expiration of this value, a
new RADVD exchange must take place between t he host and this router.
22
Unified Services Router User Manual
Advertisement Prefixes
SLA ID: The SLA ID (Site-Level Aggregation Identifier) is available when 6to4 Prefixes are
selected. This should be the interface ID of the router’s LAN interface used for router
advertisements.
IPv6 Prefix: When using Global/Local/ISATAP prefixes, this field is used to define the IPv6
network advertised by this router.
23
Unified Services Router User Manual
IPv6 Prefix Length: This value indicates the number contiguous, higher order bits of the IPv6
address that define up the network portion of the address. Typically this is 64.
Prefix Lifetime: This defines the duration (in seconds) that the requesting node is allowed to
use the advertised prefix. It is analogous to DHCP lease time in an IPv4 network.
24
Unified Services Router User Manual
25
Unified Services Router User Manual
unique VLAN IDs so that traffic to and from that physical p ort can be isolated from the general LAN.
VLAN filtering is particularly useful to limit broadcast packets of a device in a large network
VLAN support is enabled by default in the router. In the VLAN Configuration page, enable VLAN
support on the router and then proceed to the next section to define the virtual network.
26
Unified Services Router User Manual
27
Unified Services Router User Manual
In order to tag all traffic through a specific LAN port with a VLAN ID, you can associate a VLAN to
a physical port.
In General mode the port is a member of a user selectable set of VLANs. The port sends and
receives data that is tagged or untagged with a VLAN ID. If the data into the port is untagged,
it is assigned the defined PVID. In the configuration from Figure 4, Port 3 is a General port
with PVID 3, so untagged data into Port 3 will be assigned PVID 3. All tagged data sent out
of the port with the same PVID will be untagged. This is mode is typically used with IP
Phones that have dual Ethernet ports. Data coming from phone to the switch port on the router
will be tagged. Data passing through the phone from a connected device will be untagged.
28
Unified Services Router User Manual
In Access mode the port is a member of a single VLAN (and only one). All data going into
and out of the port is untagged. Traffic through a port in access mode looks like any other
Ethernet frame.
In Trunk mode the port is a member of a user selectable set of VLANs. All data going into
and out of the port is tagged. Untagged coming into the port is not forwarded, except for the
default VLAN with PVID=1, which is untagged. Trunk ports multiplex traffic for multiple
VLANs over the same physical link.
Select PVID for the port when the General mode is selected.
29
Unified Services Router User Manual
The DSR-150 / 150N does not support General mode for port VLANs due to hardware limitations.
VLAN ID: The PVID of the VLAN that will have all member devices be part of the same subne t
range.
IP Address: The IP address associated with a port assigned this VLAN ID.
Subnet Mask: Subnet Mask for the above IP Address
30
Unified Services Router User Manual
31
Unified Services Router User Manual
exposed to the internet (such as web or email servers) be placed in the DMZ network. Firewall rules
can be allowed to permit access specific services/ports to the DMZ from both the LAN or WAN. In the
event of an attack to any of the DMZ nodes, the LAN is not necessarily vulnerable as well.
33
Unified Services Router User Manual
34
Unified Services Router User Manual
For DSR-500N and DSR-1000N, in order to configure a DMZ port, the router’s configurable port
must be set to DMZ in the Setup > Internet Settings > Configurable Port page.
For DSR-150N and DSR-250N, enabling DMZ will result in port 8 of the LAN switch being used
for a dedicated DMZ port. The other 7 LAN ports remain unchanged.
Advertisement Time to Live: This is expressed in hops for each UPnP packet. This is the number of
steps a packet is allowed to propagate before being discarded. Small values will limit the UPnP
broadcast range. A default of 4 is typical for networks with few switches.
35
Unified Services Router User Manual
Protocol: The network protocol (i.e. HTTP, FTP, etc.) used by the DSR
Int. Port (Internal Port): The internal ports opened by UPnP (if any)
Ext. Port (External Port): The external ports opened by UPnP (if any)
Click Refresh to refresh the portmap table and search for any new UPnP devices.
password. The login credentials are compared against the Runtime Authentication users in user
database prior to granting HTTP access.
DSR-150/150N/250/250N does not have support for the Captive Portal feature.
Captive Portal is available for LAN users only and not for DMZ hosts.
37
Unified Services Router User Manual
List of Available Profiles: Any one of these profiles can be used for Captive Portal Login page while
enabling Captive Portal.
Click “Add” in the Captive Portal setup page to allow defining custo mized captive portal login page
information (Page Background Color, Header Details, Header Caption, Login Section Details,
Advertisement Details, Footer Details and Captive Portal Header Image).
38
Unified Services Router User Manual
39
Unified Services Router User Manual
40
Unified Services Router User Manual
41
Unified Services Router User Manual
42
Unified Services Router User Manual
It is assumed that you have arranged for internet service with your Internet Service Provider (ISP). Please
contact your ISP or network administrator for the configuration information that will be required to setup
the router.
43
Unified Services Router User Manual
44
Unified Services Router User Manual
45
Unified Services Router User Manual
You can start using the Wizard by logging in with the administrator password for the router. Once
authenticated set the time zone that you are located in, and then choose the type of ISP connection type:
DHCP, Static, PPPoE, PPTP, L2TP. Depending on the connection type a username/password may be
required to register this router with the ISP. In most cases the default settings can be used if the ISP
did not specify that parameter. The last step in the Wizard is to click the Connect button, which confi rms
the settings by establishing a link with the ISP. Once connected, you can move on and configure other
features in this router.
3G Internet access with a USB modem is supported on WAN 3. The Internet Connection Setup
Wizard assists with the primary WAN port (WAN1) configuration only.
46
Unified Services Router User Manual
PPPoE Profile Name. This menu lists configured PPPoE profiles, particularly useful when
configuring multiple PPPoE connections (i.e. for Japan ISPs that have multiple PPPoE support).
ISP login information. This is required for PPTP and L2TP ISPs.
User Name
Password
MPPE Encryption: For PPTP links, your ISP may require you to enable Microsoft Point -to-Point
Encryption (MPPE).
Split Tunnel (supported for PPTP and L2TP connection). This setting allows your LAN hosts to
access internet sites over this WAN link while still permitting VPN traffic to be directed to a VPN
configured on this WAN port.
If split tunnel is enabled, DSR won’t expect a default route from the ISP server. In such case,
user has to take care of routing manually by configuring the routing from Static Routing page.
Connectivity Type: To keep the connection always on, click Keep Connected. To log out after the
connection is idle for a period of time (useful if your ISP costs are based on logon times), click Idle
Timeout and enter the time, in minutes, to wait before dis connecting in the Idle Time field.
47
Unified Services Router User Manual
3.2.4 PPPoE
The PPPoE ISP settings are defined on the WAN Configuration page. There are two types of PPPoE
ISP’s supported by the DSR: the standard username/password PPPoE and J apan Multiple PPPoE.
48
Unified Services Router User Manual
Most PPPoE ISP’s use a single control and data connection, and require username / password
credentials to login and authenticate the DSR with the ISP. The ISP connection type for this case is
“PPPoE (Username/Password)”. The GUI will prompt you for authentication, service, and connection
settings in order to establish the PPPoE link.
For some ISP’s, most popular in Japan, the use of “Japanese Multiple PPPoE” is required in order to
establish concurrent primary and secondary PPPoE connections between the DSR and the ISP. The
Primary connection is used for the bulk of data and internet traffi c and the Secondary PPPoE
connection carries ISP specific (i.e. control) traffic between the DSR and the ISP.
49
Unified Services Router User Manual
Each session has a DNS server source for domain name lookup, this can be assigned by the ISP or
configured through the GUI
50
Unified Services Router User Manual
Only HTTP requests that specifically identify the secondary connection’s domain name (for example
*.flets) will use the secondary profile to access the content available through this secondary PPPoE
terminal. All other HTTP / HTTPS requests go through the primary PPPoE connection.
When Japanese multiple PPPoE is configured and secondary connection is up, some predefined routes are added
on that interface. These routes are needed to access the internal domain of the ISP where he hosts various services.
These routes can even be configured through the static routing page as well.
Figure 24: WAN configuration for Japanese Multiple PPPoE (part 2) (its in figure 22
itself)
51
Unified Services Router User Manual
52
Unified Services Router User Manual
53
Unified Services Router User Manual
54
Unified Services Router User Manual
55
Unified Services Router User Manual
56
Unified Services Router User Manual
When the ISP allows you to obtain the WAN IP settings via DHCP, you need to provide details for
the DHCPv6 client configuration. The DHCPv6 client on the gateway can be either stateless or
stateful. If a stateful client is selected the gateway will connect to the ISP’s DHCPv6 ser ver for a
leased address. For stateless DHCP there need not be a DHCPv6 server available at the ISP, rather
ICMPv6 discover messages will originate from this gateway and will be used for auto configuration.
A third option to specify the IP address and prefix length of a preferred DHCPv6 server is available
as well.
Prefix Delegation: Select this option to request router advertisement prefix from any available
DHCPv6 servers available on the ISP, the obtained prefix is updated to the advertised prefixes on the
LAN side. This option can be selected only in Stateless Address Auto Configuration mode of DHCPv6
Client.
When IPv6 is PPPoE type, the following PPPoE fields are enabled.
Username: Enter the username required to log in to the ISP.
Dhcpv6 Options: The mode of Dhcpv6 client that will start in this mode: disable
dhcpv6/stateless dhcpv6/stateful dhcpv6/stateless dhcpv6 with prefix delegation.
57
Unified Services Router User Manual
Connection state: This is whether the WAN is connected or disconnected to an ISP. The Link
State is whether the physical WAN connection in place; the Link State can be up (i.e. cable
inserted) while the WAN connection state is down.
58
Unified Services Router User Manual
The WAN status page allows you to Enable or Disable static WAN links. For WAN settings that are
dynamically received from the ISP, you can Renew or Release the link parameters if required.
Network>Internet>WAN1 Settings
59
Unified Services Router User Manual
60
Unified Services Router User Manual
To create a new bandwidth profile, click Add in the List of Bandwidth Profiles. The following
configuration parameters are used to define a bandwidth profile:
Profile Name: This identifier is used to associate the configured profile to the traffic selector
You can choose to limit the bandwidth either using priority or rate.
If using priority “Low”, “High”, and “Medium” can be selected. If there is a low priority
profile associated with traffic selector A and a high priority profile associated with traffic
selector B, then the WAN bandwidth allocation preference will be to traffic selector B
packets.
For finer control, the Rate profile type can be used. With this option the minimum and
maximum bandwidth allowed by this profile can be limited.
Choose the WAN interface that the profile should be associated with.
61
Unified Services Router User Manual
Network > Internet > Traffic Management > Bridge Traffic Selectors
Once a profile has been created it can then be associated with a traffic flow from the LAN to WAN. To
create a traffic selector, click Add on the Traffic Selectors page. Traffic selector configuration binds a
bandwidth profile to a type or source of LAN traffic with the following settings:
Available profiles: Assign one of the defined bandwidth profiles
Service: You can have the selected bandwidth regulation apply to a specific service (i.e. FTP)
from the LAN. If you do not see a service that you want, you can configure a custom service
through the Advanced > Firewall Settings > Custom Services page. To have the profile apply
to all services, select ANY.
Traffic Selector Match Type: this defines the parameter t o filter against when applying the
bandwidth profile. A specific machine on the LAN can be identified via IP address or MAC
address, or the profile can apply to a LAN port or VLAN group. As well a wireless network can
be selected by its BSSID for bandwidth shaping. In order to restrict services from all IP addresses
or specific subnets, the subnet mask field can be configured in conjunction with the IP address
to regulate inbound traffic.
62
Unified Services Router User Manual
Network > Internet > Traffic Management > Bridge Bandwidth Profile Configuration
Network > Internet > Traffic Management > Bridge Traffic Selectors
63
Unified Services Router User Manual
The above traffic management applies to classical or NAT routing modes . When the system is in
bridge mode (where the LAN1 and WAN2/DMZ ports are in the same network), traffic management
factors in traffic type and bandwidth available on the ports part of the bridge.
For Bandwidth Profiles, the major difference between the o ptions available in bridge mode compared
to standard classical / NAT routing mode is the interface options are not applicable. There is no
association of the bandwidth profile with a particular outbound or inbound interface as this profile
can only apply to the bridge network. Similarly, Traffic Selectors for bridge mode do not factor in
port / SSID / VLAN as these concepts to not apply to the bridge network.
64
Unified Services Router User Manual
65
Unified Services Router User Manual
66
Unified Services Router User Manual
Failover Detection Settings: To check connectivity of the primary internet link, one of the following
failure detection methods can be selected:
DNS lookup using WAN DNS Servers: DNS Lookup of the DNS Servers of the primary link
is used to detect primary WAN connectivity.
DNS lookup using DNS Servers: DNS Lookup of the custom DNS Servers can be specified to
check the connectivity of the primary link.
Ping these IP addresses: These IP's will be pinged at regular intervals to check the connec tivity
of the primary link.
Retry Interval is: The number tells the router how often it should run the above configured
failure detection method.
Failover after: This sets the number of retries after which failover is initiated.
67
Unified Services Router User Manual
DSR-1000, DSR-1000N, DSR-500 and DSR-500N support the traffic load balancing between
physical WAN port and the 3G USB Modem.
Load balancing is particularly useful when the connection speed of one WAN port greatly differs from
another. In this case you can define protocol bindings to route low -latency services (such as VOIP)
over the higher-speed link and let low-volume background traffic (such as SMTP) go over the lower
speed link.
Figure 35: Load Balancing is available when multiple WAN ports are configured and
Protocol Bindings have been defined
68
Unified Services Router User Manual
can be assigned to the other WAN link. Protocol bindings are only applicable when load balancing
mode is enabled and more than one WAN is configured.
Figure 36: Protocol binding setup to associate a service and/or LAN source to a WAN
and/or destination network
3.4.4 IP Aliasing
69
Unified Services Router User Manual
List of IP Aliases
The List of IP Aliases displays the configured IP Aliases on the router.
Interface Name: The interface on which the Alias was configured.
IP Address: The IP Address of the configured IP Alias.
Subnet Mask: The Subnet Mask of the configured IP Alias.
Edit: Opens the IP Alias configuration page to edit the selected IP Alias.
Add: Opens the IP Alias configuration page to add a new IP Alias.
Delete: Deletes the selected IP Aliases.
70
Unified Services Router User Manual
NAT is a technique which allows several computers on a LAN to share an Internet connection.
The computers on the LAN use a "private" IP address range while the WAN port on the router is
configured with a single "public" IP address. Along with connection sharing, NAT also hides
internal IP addresses from the computers on the Internet. NAT is required if your ISP has assigned
only one IP address to you. The computers that connect through the router will need to be assigned
IP addresses from a private subnet.
When Transparent Routing Mode is enabled, NAT is not performed on traffic between LAN and
WAN. Broadcast and multicast packets that arrive on the LAN interface are switched to the WAN
and vice versa, if they do not get filtered by firewall or VPN policies. To maintain the LAN and
WAN in the same broadcast domain select Transparent mode , which allows bridging of traffic
from LAN to WAN and vice versa, except for router-terminated traffic and other management
traffic. All DSR features (such as 3G modem support) ar e supported in transparent mode
assuming the LAN and WAN are configured to be in the same broadcast domain.
NAT routing has a feature called “NAT Hair -pinning” that allows internal network users on the
LAN and DMZ to access internal servers (e.g. an internal FTP server) using their externally-
known domain name. This is also referred to as “NAT loopback” since LAN generated traffic is
redirected through the firewall to reach LAN servers by their external name.
When Bridge Mode routing is enabled, the first physical LAN port and secondary WAN/DMZ
(port 2) interfaces are bridged together at Layer 2, creating an aggregate network. The other LAN
ports and the primary WAN (WAN1) are not part of this bridge, and the router asks as a NAT
device for these other ports. With Bridge mode for the LAN port 1 and WAN2/DMZ interfaces,
L2 and L3 broadcast traffic as well as ARP / RARP packets are passed through. When WAN2
71
Unified Services Router User Manual
receives tagged traffic the tag information will be removed before the packet is forwarded to the
LAN port 1 interface.
Bridge mode option is available on DSR -500 / 500N / 1000 / 1000N products only.
Figure 39: Routing Mode to determine traffic routing between WAN and LAN
72
Unified Services Router User Manual
Out Only: The router broadcasts its routing table periodically but does not accept RIP
information from other routers.
In Only: The router accepts RIP information from other routers, but does not broadcast its
routing table.
None: The router neither broadcasts its route table nor does it accept any RIP packets f rom
other routers. This effectively disables RIP.
The RIP version is dependent on the RIP support of other routing devices in the LAN.
Disabled: This is the setting when RIP is disabled.
RIP-1 is a class-based routing version that does not include subnet information. This is the
most commonly supported version.
RIP-2 includes all the functionality of RIPv1 plus it supports subnet information. Though the
data is sent in RIP-2 format for both RIP-2B and RIP-2M, the mode in which packets are sent
is different. RIP-2B broadcasts data in the entire subnet while RIP-2M sends data to multicast
addresses.
If RIP-2B or RIP-2M is the selected version, authentication between this router and other routers
(configured with the same RIP version) is required. MD5 authentication is used in a first/second key
exchange process. The authentication key validity lifetimes are configurable to ensure that the routing
information exchange is with current and supported routers detected on the LAN.
73
Unified Services Router User Manual
changes in the path; once configured the static route will be active and effective until the network
changes.
The List of Static Routes displays all routes that have been added manually by an administrator and
allows several operations on the static routes. The List of IPv4 Static Routes and List of IPv6 Static
Routes share the same fields (with one exception):
Name: Name of the route, for identification and management .
Active: Determines whether the route is active or inactive. A route can be added to the table
and made inactive, if not needed. This allows routes to be used as needed without deleting
and re-adding the entry. An inactive route is not broadcast if RIP is enabled.
Private: Determines whether the route can be shared with other routers when RIP is enable d.
If the route is made private, then the route will not be shared in a RIP broadcast or multicast.
This is only applicable for IPv4 static routes.
IP Subnet Mask: This is valid for IPv4 networks only, and identifies the subnet that is affected
by this static route
Interface: The physical network interface (WAN1, WAN2, WAN3, DMZ or LAN), through
which this route is accessible.
Gateway: IP address of the gateway through which the dest ination host or network can be
reached.
Metric: Determines the priority of the route. If multiple routes to the same destination exist,
the route with the lowest metric is chosen.
74
Unified Services Router User Manual
3.5.4 OSPFv2
75
Unified Services Router User Manual
76
Unified Services Router User Manual
3.5.5 OSPFv3
77
Unified Services Router User Manual
78
Unified Services Router User Manual
79
Unified Services Router User Manual
80
Unified Services Router User Manual
ISATAP Subnet Prefix: This is the 64-bit subnet prefix that is assigned to the logical ISATAP subnet
for this intranet. This can be obtained from your ISP or internet registry, or derived from RFC 4193.
End Point Address: This is the endpoint address for the tunnel that starts with this router. The endpoint
can be the LAN interface (assuming the LAN is an IPv4 network), or a specific LAN IPv4 address.
IPv4 Address: The end point address if not the entire LAN.
81
Unified Services Router User Manual
Authentication Protocol: Select one of None, PAP or CHAP Authentication Protocols to connect to
the ISP.
APN: Enter the APN (Access Point Name) provided by the ISP.
Domain name servers (DNS) convert Internet names such as www.dlink.com, to IP addresses to
route traffic to the correct resources on the Internet. If you configure your router to get an IP address
dynamically from the ISP, then you need to specify the DNS server source in this section.
o Get Dynamically from ISP: Choose this option if your ISP did not assign a static DNS IP
address.
o Use These DNS Servers: Choose this option if your ISP assigned a static DNS IP address
for you to use. Also complete the fields that are highlighted white in this section.
82
Unified Services Router User Manual
Configurable Port: This page allows you to assign the functionality intended for the Configurable
Port. Choose from the following options:
o WAN: If this option is selected, configure the WAN 3. The WAN Mode options are now
available as there are two WAN ports for the gateway.
o DMZ: If this option is selected, you are able to configure the DMZ port on the DMZ
Configuration menu.
Cellular 3G internet access is available on WAN 3 via a 3G USB modem for DSR-1000 and DSR-1000N.
The cellular ISP that provides the 3G data plan will provide the authentication requirements to establish
a connection. The dial Number and APN are specific to the cellular carriers. Once the connection type
settings are configured and saved, navigate to the WAN status page (Network > Internet > WAN#
Settings) and Enable the WAN3 link to establish the 3G connection.
The 3G USB modem can be configured as the third WAN in DSR-1000 and DSR- 1000N.
83
Unified Services Router User Manual
84
Unified Services Router User Manual
The 3G USB Modem can be configured as dedicated WAN2 for DSR -500 and DSR-500N as well
as dedicated WAN3 for DSR-1000 and DSR-1000N.
85
Unified Services Router User Manual
This router has an integrated 802.11n radio that allows you to create an access point for wireless LAN
clients. The security/encryption/authentication options are grouped in a wireless Profile, and each
configured profile will be available for selection in the AP configuration menu. The profile defines
various parameters for the AP, including the security between the wireless client and the AP, and can be
shared between multiple APs instances on the same device when needed.
Up to four unique wireless networks can be created by configuring multiple “virtual” APs. Each such
virtual AP appears as an independent AP (unique SSID) to supported clients in the environment, but is
actually running on the same physical radio integrated with this router.
You will need the following information to configure your wireless network:
Types of devices expected to access the wireless network and their supported Wi -Fi™ modes
Profiles may be thought of as a grouping of AP parameters that can then be applied to not just
one but multiple AP instances (SSIDs), thus avoiding duplication if the same parameters are to
be used on multiple AP instances or SSIDs.
86
Unified Services Router User Manual
87
Unified Services Router User Manual
88
Unified Services Router User Manual
89
Unified Services Router User Manual
Push Button Configuration (PBC): for wireless devices that support PBC, press and hold
down on this button and within 2 minutes, click the PBC connect button. The AP will detect
the wireless device and establish a link to the client.
You need to enable at least one AP with WPA/WPA2 security and also enable WPS in the
Advanced > Wireless Settings > WPS page to use the WPS wizard.
WEP (Wired Equivalent Privacy): this option requires a static (pre -shared) key to be shared between
the AP and wireless client. Note that WEP does not support 802.11n data rates; is it appropriate for
legacy 802.11 connections.
WPA (Wi-Fi Protected Access): For stronger wireless security than WEP, choose this option. The
encryption for WPA will use TKIP and also CCMP if required. The authentication can be a pre-shared
key (PSK), Enterprise mode with RADIUS server, or both. Note that WPA does not support 802.11n
data rates; is it appropriate for legacy 802.11 connections.
WPA2: this security type uses CCMP encryption (and the option to add TKIP encryption) on either
PSK (pre-shared key) or Enterprise (RADIUS Server) authentication.
WPA + WPA2: this uses both encryption algorithms, TKIP and CCMP. WPA clients will use TKIP
and WPA2 clients will use CCMP encryption algorithms.
90
Unified Services Router User Manual
“WPA+WPA2” is a security option that allows devices to connect to an AP using the strongest
security that it supports. This mode allows legacy devices that only support WPA2 keys (such as
an older wireless printer) to connect to a secure AP where all the other wireless clients are using
WPA2.
Figure 50: List of Available Profiles shows th e options available to secure the
wireless link
Encryption: select the encryption key size -- 64 bit WEP or 128 bit WEP. The larger size keys
provide stronger encryption, thus making the key more difficult to crack
WEP Passphrase: enter an alphanumeric phrase and click Generate Key to generate 4 unique
WEP keys with length determined by the encryption key size. Next choose one of the keys to
be used for authentication. The selected key must be shared with wireless clients to connect
to this device.
91
Unified Services Router User Manual
92
Unified Services Router User Manual
The AP Name is a unique identifier used to manage the AP from the GUI, and is not the SSID
that is detected by clients when the AP has broadcast enabled.
93
Unified Services Router User Manual
94
Unified Services Router User Manual
A valuable power saving feature is the start and stop time control for this AP. You can conserve on the
radio power by disabling the AP when it is not in use. For example on evenings and weekends if you
know there are no wireless clients, the start and stop time will enable/disable the ac cess point
automatically.
Once the AP settings are configured, you must enable the AP on the radio on the Wireless > General
> Access Points page. The status field changes to “Enabled” if the AP is available to accept wireless
clients. If the AP is configured to broadcast its SSID (a profile parameter), a green check mark
indicating it is broadcasting will be shown in the List of Available Access points.
95
Unified Services Router User Manual
Figure 53: List of configured access points (Virtual APs) shows one enabled ac cess
point on the radio, broadcasting its SSID
The clients connected to a particular AP can be viewed by using the Status Button on the List of
Available Access Points. Traffic statistics are shown for that individual AP, as compared to the
summary stats for each AP on the Statistics table. Connected clients are sorted by the MAC address and
indicate the security parameters used by the wireless link, as well as the time connected to this particular
AP. Clicking the Details button next to the connecte d client will give the detailed send and receive
traffic statistics for the wireless link between this AP and the client.
96
Unified Services Router User Manual
Optimize security: you may wish to suppo rt select legacy clients that only offer WEP security
while using WPA2 security for the majority of clients for the radio. By creating two VAPs
configured with different SSIDs and different security parameters, both types of clients can
connect to the LAN. Since WPA2 is more secure, you may want to broadcast this SSID and
not broadcast the SSID for the VAP with WEP since it is meant to be used for a few legacy
devices in this scenario.
97
Unified Services Router User Manual
The ratified 802.11n support on this radio requires selecting the appropriate broadcast (NA or NG etc.)
mode, and then defining the channel spacing and control side band for 802.11n traffic. The default
settings are appropriate for most networks. For example, changing the channel spacing to 40 MHz can
improve bandwidth at the expense of supporting earlier 802.11n clients.
The available transmission channels are governed by regulatory constraints based on the region setting
of the router. The maximum transmission power is similarly governed by regulatory limits; you have
the option to decrease from the default maximum to reduce the signal strength of traffic out of the radio.
4.5 WMM
Wireless > Advanced > WMM
Wi-Fi Multimedia (WMM) provides basic Quality of service (Q oS) features to IEEE 802.11 networks.
WMM prioritizes traffic according to four Access Categories (AC) - voice, video, best effort, and
background.
98
Unified Services Router User Manual
Profile Name:
This field allows you to select the available profiles in wireless settings.
Enable WMM:
This field allows you to enable WMM to improve multimedia transmission.
Default Class of Service:
This field allows you to select the available Access Categories (voice, video, best effort, and
background).
99
Unified Services Router User Manual
This feature is only guaranteed to work only between devices of the same type (i.e. using the
same chipset/driver). For example between two DSR250N boxes, or betwee n two DSR1000N. It
should also interoperate between a DSR 1000N and DSR 500 N boxes since they are based on
the same chipset/driver.
When the user enables the WDS links use the same security configuration as the default access point.
The WDS links do not have true WPA/WPA2 s upport, as in there is no WPA key handshake performed.
Instead the Session Key to be used with a WDS Peer is computed using a hashing function (similar to
the one used for computing a WPA PMK). The inputs to this function are a PSK (configurable by an
administrator from the WDS page) and an internal "magic" string (non -configurable).
In effect the WDS links use TKIP/AES encryption, depending on the encryption configured for the
default AP. In case the default AP uses mixed encryption (TKIP + AES).The WDS link will use the
AES encryption scheme.
100
Unified Services Router User Manual
For a WDS link to function properly the Radio settings on the WDS peers have to be the same.
The WDS page would consist of two sections. The first section provides general WDS settings shared
by all its WDS peers.
WDS Enable - This would be a check box
WDS Encryption - Displays the type of encryption used. It could be one of OPEN/64 bit WEP/128 bit
WEP/TKIP/AES (Use the term being used throughout the box i.e. either CCMP or AES).
WDS Passphrase - This is required if the encryption selected is TKIP/CCMP. We would expect it to
be within 8~63 ASCII characters. In the WDS configuration page this field is mandatory and has to be
same on the two WDS peers, when the security is configured in TKIP/AES mode. The WDS links use
this as the PSK for the connection.
DUT's Mac Address - This would be the mac address of this box. This should be configured in the
peer's WDS configuration page to be able to establish a WDS link with this box . This field in the WDS
Configuration section displays the device's mac address, which needs to be specified on the WDS peer
for making a connection to this device (Similarly the WDS peers MAC address will have to be specified
on this device for the WDS link to be established between the two devices).
The second section will have the list of configured WDS peers with buttons to Add/Delete Peer entries.
We support up to a maximum of 4 WDS links per box.
The both devices need to have same wireless settings (wireless mode, encryption, authentication
method, WDS passphrase, WDS MAC address and wireless SSID) when we confi gure WDS
features in DSR router.
The "Add WDS Peer" section allows the user to specify a WDS peer. The "WDS Peers" table displays
the list of WDS peers currently configured on the device. A maximum of 4 WDS peers can be specified
in any given mode.
101
Unified Services Router User Manual
Push Button Configuration (PBC): for wireless devices that support PBC, press and hold down on
this button and within 2 minutes click the PBC connect button. The AP will detect the wireless device
and establish a link to the client.
More than one AP can use WPS, but only one AP can be used to establish WPS links to client at
any given time.
102
Unified Services Router User Manual
103
Chapter 5. Securing the Private Network
You can secure your network by creating and applying rules that your router uses to selectively
block and allow inbound and outbound Internet traffic. You then specify how and to whom the
rules apply. To do so, you must define the following:
Services or traffic types (examples: web browsing, VoIP, other standard services and also
custom services that you define)
Direction for the traffic by specifying the source and destination of traffic ; this is done by
specifying the “From Zone” (LAN/WAN/DMZ) and “To Zone” ( LAN/WAN/DMZ)
Any Keywords (in a domain name or on a URL of a web page) that the router should allow
or block
Rules for allowing or blocking inbound and outbound Internet traffic for specified services
on specified schedules
Port triggers that signal the router to allow or block access to specified services as defined
by port number
Reports and alerts that you want the router to send to you
You can, for example, establish restricted -access policies based on time-of-day, web addresses,
and web address keywords. You can block Internet access by applications and services on the
LAN, such as chat rooms or games. You can block just certain groups of PCs on your network
from being accessed by the WAN or public DMZ network .
DMZ to insecure WAN. You can change this default behavior in the Firewall Settings
> Default Outbound Policy page. When the default outbound policy is allow always,
you can to block hosts on the LAN from accessing internet services by creating an
outbound firewall rule for each service.
All schedules will follow the time in the routers configured time zone. Refer to
the section on choosing your Time Zone and configuring NTP servers for more
information.
106
Unified Services Router User Manual
107
Unified Services Router User Manual
To edit a rule, click the checkbox next to the rule and click E dit to reach that rule’s
configuration page.
To add a new rule, click Add to be taken to a new rule’s configuration page. Once
created, the new rule is automatically added to the original table.
3. Chose the From Zone to be the source of originating traffic: either the secure LAN, public
DMZ, or insecure WAN. For an inbound rule WAN should be selected as the From Zone.
4. Choose the To Zone to be the destination of traffic covered by this rule. If the From Zone
is the WAN, the To Zone can be the public DMZ or secure LAN. Similarly if the From
Zone is the LAN, then the To Zone can be the public DMZ or insecure WAN.
Service: ANY means all traffic is affected by this rule. For a specific
service the drop down list has common services, or you can select a
custom defined service.
Action & Schedule: Select one of the 4 actions that this rule defines:
BLOCK always, ALLOW always, BLOCK b y schedule otherwise
ALLOW, or ALLOW by schedule otherwise BLOCK. A schedule must be
preconfigured in order for it to be available in the dropdown list to assign
to this rule.
Source & Destination users: For each relevant category, select the users
to which the rule applies:
108
Unified Services Router User Manual
Log: traffic that is filtered by this rule can be logged; this requires
configuring the router’s logging feature separately.
QoS Priority: Outbound rules (where To Zone = insecure WAN only) can
have the traffic marked with a QoS priority tag. Select a priority level:
Minimize-Cost: ToS=1
Maximize-Reliability: ToS=2
Maximize-Throughput: ToS=4
6. Inbound rules can use Destination NAT (DNAT) for managing traffic from the WAN.
Destination NAT is available when the To Zone = DMZ or secure LAN.
With an inbound allow rule you can enter the internal server address that
is hosting the selected service.
You can enable port forwarding for an incoming service specific rule
(From Zone = WAN) by selecting the appropriate checkbox. This will
allow the selected service traffic from the internet to reach the
appropriate LAN port via a port forwarding rule.
This router supports multi-NAT and so the External IP address does not
necessarily have to be the WAN address. On a single WAN interface, multiple
public IP addresses are supported. If your ISP assigns you more than one public
IP address, one of these can be used as your primary IP address on the WAN port ,
and the others can be assigned to servers on the LAN or DMZ. In this way the
LAN/DMZ server can be accessed from the internet by its aliased public IP
address.
7. Outbound rules can use Source NAT (SNAT) in order to map (bind) all LAN/DMZ traffic
matching the rule parameters to a specific WAN interface or external IP address (usually
provided by your ISP).
109
Unified Services Router User Manual
Once the new or modified rule parameters are saved, it appears in the master list of
firewall rules. To enable or disable a rule, click the checkbox ne xt to the rule in the list
of firewall rules and choose Enable or Disable.
The router applies firewall rules in the order listed. As a general rule, you should
move the strictest rules (those with the most specific services or addresses) to
the top of the list. To reorder rules, click the checkbox next to a rule and click
up or down.
110
Unified Services Router User Manual
111
Unified Services Router User Manual
Figure 62: The firewall rule configuration page allows you to define the
To/From zone, service, action, schedules, and specify
source/destination IP addresses as needed.
112
Unified Services Router User Manual
113
Unified Services Router User Manual
Figure 63: The IPv6 firewall rule configuration page allows you to define
the To/From zone, service, action, schedules, and specify
source/destination IP addresses as needed.
114
Unified Services Router User Manual
Parameter Value
Service HTTP
Log Never
115
Unified Services Router User Manual
Parameter Value
Service CU-SEEME:UDP
From 132.177.88.2
To 134.177.88.254
Parameter Value
Service HTTP
116
Unified Services Router User Manual
Send to Local Server (DNAT IP) 192.168.12.222 ( web server local IP address)
From 10.1.0.52
Log Never
Example 4: Bloc
In the Scheduled days box, check that you want the schedule to be active for
“specific days”. Select “Saturday” and “Sunday”
In the scheduled time of day, select “all day” – this will apply the schedule
between 12 am to 11:59 pm of the selected day.
Click apply – now schedule “Weekend” isolates all day Saturday and Sunday
from the rest of the week.
117
Unified Services Router User Manual
2. Since we are trying to block HTTP requests, it is a service with To Zone: Insecure
(WAN1/WAN2/WAN3) that is to be blocked according to schedule “Weekend”.
3. Select the Action to “Block by Schedule, otherwise allow”. This will take a predefined
schedule and make sure the rule is a blocking rule during the defined dates/times. All
other times outside the schedule will not be affected by this firewall blocking rule
118
Unified Services Router User Manual
5. We want to block the IP range assigned to the marketing group. Let’s say they have IP
192.168.10.20 to 192.168.10.30. On the Source Users dropdown, select Address Range
and add this IP range as the From and To IP addresses.
6. We want to block all HTTP traffic to any services going to the insecure zone. The
Destination Users dropdown should be “any”.
7. We don’t need to change default QoS priority or Logging (unless desired) – clicking apply
will add this firewall rule to the list of firewall rules.
8. The last step is to enable this firewall rule. Select the rule, and click “enable” below the
list to make sure the firewall rule is active
119
Unified Services Router User Manual
120
Unified Services Router User Manual
Finish Port: The last port in the range that the service uses. If the service uses only one
port, then the Finish Port will be the same as the Start Port.
Port: The port that the service uses.
121
Unified Services Router User Manual
122
Unified Services Router User Manual
Bridge mode option is available on DSR -500 / 500N / 1000 / 1000N products
only.
123
Unified Services Router User Manual
Firewall rules configured for the bridge will filter traffic based on protocol, outgoing
range of ports and/or the incoming range of ports. The processing is at L2 and can
apply either to the LAN1 port or the WAN2/DMZ port (not both).
124
Unified Services Router User Manual
Port triggering is not appropriate for servers on the LAN, since there is a
dependency on the LAN device making an outgoing connection before incoming
ports are opened.
Some applications require that when external devices connect to them, they recei ve data
on a specific port or range of ports in order to function properly. The router must send
all incoming data for that application only on the required port or range of ports. The
router has a list of common applications and games with corresponding o utbound and
inbound ports to open. You can also specify a port triggering rule by defining the type
of traffic (TCP or UDP) and the range of incoming and outgoing ports to open when
enabled.
125
Unified Services Router User Manual
The application rule status page will list any active rules, i.e. incoming ports that are
being triggered based on outbound requests from a defined outgoing port.
126
Unified Services Router User Manual
Figure 73: Content Filtering used to block access to proxy servers and
prevent ActiveX controls from being downloaded
Security > Web Content Filter > Static Filtering > Approved URl
The Approved URLs is an acceptance list for all URL domain names. Domains added
to this list are allowed in any form. For example, if the domain “yahoo” is added to this
list then all of the following URL’s are permitted access from the LAN:
www.yahoo.com, yahoo.co.uk, etc. Import/export from a text or CSV file for Approved
URLs is also supported
127
Unified Services Router User Manual
Figure 74: Two trusted domains added to the Approved URLs List
Security > Web Content Filter > Static Filtering > Blocked Keywords
Keyword blocking allows you to block all website URL’s or site content that contains
the keywords in the configured list. This is lower priority than the Approved URL List;
i.e. if the blocked keyword is present in a site allowed by a Trusted Domain in the
Approved URL List, then access to that site will be allowed. Import/export from a text
or CSV file for keyword blocking is also supported.
128
Unified Services Router User Manual
Security > Web Content Filter > Static Filtering > Approved URL
Export Approved URLs: Feature enables the user to export the URLs to be allowed to
a .csv (comma-separated value) file which can then be downloaded to the local host.
The user has to click the export button to get the csv file.
Export Blocked Keywords: This feature enables the user to export the keywords to be
blocked to a csv file which can then be downloaded to the local host. The user has to
click the export button to get the csv file .
129
Unified Services Router User Manual
130
Unified Services Router User Manual
This feature allows the administrator to block access from a range of web content
categories. The router must be upgraded with the the WCF license and then the Content
Filtering option, which allows the user to filter out internet sites, needs to be enabled.
The Dynamic Content Filtering configuration page will let the administrator choose
from a range of pre-defined categories to be blocked. When enabled, access to a website
belonging to one of these configured categories will be blocked with an error page.
Adult Content: Sites that host explicit sex content, nudity and sites that use
profanity.
News: Sites that offer news and information on current events, incl uding
newspapers, broadcasters and other publishers.
Job Search: Sites that offer job listings, interview coaching and other
employment-related services.
Travel/Tourism: Sites with travel and tourism information like city maps and
services including planning trips, reservations for bus/train/airlines, hotel
booking etc.
Shopping: Online shops, catalogs, auction sites and classified ads etc.
Entertainment: Websites for TV, movies, entertainment news etc. and sites
hosting video content of movies, TV streaming etc.
Dating Sites: Online dating, matchmaking, relationship advice, personal ads and
web pages related to marriage.
Game Sites: Sites that offer online games, MORPG and information about
computer games, cheat codes etc.
Investment Sites: Sites for brokerages, trusts, insurance and other investments
related organizations.
131
Unified Services Router User Manual
Politics: Sites about politics, elections and legislation and sites that promote a
politician or political party.
Sports: Sites about sports teams, fan clubs, and generally about all kinds of
sports.
www Email Sites: Websites that allow users to send and/ or receive email through
a web accessible email account.
132
Unified Services Router User Manual
133
Unified Services Router User Manual
134
Unified Services Router User Manual
Figure 80: Protecting the router and LAN from internet attacks
135
Unified Services Router User Manual
Echo Storm (ping pkts/sec): The number of ping packets per second at which the
router detects an Echo storm attack from the WAN and prevents further ping traffic
from that external address.
ICMP Flood (ICMP pkts/sec): The number of ICMP packets per s econd at which the
router detects an ICMP flood attack from the WAN and prevents further ICMP traffic
from that external address.
The ping on LAN interfaces is enabled in default. To disable the ping response
from LAN hosts to the LAN/WAN port of the device uncheck the "Allow Ping
from LAN" option.
Enable IGMP Proxy: selecting this allows the router to listen in on IGMP traffic
through the network, and manage multicast streams bound for the LAN
In the event that aWAN uses Russia Dual Access PPTP / L2TP connection, the
outbound interface for IGMP traffic can be selected. Either the physical link (DHCP)
or the PPP link (PPTP / L2TP) can be designated t o carry IGMP outbound traffic. This
applies to any WAN that uses Russia Dual Access PPTP, which is set at based on the
WAN configuration. This setting is specific for Russia Dual Access ISPs where
streaming services are run on the physical links only.
136
Unified Services Router User Manual
Remote client behind a NAT router: The client has a dynamic IP address and is behind
a NAT Router. The remote PC client at the NAT router initia tes a VPN tunnel as the
IP address of the remote NAT router is not known in advance. T he gateway WAN
port acts as responder.
Figure 82: Example of Gateway -to-Gateway IPsec VPN tunnel using two
DSR routers connected to the Internet
137
Unified Services Router User Manual
138
Unified Services Router User Manual
To easily establish a VPN tunnel using VPN Wizard, follow the steps below:
1. Select the VPN tunnel type to create
Set the Connection Name and pre-shared key: the connection name is used for
management, and the pre-shared key will be required on the VPN client or gateway
to establish the tunnel. The pre-shared key has a maximum length of 64 digits.
Determine the local gateway for this tunnel; if there is more than one WAN
configured the tunnel can be configured for either of the gateways.
2. Configure Remote and Local WAN address for the tunnel endpoints
Remote Gateway Type: identify the remote endpoint of the tunnel by FQDN or static
IP address
Remote WAN IP address / FQDN: This field is enabled only if the peer you are trying
to connect to is a Gateway. For VPN Clients, this IP address or Internet Name is
determined when a connection request is received from a client.
Local Gateway Type: identify this router’s endpoint of the tunnel by FQDN or static
IP address
Local WAN IP address / FQDN: This field can be left blank if you are not using a
different FQDN or IP address than the one specified in the WAN port’s configuration.
139
Unified Services Router User Manual
3. Configure the Secure Connection Remote Accessibility fields to identify the remote
network:
Remote LAN IP address: address of the LAN behind the peer gateway
Remote LAN Subnet Mask: the subnet mask of the LAN behind the peer
Note: The IP address range used on the remote LAN must be different from the
IP address range used on the local LAN.
The Wizard will create an Auto IPsec policy with the following default values for a
VPN Client or Gateway policy (these can be accessed from a link on the Wizard page):
ID Type FQDN
The VPN Wizard is the recommended method to set up an Auto IPsec policy.
Once the Wizard creates the matching IKE and VPN policies required by the
Auto policy, one can modify the required fields through the edit link. Refer to
the online help for details.
140
Unified Services Router User Manual
Tunnel: This mode is used for network-to-network IPsec tunnels where this gateway
is one endpoint of the tunnel. In this mode the entire IP packet including the header
is encrypted and/or authenticated.
When tunnel mode is selected, you can enable NetBIOS and DHCP over IPsec. DHCP
over IPsec allows this router to serve IP leases to hosts on the remote LAN. As well in
this mode you can define the single IP address, range of IPs, or subnet on both the loca l
and remote private networks that can communicate over the tunnel.
141
Unified Services Router User Manual
142
Unified Services Router User Manual
Once the tunnel type and endpoints of the tunnel are defined you can determine the
Phase 1 / Phase 2 negotiation to use for the tunnel. This is covered in the IPsec mode
setting, as the policy can be Manual or Auto. For Auto policies, the Internet Key
Exchange (IKE) protocol dynamically exchanges keys between two IPsec hosts. The
Phase 1 IKE parameters are used to define the tunnel’s security association details. The
Phase 2 Auto policy parameters cover the security association lifetime and
encryption/authentication details of the phase 2 key negotiation.
The VPN policy is one half of the IKE/VPN policy pair requir ed to establish an Auto
IPsec VPN tunnel. The IP addresses of the machine or machines on the two VPN
endpoints are configured here, along with the policy parameters required to secure the
tunnel
143
Unified Services Router User Manual
Figure 86: IPsec policy configuration continued (Auto policy via IKE)
A Manual policy does not use IKE and instead relies on manual keying to exchange
authentication parameters between the two IPsec hosts. The incoming and outgoing
security parameter index (SPI) values must be mirrored on the remote tunnel endpoint.
As well the encryption and integrity algorithms and keys must match on the remote
IPsec host exactly in order for the tunnel to establi sh successfully. Note that using Auto
policies with IKE are preferred as in some IPsec implementations the SPI (security
parameter index) values require conversion at each endpoint.
DSR supports VPN roll-over feature. This means that policies configured o n primary
WAN will rollover to the secondary WAN in case of a link failure on a primary WAN.
This feature can be used only if your WAN is configured in Auto-Rollover mode.
144
Unified Services Router User Manual
145
Unified Services Router User Manual
VPN client software is required to establish a VPN tunnel between the router and
remote endpoint. Open source software (such as OpenVPN or Openswan) as well
as Microsoft IPsec VPN software can be configured with the required IKE policy
parameters to establish an IPsec VPN tunnel. Refer to the client software guide
for detailed instructions on setup as well as the router’s o nline help.
The user database contains the list of VPN user accounts that are authorized to use a
given VPN tunnel. Alternatively VPN tunnel users can be authenticated using a
configured RADIUS database. Refer to the online help to determine how to popula te
the user database and/or configure RADIUS authentication.
146
Unified Services Router User Manual
147
Unified Services Router User Manual
148
Unified Services Router User Manual
149
Unified Services Router User Manual
150
Unified Services Router User Manual
server. Once authenticated by the L2TP server (the tunnel endpoint), L2TP clients
have access to the local network managed by the router.
Note the following limits for the number of supported GRE tunnels per product:
DSR-150/150N: 5
DSR-250/250N: 10
DSR-500/500N: 15
151
Unified Services Router User Manual
DSR-1000/1000N: 20
There are two simple steps involved in establishing a GRE tunnel on the router:
1. Create a GRE tunnel from the GUI
2. Setup a static route for the remote local networks using the GRE tunnel
When creating the GRE tunnel, the IP Address should be a unique address that
identifies that GRE tunnel endpoint. It will be referenced in the other router’s static
route as the Gateway IP address. The Remote End Address in the GRE tunnel
configuration page is the WAN IP address of the other endpoint router.
Once the tunnel is established, a static route on the router can be made using the
interface set to the configured GRE tunnel name. The destination IP address of the
static route is the remote LAN subnet, and the route’s gateway IP address will be the
152
Unified Services Router User Manual
GRE tunnel IP of the terminating router (the same router that manages the remote
LAN subnet). Once these two steps are completed, all DDP broadcast traffic can
flow between remote LAN subnets via the GRE Tunne l.
153
Unified Services Router User Manual
154
Unified Services Router User Manual
Trusted Certificate (CA Certificate): Browse and upload the pem formatted CA
Certificate.
Server/Client Certificate: Browse and upload the pem formatted Server/Client
Certificate.
155
Unified Services Router User Manual
Server/Client Key: Browse and upload the pem formatted Server/Client Key.
DH Key: Browse and upload the pem formatted Diffie Hellman Key.
TLS Authentication Key: Browse and upload the pem formatted TLS Authentication
Key.
156
Chapter 7. SSL VPN
The router provides an intrinsic SSL VPN feature as an alternate to the standard IPsec
VPN. SSL VPN differs from IPsec VPN mainly by removing the requirement of a pre-
installed VPN client on the remote host. Instead, users can securely login through the
SSL User Portal using a standard web browser and receive access to configured network
resources within the corporate LAN. The router supports multiple concurrent sessions to
allow remote users to access the LAN over an encrypted link through a customizable user
portal interface, and each SSL VPN user can be assigned unique privileges and network
resource access levels.
The remote user can be provided different options for SSL service through this router:
VPN Tunnel: The remote user’s SSL enabled browser is used in place of a VPN
client on the remote host to establish a secure VPN tunnel. A SSL VPN client (Active-
X or Java based) is installed in the remote host to allow the client to join the corporate
LAN with pre-configured access/policy privileges. At this point a virtual network
interface is created on the user’s host and this will be assigned an IP address and
DNS server address from the router. Once established, the host machine can access
allocated network resources.
ActiveX clients are used when the remote user acces ses the portal using the
Internet Explorer browser. The Java client is used for other browsers like Mozilla
Firefox, Netscape Navigator, Google Chrome, and Apple Safari.
Unified Services Router User Manual
158
Unified Services Router User Manual
Group configuration page allows creating a group with a different type of users. The
user types are as follows:
PPTP User: These are PPTP VPN tunnel LAN users that can establish a tunnel
with the PPTP server on the WAN.
L2TP User: These are L2TP VPN tunnel LAN users that can establish a tunnel
with the L2TP server on the WAN.
Xauth User: This user’s authentication is performed by an externally configured
RADIUS or other Enterprise server. It is not part of the local user database.
SSLVPN User: This user has access to the SSL VPN services as determined by
the group policies and authentication domain of which it is a member. The
domain-determined SSL VPN portal will be displayed when logging in with
this user type.
Admin: This is the router’s super-user, and can manage the router, use SSL
VPN to access network resources, and login to L2TP/PPTP servers on the
WAN. There will always be one default administrator user for the GUI
159
Unified Services Router User Manual
Guest User (read-only): The guest user gains read only access to the GUI to
observe and review configuration settings. The guest does n ot have SSL VPN
access.
Captive Portal User: Captive portal users obtain internet access via approval
from the router. The access is determined based on captive portal policies.
Idle Timeout: This is the login timeout period for users of this group.
When SSLVPN users are selected, the SSLVPN settings are displayed with the
following parameters as captured in SSLVPN Settings. As per the Authentication Type
SSL VPN details are configured.
Authentication Type: The authentication Type can be one of the following:
Local User Database (default), RADIUS-PAP, RADIUS-CHAP, RADIUS-
MSCHAP, RADIUS-MSCHAPv2, NT Domain, Active Directory and LDAP.
Authentication Secret: If the domain uses RADIUS authentication then the
authentication secret is required (and this has to match the secret configured on
the RADIUS server).
Workgroup: This is required is for NT domain authentication. If there are
multiple workgroups, user can enter the details for up to two workgroups.
LDAP Base DN: This is the base domain name for the LDAP authentication
server. If there are multiple LDAP authentication servers, user s can enter the
details for up to two unique LDAP Base DN.
Active Directory Domain: If the domain uses the Active Directory
authentication, the Active Directory domain name is required. Users configured
in the Active Directory database are given access to the SSL VPN portal with
their Active Directory username and password. If there are multiple Active
Directory domains, user can enter the details for up to two authentication
domains.
160
Unified Services Router User Manual
161
Unified Services Router User Manual
Login Policies
To set login policies for the group, select the corresponding group click “Login
policies”. The following parameters are configured:
Group Name: This is the name of the group that can have its login policy edited
Disable Login: Enable to prevent the users of this group from logging into the
devices management interface(s)
Deny Login from WAN interface: Enable to prevent the users of this group
from logging in from a WAN (wide area network) interface. In this case only
login through LAN is allowed.
Policy by Browsers
To set browser policies for the group, select the corresponding group click “ Policy by
Browsers”. The following parameters are configured:
Group Name: This is the name of the group that can have its login policy edited
Deny Login from Defined Browsers: The list of defi ned browsers below will be
used to prevent the users of this group from logging in to the routers GUI. All
non-defined browsers will be allowed for login for this group.
162
Unified Services Router User Manual
Allow Login from Defined Browsers: The list of defined browsers below will
be used to allow the users of this group from logging in to the routers GUI. All
non-defined browsers will be denied for login for this group.
Defined Browsers: This list displays the web browsers that have been added to
the Defined Browsers allotment, upon which group login policies can be
defined. (Check Box at First Column Header): Selects all the defined browsers
in the table.
Delete: Deletes the selected browser(s).
You can add to the list of Defined Browsers by selecting a client browser from the
drop down menu and clicking Add. This browser will then appear in the above list
of Defined Browsers.
Click Save Settings to save your changes.
Policy by IP
To set policies bye IP for the group, select the corresponding group click “Policy by
IP”. The following parameters are configured:
Group Name: This is the name of the group that can have its login policy edited
163
Unified Services Router User Manual
Deny Login from Defined Browsers: The list of defined browsers below will be
used to prevent the users of this group from logging in to the routers GUI. All
non-defined browsers will be allowed for login for this group.
Allow Login from Defined Browsers: The list of defined browsers below will
be used to allow the users of this group from logging in to the routers GUI. All
non-defined browsers will be denied for login for this group.
Defined Browsers: Displays the web browsers that have been added to the
Defined Browsers list, upon which group login policies can be defined.
Check Box At First Column Header: Selects all defined browsers in the table.
Delete: Deletes the selected browser(s).
You can add to the list of Defined Browsers by selecting a client browser from the
drop down menu and clicking Add. This browser will then appear in the above list
of Defined Browsers.
Click Save Settings to save your changes.
164
Unified Services Router User Manual
Login Policies, Policy by Browsers, Policy by IP are applicable SSL VPN user
only.
Figure 104: Available Users with login status and associated Group
Security > Authentication > User Database > Users > Add New Users
The user configurations allow creating users associated to group. The user settings
contain the following key components:
User Name: This is unique identifier of the user.
First Name: This is the user’s first name
Last Name: This is the user’s last name
Select Group: A group is chosen from a list of configured groups.
Password: The password associated with the user name.
165
Unified Services Router User Manual
166
Unified Services Router User Manual
Figure 106: Import a CSV file with multiple users to the User Database
The following parameters must be used to define the User database CSV file.
1. Create an empty text file with a .csv extension
2. Each line in the file corresponds to a single user entry. Every line should end
with carriage return equivalent of CRLF. Do not add comments or other text in
this file.
3. Formatting rules:
a) All the fields must be enclosed within double quotes.
b) Consecutive fields are seperated by commas.
c) There should be no leading or trailing spaces in a line.
d) There should be no spaces between fields.
Each line in the CSV user database file should follow the following format:
"UserName","FirstName","LastName","GroupName","MultiLogin","Password"
The above sample has fields that can assume the following valu es:
Username (text field): Name of the user and identifier in the DSR’s database,
and so it must be unique in the local user database.
FirstName (text field): This is a user detail and need not be unique.
LastName (text field): This is a user detail and need not be unique.
GroupName (text field): The group that is associated with this user.
MultiLogSup (Boolean value): With this enabled (“1”), then multiple users can
share a single username and password.
Password (text field): password to assign for th is username
The Group for a corresponding user (“GroupName” in the CSV) must be created
via the GUI in advance of the User Database CSV upload action.
None of the above fields can be left empty or NULL in the User Database CSV.
167
Unified Services Router User Manual
A more specific policy takes precedence over a generic policy when both are
applied to the same user/group/global domain. I.e. a policy for a specific IP
address takes precedence over a policy for a range of addresses containing the IP
address already referenced.
To add a SSL VPN policy, you must first assign it to a user, group, or make it global
(i.e. applicable to all SSL VPN users). If the policy is for a group, the available
configured groups are shown in a drop down menu and one must be selected. Similarly,
for a user defined policy a SSL VPN user must be chosen from the available list of
configured users.
The next step is to define the policy details. The policy name is a unique identifier for
this rule. The policy can be assigned to a specific Network Resource (details follow in
the subsequent section), IP address, IP network, or all devices on the LAN of the router.
Based on the selection of one of these four options, the approp riate configuration fields
are required (i.e. choosing the network resources from a list of defined resources, or
defining the IP addresses). For applying the policy to addresses the port range/port
number can be defined.
The final steps require the policy permission to be set to either permit or deny access
to the selected addresses or network resources. As well the policy can be specified for
one or all of the supported SSL VPN services (i.e. VPN tunnel)
168
Unified Services Router User Manual
Once defined, the policy goes into effect immediat ely. The policy name, SSL service it
applies to, destination (network resource or IP addresses) and permission (deny/permit)
is outlined in a list of configured policies for the router.
To configure a policy for a single user or group of users, enter the following information:
Policy for: The policy can be assigned to a group of users, a single user, or all
users (making it a global policy). To customize the policy for specific users or
groups, the user can select from the Available Groups and Available Users drop
down.
Apply policy to: This refers to the LAN resources managed by the DSR, and
the policy can provide (or prevent) access to network resources, IP address, IP
network, etc.
Policy name: This field is a unique name for identifying the policy. IP address:
Required when the governed resource is identified by its IP address or range of
addresses.
Mask Length: Required when the governed resource is identified by a range of
addresses within a subnet.
ICMP: Select this option to include ICMP traffic
Port range: If the policy governs a type of traffic, this field is used for defining
TCP or UDP port number(s) corresponding to the governed traffic. Leaving the
starting and ending port range blank corresponds to all UDP and TCP traffic.
Service: This is the SSL VPN service made available by this policy. The
services offered are VPN tunnel, port forwarding or both.
Defined resources: This policy can provide access to specific network
resources. Network resources must be configured in advance of creating the
policy to make them available for selection as a defined resource. Network
resources are created with the following information
169
Unified Services Router User Manual
170
Unified Services Router User Manual
Figure 109: List of conf igured resources, which are available to assign to
SSL VPN policies
171
Unified Services Router User Manual
address and TCP port number of the application to be tunneled. The table below lists
some common applications and corresponding TCP port numbers:
SSH 22
Telnet 23
HTTP (web) 80
Citrix 1494
As a convenience for remote users, the hostname (FQDN) of the network server can be
configured to allow for IP address resolution. This host name resolution provides users
with easy-to-remember FQDN’s to access TCP applications instead of error-prone IP
addresses when using the Port Forwarding service through the SSL User Portal.
To configure port forwarding, following are required:
Local Server IP address: The IP address of the local server which is hosting the
application.
TCP port: The TCP port of the application
Once the new application is defined it is displayed in a list of configured applications
for port forwarding.
allow users to access the private network servers by using a hostname instead of an IP
address, the FQDN corresponding to the IP address is defined in the port forwarding
host configuration section.
Local server IP address: The IP address of the local server hosting the
application. The application should be configured in advance.
Fully qualified domain name: The domain na me of the internal server is to be
specified
Once the new FQDN is configured, it is displayed in a list of configured hosts for port
forwarding.
Defining the hostname is optional as minimum requirement for port forw arding
is identifying the TCP application and local server IP address. The local server
IP address of the configured hostname must match the IP address of the
configured application for port forwarding.
172
Unified Services Router User Manual
173
Unified Services Router User Manual
174
Unified Services Router User Manual
The router allows full tunnel and split tunnel support. Full tunnel mode just sends all
traffic from the client across the VPN tunnel to the rou ter. Split tunnel mode only sends
traffic to the private LAN based on pre -specified client routes. These client routes give
the SSL client access to specific private networks, thereby allowing access control over
specific LAN services.
Client level configuration supports the following:
Enable Split Tunnel Support: With a split tunnel, only resources which are
referenced by client routes can be accessed over the VPN tunnel. With full
tunnel support (if the split tunnel option is disabled the DSR acts in full tunnel
mode) all addresses on the private network are accessible over the VPN tunnel.
Client routes are not required.
DNS Suffix: The DNS suffix name which will be given to the SSL VPN client.
This configuration is optional.
Primary DNS Server: DNS server IP address to set on the network adaptor
created on the client host. This configuration is optional.
Secondary DNS Server: Secondary DNS server IP address to set on the network
adaptor created on the client host. This configuration is optional.
Client Address Range Begin: Clients who connect to the tunnel get a DHCP
served IP address assigned to the network adaptor from the range of addresses
beginning with this IP address
Client Address Range End: The ending IP address of the DHCP range of
addresses served to the client network adaptor.
175
Unified Services Router User Manual
client. When split tunnel mode is enabled, the user is required to configure routes for
VPN tunnel clients:
Destination network: The network address of the LAN or the subnet information
of the destination network from the VPN tunnel clients’ perspective is set here.
Subnet mask: The subnet information of the destination network is set here.
Figure 112: Configured client routes only apply in split tunnel mode
1.Open terminal and run "visudo" as root and it will open sudoers file
176
Unified Services Router User Manual
While uninstalling SSLVPN tunnel, when it asks for password, enter th e MAC
user account password but not the root password or SSL VPN user password
Figure 113: List of configured SSL VPN portal s. The configured portal
can then be associated with an authentication domain
Setup > VPN Settings > SSL VPN Server > Portal Layouts
The router allows you to create a custom page for remote SSL VPN users that is
presented upon authentication. There are various fields in the portal that are
customizable for the domain, and this allows the router administrator to communicate
details such as login instructions, available services, and other usage details in the
portal visible to remote users. During domain setup, configured portal layouts are
available to select for all users authenticated by the domain.
177
Unified Services Router User Manual
The router administrator creates and edits portal layouts from the configuration pages
in the SSL VPN menu. The portal name, title, banner name, and banner contents are all
customizable to the intended users for this portal. The portal name is appended to the
SSL VPN portal URL. As well, the users assigned to this portal (through their
authentication domain) can be presented with one or more of the router’s supported
SSL services such as the VPN Tunnel page or Port Forwarding page.
To configure a portal layout and theme, following information is needed:
Portal layout name: A descriptive name for the custom portal that is being
configured. It is used as part of the SSL portal URL.
Portal site title: The portal web browser window title that appears when the
client accesses this portal. This field is optional.
Banner title: The banner title that is displayed to SSL VPN clients prior t o
login. This field is optional.
Banner message: The banner message that is displayed to SSL VPN clients prior
to login. This field is optional.
Display banner message on the login page: The user has the option to either
display or hide the banner message in the login page.
HTTP meta tags for cache control: This security feature prevents expired web
pages and data from being stored in the client’s web browser cache. It is
recommended that the user selects this option.
ActiveX web cache cleaner: An ActiveX cache control web cleaner can be
pushed from the gateway to the client browser whenever users login to this SSL
VPN portal.
SSL VPN portal page to display: The User can either enable VPN tunnel page
or Port Forwarding, or both depending on the SSL services to display on this
portal.
Once the portal settings are configured, the newly configured portal is added to the list
of portal layouts.
This pages allows the admin to create a custom SSL VPN portal layout. This new portal is for local DB
authentication using the SSL VPN group user, and then the port forward connection for this local database
portal is available.
178
Unified Services Router User Manual
179
Unified Services Router User Manual
180
Unified Services Router User Manual
181
Unified Services Router User Manual
USB-1:
Enable USB Printer: Select this option to allow the USB printer connected to the router
to be shared across the network.
The USB printer can be accessed on any LAN host (with appropriate printer driver
installed) connected to the router by using the following command in the host's add
printers window
http://<Router's IP:631>/printers/<Device Model> (Device Model can be found in the
USB settings page).
Enable Sharing: Select this option to allow the USB storage device connected to the
router to be shared across the network.
USB-2:
Enable USB Printer: Select this option to allow the USB printer connected to the router
to be shared across the network.
The USB printer can be accessed on any LAN host (with appropriate printer driver
installed) connected to the router by using the following command in the host's add
printers window
http://<Router's IP:631>/printers/<Device Model> (Device Model can be found in the
USB settings page).
Enable Sharing: Select this option to allow the USB storage device connected to the
router to be shared across the network.
Sharing Enabled interfaces:
The LAN interfaces on which USB sharing is enabled, at least one interface must be
selected to begin sharing.
Enable Printer: Enables printer sharing on the selected interface.
Enable Storage: Enables storage device sharing on the selected interface.
182
Unified Services Router User Manual
183
Unified Services Router User Manual
In all cases, the “Server Checking” button is used to verify connectivity to the
configured server(s).
The DSR router acts only as a POP3 client to authenticate a user by contacting an
external POP3 server. This authentication option is available for IPsec, PPTP/L2TP
184
Unified Services Router User Manual
Server and Captive Portal users. Note that POP3 for PPTP / L2TP servers is
supported only with PAP and not with CHAP / MSCHAP / MSCHAPv2 encryption.
185
Unified Services Router User Manual
186
Unified Services Router User Manual
Security > Authentication > External Auth Server > RADIUS Server
Enterprise Mode for wireless security uses a RADIUS Server for WPA and/or WPA2
security. A RADIUS server must be configured and accessible by the router to
authenticate wireless client connections to an AP enabled with a profile that uses
RADIUS authentication.
The Authentication IP Address is required to identify the server. A secondary
RADIUS server provides redundancy in the event that the primary server cannot be
reached by the router when needed.
187
Unified Services Router User Manual
188
Unified Services Router User Manual
The configured Authentication Servers and Active Directory domain(s) are used to
validate the user with the directory of users on the external Windows based server.
This authentication option is common for SSL VPN client users and is also useful for
IPsec / PPTP / L2TP client authentication.
189
Unified Services Router User Manual
The details configured on the router will be passed for authenticating the router and
its hosts. The LDAP attributes, domain name (DN), and in some cases the
administrator account & password are key fields in allowing the LDAP server to
authenticate the router.
190
Unified Services Router User Manual
191
Unified Services Router User Manual
The certificates menu allows you to view a list of certificates (both from a CA and self -
signed) currently loaded on the gateway. The following certificate data is displayed in
the list of Trusted (CA) certificates:
CA Identity (Subject Name): The certificate is issued to this person or organization
Issuer Name: This is the CA name that issued this certificate
Expiry Time: The date after which this Trusted certificate becomes inv alid
A self certificate is a certificate issued by a CA identifying your device (or self -signed
if you don’t want the identity protection of a CA). The Active Self Certificate table
lists the self certificates currently loaded on the gateway. The following information is
displayed for each uploaded self certificate:
Name: The name you use to identify this certificate, it is not displayed to IPsec
VPN peers or SSL users.
Subject Name: This is the name that will be displayed as the owner of this
certificate. This should be your official registered or company name, as IPsec or
SSL VPN peers are shown this field.
Serial Number: The serial number is maintained by the CA and used to identify this
signed certificate.
Issuer Name: This is the CA name that issued (signed) this certificate
Expiry Time: The date after which this signed certificate becomes invalid – you
should renew the certificate before it expires.
To request a self certificate to be signed by a CA, you can generate a Certificate Signing
Request from the gateway by entering identification parameters and pass ing it along to
the CA for signing. Once signed, the CA’s Trusted Certificate and signed certificate
from the CA are uploaded to activate the self -certificate validating the identity of this
gateway. The self certificate is then used in IPsec and SSL connections with peers to
validate the gateway’s authenticity.
192
Unified Services Router User Manual
193
Unified Services Router User Manual
This feature supports a single driver and single language pack to be stored in the router
(i.e. these files are available for use after device reboot) . There are 2 types of
installations supported by this feature:
194
Unified Services Router User Manual
2. Auto Installation: By selecting the link “click here” the Auto installation of the
package is exercised. A page showing the list of available drivers / language
packs is displayed from which the user can select and instal l one of the options.
For this type of installation the router must be able to access the internet, as
this will allow the user to download the package from a repository server which
consists of all the available languages.
Device Drivers: Users can install drivers manually or can install from the listed drivers.
List of Device Drivers: It allows the user to install or uninstall the available drivers.
Manual Install: User can upload the provided driver package for installation.
195
Unified Services Router User Manual
Browse: The user can choose the package to upload. Click on “Install” to save your
changes.
196
Unified Services Router User Manual
Upon clicking on the link “click here”, a page showing the list of device drivers is
displayed.
Driver: Description of the driver name.
Description: This describes the type of language installation pack supported.
Installed: All the language installation packs or option 3G Driver for ThreeG V -1.0
displayed in the list of device drivers are shown in Red color by default since none of
them have been selected. When a particular language installation pack or if Option
Driver for ThreeG V-1.0 is selected then the button turns green in color.
Action: It consists of 2 options:
Install 1.0: Click on “Install 1.0” to install a particular Language pack.
Remove: To remove the installed language pack, click on “Remove”.
Manual Install: User can upload the provided driver package for installation.
Install History: This displays the history of the language packs installed/uninstalled
previously along with the respective date and time to show when they were
installed/uninstalled.
Once the language has been selected by the user from the list of Device Drivers, the
“Set Language” option under “Tools” menu will display the selected language. The user
must select the language from the drop down l ist of “Set Language” and save the
settings so that this configuration is applied in its entirety.
197
Unified Services Router User Manual
198
Unified Services Router User Manual
199
Unified Services Router User Manual
Currently, dynamic web content filtering (WCF) is the only license -controlled
feature available in the DSR products.
200
Unified Services Router User Manual
201
Unified Services Router User Manual
This feature restricts management access via the GUI to a predefined set of IP addresses or VLAN
subnets. When enabled, the GUI management access can be restricted for all LAN hosts, and
instead enabled only via a specific IP address or specific VLAN subnet.
202
Unified Services Router User Manual
203
Unified Services Router User Manual
204
Unified Services Router User Manual
Accurate date and time on the router is critical for firewall schedules, Wi -Fi
power saving support to disable APs at certain times of the day, and accurat e
logging.
3. Determine whether to use default or custom Network Time Protocol (NTP) servers. If
custom, enter the server addresses or FQDN.
205
Unified Services Router User Manual
206
Unified Services Router User Manual
INFORMATION: informational
The display for logging can be customized based on where the logs are sent, ei ther
the Event Log viewer in the GUI (the Event Log viewer is in the Status > Logs page)
or a remote Syslog server for later review. E-mail logs, discussed in a subsequent
section, follow the same configuration as logs configured for a Syslog server.
207
Unified Services Router User Manual
Traffic through each network segment (LAN, WAN, DMZ) can be tracked based on
whether the packet was accepted or dropped by the firewall.
Accepted Packets are those that were successfully transferred through the
corresponding network segment (i.e. LAN to WAN). This option is particularly useful
when the Default Outbound Policy is “Block Always” so the IT admin can monitor
traffic that is passed through the firewall.
Example: If Accept Packets from LAN to WAN is enabled and there is a
firewall rule to allow SSH traffic from LAN, then whenever a LAN machine
tries to make an SSH connection, those packets will be accepted and a
message will be logged. (Assuming the log option is set to Allow for the SSH
firewall rule.)
Dropped Packets are packets that were intentionally blocked from being transferred
through the corresponding network segment. This option is useful when the Default
Outbound Policy is “Allow Always”.
Example: If Drop Packets from LAN to WAN is enabled and there is a firewall
rule to block SSH traffic from LAN, then whenever a LAN machine tries to
make an SSH connection, those packets will be dropped and a message will
be logged. (Make sure the log option is set to allow for this firewall rule.)
Enabling accepted packet logging through the firewall may generate a significant
volume of log messages depending on the typical network traffic. This is
recommended for debugging purposes only.
In addition to network segment logging, unicast and multicast traffic can be logged.
Unicast packets have a single destination on the network, whereas broadcast (or
multicast) packets are sent to all possible destinations simultaneously. One other
useful log control is to log packets that are dropped due to configured bandwidth
profiles over a particular interface. This data will indicate to the admin whether the
bandwidth profile has to be modified to account for the desired internet traffic of LAN
users.
208
Unified Services Router User Manual
Figure 140: IPv6 Log configuration options for traffic through router
209
Unified Services Router User Manual
Once you enable the option to e-mail logs, enter the e-mail server’s address (IP
address or FQDN) of the SMTP server. The router will connect to this server when
sending e-mails out to the configured addresses. The SMTP port and return e-mail
addresses are required fields to allow the router to package the logs and send a valid
e-mail that is accepted by one of the configured “send -to” addresses. Up to three e-
mail addresses can be configured as log recipients.
In order to establish a connection with the conf igured SMTP port and server, define
the server’s authentication requirements. The router supports Login Plain (no
encryption) or CRAM-MD5 (encrypted) for the username and password data to be
sent to the SMTP server. Authentication can be disabled if the server does not have
this requirement. In some cases the SMTP server may send out IDENT requests, and
this router can have this response option enabled as needed.
Once the e-mail server and recipient details are defined you can determine when the
router should send out logs. E-mail logs can be sent out based on a defined schedule
by first choosing the unit (i.e. the frequency) of sending logs: Hourly, Daily, or
Weekly. Selecting Never will disable log e -mails but will preserve the e-mail server
settings.
An external Syslog server is often used by network administrator to collect and store
logs from the router. This remote device typically has less memory constraints tha n
the local Event Viewer on the router’s GUI, and thus can collect a considerable
number of logs over a sustained period. This is typically very useful for debugging
network issues or to monitor router traffic over a long duration.
210
Unified Services Router User Manual
It is very important to have accurate system time (manually set or from a NTP
server) in order to understand log messages.
Status > Sysytem Information > All Logs > IPSec VPN Logs
This page displays IPsec VPN log messages as determined by the configuration
settings for facility and severity. This data is useful when evaluating IPsec VPN traffic
and tunnel health.
211
Unified Services Router User Manual
IMPORTANT! During a restore operation, do NOT try to go online, turn off the
router, shut down the PC, or do anything else to the router until the operation is
complete. This will take approximately 1 minute. Once the LEDs are turned off,
wait a few more seconds before doing anything with the router.
2. If there is a USB storage device currently plugged in to the system, you can enable
Autobackup of the configuration file to the USB file system. The snapshot of current
configuration settings will be updated on the USB file system and overwrite any files with
the same filename (i.e. if there was an earlier configuration backup done to this location).
212
Unified Services Router User Manual
3. To restore your saved settings from a backup file, click Browse then locate the file on the
host. After clicking Restore, the router begins importing the file’s saved configuration
settings. After the restore, the router reboots automatically with the restored settings.
4. To erase your current settings and revert to factory default settings, click the Default
button. The router will then restore configuration settings to factory defaults and will
reboot automatically. (See Appendix B for the factory default parameters for the router).
Figure 144: Restoring configuration from a saved file will result in the
current configuration being overwritten and a reboot
The configuration file can be encrypted during the backup process by enabling
encryption. This will ensure confidential information like system username / passwords
are not available for view by unauthorized sources. Selecting this option will apply to
configuration files backed up on the host as well as a USB drive.
213
Unified Services Router User Manual
IMPORTANT! During firmware upgrade, do NOT try to go online, turn off the
DSR, shut down the PC, or interrupt the process in anyway until the operation is
complete. This should take only a minute or so including the reboot p rocess.
Interrupting the upgrade process at specific points when the flash is being written
to may corrupt the flash memory and render the router unusable without a low-
level process of restoring the flash firmware (not through the web GUI).
214
Unified Services Router User Manual
215
Unified Services Router User Manual
216
Unified Services Router User Manual
217
Unified Services Router User Manual
218
Unified Services Router User Manual
9.10.1 Ping
This utility can be used to test connectivity between this router and another device on
the network connected to this router. Enter an IP address and click PING . The
command output will appear indicating the ICMP echo request status.
219
Unified Services Router User Manual
This feature assumes there is internet access available on the WAN link(s) .
220
Unified Services Router User Manual
9.11 Localization
Maintenance > Administration > Set Language
The router GUI displays content in English by default. T he package manager feature
has to be enabled so that the appropriate language of the installed language pack age is
shown. The user must configure the package manager feature under Advanced settings
first, in order to install a language package.
221
Unified Services Router User Manual
222
Unified Services Router User Manual
223
Unified Services Router User Manual
224
Unified Services Router User Manual
225
Unified Services Router User Manual
226
Unified Services Router User Manual
227
Unified Services Router User Manual
228
Unified Services Router User Manual
The statistics table has auto-refresh control which allows display of the most current
port level data at each page refresh. The default auto-refresh for this page is 10
seconds.
Figure 159: List of connected 802.11 clients per AP
229
Unified Services Router User Manual
the traffic details and tunnel state. The traffic is a cumulative measure of
transmitted/received packets since the tunnel was established.
If a VPN policy state is “IPsec SA Not Established”, it can be enabled by clicking the
Connect button of the corresponding policy. The Active IPsec SAs table displays a
list of active IPsec SAs. Table fields are as follows.
Field Description
State Status of the SA for IKE policies: Not Connected or IPsec SA Established.
230
Unified Services Router User Manual
All active SSL VPN connections, both for VPN tunnel and VPN Port forwarding, are
displayed on this page as well. Table fields are as follows.
231
Unified Services Router User Manual
Field Description
The SSL VPN user that has an active tunnel or port forwarding session to this
User Name
router.
Local PPP Interface The interface (WAN1 or WAN2) through which the session is active.
Peer PPP Interface IP The assigned IP address of the virtual network adapter.
Status of the SSL connection between this router and the remote VPN client: Not
Connect Status
Connected or Connected.
232
Unified Services Router User Manual
2. Ensure that your PC’s IP address is on the same subnet as the router. If you are using the
recommended addressing scheme, your PC’s address should be in the range 192.168.10.2
to 192.168.10.254.
3. Check your PC’s IP address. If the PC cannot reach a DHCP server, some versions of
Windows and Mac OS generate and assign an IP address. These auto-generated addresses
are in the range 169.254.x.x. If your IP address is in this range, check the connection from
the PC to the firewall and reboot your PC.
4. If your router’s IP address has changed and you don’t know what it is, reset the router
configuration to factory defaults (this sets the firewall’s IP address to 192.168.10.1).
5. If you do not want to reset to factory default settings and lose your configuration, reboot
the router and use a packet sniffer (such as Ethereal™) to capture packets sent during the
reboot. Look at the Address Resolution Protocol (ARP) packets to locate the router’s LAN
interface address.
6. Launch your browser and ensure that Java, JavaScript, or ActiveX is enabled. If you are
using Internet Explorer, click Refresh to ensure that the Java applet is loaded. Close the
browser and launch it again.
7. Ensure that you are using the correct login information. The factory default login name is
admin and the password is password. Ensure that CAPS LOCK is off when entering this
information.
2. Click Refresh or Reload in the browser. Your changes may have been made, but the
browser may be caching the old configuration.
233
Unified Services Router User Manual
Possible cause: If you use dynamic IP addresses, your router may not have requested
an IP address from the ISP.
Recommended action:
1. Launch your browser and go to an external site such as www.google.com.
4. Ensure that an IP address is shown for the WAN port. If 0.0.0.0 is shown, your firewall
has not obtained an IP address from your ISP. See the next symptom.
3. Wait 5 minutes, and then reapply power to the cable or DSL modem.
4. When the modem LEDs indicate that it has resynchronized with the ISP, reapply power to
the router. If the router still cannot obtain an ISP address, see the next symptom.
2. If yes, verify that your configured login name and password are correct.
4. If yes, select Network Configuration > WAN Settings > Ethernet ISP
Settings and set the account name to the PC hostname of your ISP account.
5. Ask your ISP if it allows only one Ethernet MAC address to connect to the Internet, and
therefore checks for your PC’s MAC address.
6. If yes, inform your ISP that you have bought a new network device, and ask them to use
the firewall’s MAC address.
7. Alternatively, select Network Configuration > WAN Settings > Ethernet ISP
Settings and configure your router to spoof your PC’s MAC address.
Symptom: Router can obtain an IP address, but PC is unable to load Internet pages.
234
Unified Services Router User Manual
Recommended action:
1. Ask your ISP for the addresses of its designated Domain Name System (DNS) servers.
Configure your PC to recognize those addresses. For details, see your operating system
documentation.
2. Click to check or uncheck “Automatically adjust for Daylight Savings Time”, then click
Apply.
2. Type ping <IP_address> where <IP_address> is the router’s IP address. Example: ping
192.168.10.1.
3. Click OK.
235
Unified Services Router User Manual
Verify that the corresponding link LEDs are lit for your network interface
card and for any hub ports that are connected to your workstation and
firewall.
Verify that the Ethernet card driver software and TCP/IP software are
installed and configured on the PC.
Verify that the IP address for the router and PC are correct and on the
same subnet.
3. Click OK and then observe the display (see the previous procedure).
Check that the PC has the IP address of your firewall listed as the default
gateway. (If the IP configuration of your PC is assigned by DHCP, this
information is not visible in your PC’s Network Control Panel.)
236
Unified Services Router User Manual
Verify that the network (subnet) address of your PC is different from the
network address of the remote device.
If yes, select Network Configuration > WAN Settings > Ethernet ISP Settings
and enter that hostname as the ISP account name.
Ask your ISP if it rejects the Ethernet MAC addresses of all but one of
your PCs.
Many broadband ISPs restrict access by allowing traffic from the MAC address of
only your broadband modem; but some ISPs additionally restrict access to the MAC
address of just a single PC connected to that modem. If this is the case, configure your
firewall to clone or spoof the MAC address from the authorized PC.
If yes, select Maintenance > Firmware & Config > Soft Reboot and
click Default.
o On the rear panel of the router, press and hold the Reset button
about 10 seconds, until the test LED lights and then blinks.
o Release the button and wait for the router to reboot.
2. If the router does not restart automatically; manually restart it to make the default settings
effective.
3. After a restore to factory defaults —whether initiated from the configuration interface or
the Reset button — the following settings apply:
Username: admin
Password: admin
237
Chapter 12. Credits
Appendix A. Glossary
ARP Address Resolution Protocol. Broadcast protocol for mapping IP addresses to MAC addresses.
Dynamic DNS. System for updating domain names in real time. Allows a domain name to be
DDNS
assigned to a device with a dynamic IP address.
Dynamic Host Configuration Protocol. Protocol for allocating IP addresses dynamically so that
DHCP
addresses can be reused when hosts no longer need them.
Domain Name System. Mechanism for translating H.323 IDs, URLs, or e-mail IDs into IP
DNS addresses. Also used to assist in locating remote gatekeepers and to map IP addresses to
hostnames of administrative domains.
Fully qualified domain name. Complete domain name, including the host portion. Example:
FQDN
serverA.companyA.com.
FTP File Transfer Protocol. Protocol for transferring files between network nodes.
HTTP Hypertext Transfer Protocol. Protocol used by web browsers and web servers to transfer files.
Internet Key Exchange. Mode for securely exchanging encryption keys in ISAKMP as part of
IKE
building a VPN tunnel.
Internet Key Exchange Security Protocol. Protocol for establishing security associations and
ISAKMP
cryptographic keys on the Internet.
Maximum transmission unit. Size, in bytes, of the largest packet that can be passed on. The
MTU
MTU for Ethernet is a 1500-byte packet.
Microsoft Windows protocol for file sharing, printer sharing, messaging, authentication, and
NetBIOS
name resolution.
Network Time Protocol. Protocol for synchronizing a router to a single clock on the network,
NTP
known as the clock master.
Password Authentication Protocol. Protocol for authenticating users to a remote access server
PAP
or ISP.
240
Unified Services Router User Manual
Point-to-Point Protocol over Ethernet. Protocol for connecting a network of hosts to an ISP
PPPoE
without the ISP having to manage the allocation of IP addresses.
Point-to-Point Tunneling Protocol. Protocol for creation of VPNs for the secure transfer of data
PPTP
from remote clients to private servers over the Internet.
Remote Authentication Dial-In User Service. Protocol for remote user authentication and
RADIUS
accounting. Provides centralized management of usernames and passwords.
Transmission Control Protocol. Protocol for transmitting data over the Internet with guaranteed
TCP
reliability and in-order delivery.
User Data Protocol. Protocol for transmitting data over the Internet quickly but with no
UDP
guarantee of reliability or in-order delivery.
Virtual private network. Network that enables IP traffic to travel securely over a public TCP/IP
VPN network by encrypting all traffic from one network to another. Uses tunneling to encrypt all
information at the IP level.
Windows Internet Name Service. Service for name resolution. Allows clients on different IP
WINS subnets to dynamically resolve addresses, register themselves, and browse the network without
sending broadcasts.
IKE Extended Authentication. Method, based on the IKE protocol, for authenticating not just
XAUTH devices (which IKE authenticates) but also users. User authentication is performed after device
authentication and before IPsec negotiation.
241
Unified Services Router User Manual
242
Appendix B. Factory Default Settings
Feature Description Default Setting
Internet
WAN MTU size 1500
Connection
IP address 192.168.10.1
SNMP Disabled
244
Unified Services Router User Manual
245
Unified Services Router User Manual
246
Unified Services Router User Manual
247
Unified Services Router User Manual
nimfAdvOptSetWrap: interface
pSshdEnable: %s DEBUG advanced options applied ERROR
nimfGetUpdateMacFlag: unable to
pPrivSep: %s DEBUG get Flag from MacTable ERROR
%s:DBUpdate event: Table: %s nimfMacGet: Updating MAC address
opCode:%d rowId:%d DEBUG failed ERROR
Re-Starting sshd daemon.... DEBUG sqlite3QueryResGet failed.Query:%s ERROR
sshd re-started successfully. DEBUG error executing the command %s ERROR
sshd stopped . DEBUG error executing the command %s ERROR
failed query %s DEBUG error executing the command %s ERROR
vlan disabled, not applying vlan disableLan function is failed to
configuration.. DEBUG disable ConfigPort" ERROR
failed query %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR
failed query %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR
Unable to Disable configurable port
no ports present in this vlanId %d DEBUG from ERROR
failed query %s DEBUG configPortTblHandler has failed ERROR
vlan disabled, not applying vlan
configuration.. DEBUG sqlite3QueryResGet failed.Query:%s ERROR
Error in executing DB update
disabling vlan DEBUG handler ERROR
enabling vlan DEBUG sqlite3QueryResGet failed ERROR
vlan disabled, not applying vlan Failed to execute switchConfig for
configuration.. DEBUG port\ ERROR
Failed to execute switchConfig for
no ports present in this vlanId %d DEBUG port enable ERROR
Failed to execute ifconfig for port
failed query %s DEBUG enable ERROR
vlan disabled, not applying vlan
configuration.. DEBUG Failed to execute ethtool for\ ERROR
Failed to execute switchConfig for
removing %s from bridge%s... %s DEBUG port disable ERROR
Failed to execute ifconfig for port
adding %s to bridge%d... %s DEBUG disable ERROR
restarting bridge... DEBUG sqlite3QueryResGet failed ERROR
[switchConfig] Ignoring event on port
number %d DEBUG sqlite3_mprintf failed ERROR
restarting bridge... DEBUG sqlite3QueryResGet failed ERROR
Failed to execute switchConfig for
executing %s ... %s DEBUG port mirroring ERROR
Usage:%s <DB Name> <Entry
removing %s from bridge%s... %s DEBUG Name> <logFile> <subject> ERROR
adding %s to bridge%d... %s DEBUG sqlite3QueryResGet failed ERROR
Could not get all the required
[switchConfig] Ignoring event on %s DEBUG variables to email the Logs. ERROR
restarting bridge... DEBUG runSmtpClient failed ERROR
[switchConfig] Ignoring event on port
number %d DEBUG getaddrinfo returned %s ERROR
[switchConfig] executing %s ... %s DEBUG file not found ERROR
restarting bridge... DEBUG sqlite3QueryResGet failed.Query:%s ERROR
UserName: %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR
Password: %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR
IspName: %s DEBUG No memory to allocate ERROR
Failed to Open SSHD Configuration
DialNumber: %s DEBUG File ERROR
248
Unified Services Router User Manual
249
Unified Services Router User Manual
250
Unified Services Router User Manual
pppoeMgmtTblHandler:
IdleTimeOutValue: %d DEBUG failed to get field value ERROR
pppoeMgmtTblHandler: UserName: %s DEBUG failed to get field value ERROR
pppoeMgmtTblHandler: Password: %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR
pppoeMgmtTblHandler: DNS specified:
%s DEBUG sqlite3QueryResGet failed.Query:%s ERROR
pppoeMgmtTblHandler: Service: %s DEBUG unboundMgmt: unable to open the " ERROR
pppoeMgmtTblHandler: StaticIp: %s DEBUG writing options.xl2tpd failed ERROR
pppoeMgmtTblHandler: NetMask: %s DEBUG xl2tpdStop failed ERROR
pppoeMgmtTblHandler: AuthOpt: %d DEBUG writing xl2tpd.conf failed ERROR
pppoeMgmtTblHandler: Satus: %d DEBUG writing options.xl2tpd failed ERROR
pppoeEnable: ppp dial string: %s DEBUG xl2tpdStop failed ERROR
pppoeMgmtDBUpdateHandler:
returning with status: %s DEBUG xl2tpdStart failed ERROR
pptpMgmtTblHandler: MtuFlag: %d DEBUG sqlite3QueryResGet failed.Query:%s ERROR
writing Chap-secrets/Pap-Secrets
pptpMgmtTblHandler: Mtu: %d DEBUG failed ERROR
pptpMgmtTblHandler: IdleTimeOutFlag:
%d DEBUG xl2tpdStop failed ERROR
pptpMgmtTblHandler:
IdleTimeOutValue: %d DEBUG xl2tpdStart failed ERROR
pptpMgmtTblHandler: GetDnsFromIsp:
%d DEBUG sqlite3QueryResGet failed.Query:%s ERROR
writing Chap-secrets/Pap-Secrets
pptpMgmtTblHandler: UserName: %s DEBUG failed ERROR
pptpMgmtTblHandler: Password: %s DEBUG xl2tpdStop failed ERROR
pptpMgmtTblHandler: dynamic MyIp
configured DEBUG xl2tpdStart failed ERROR
pptpMgmtTblHandler: MyIp: %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR
writing Chap-secrets/Pap-Secrets
pptpMgmtTblHandler: ServerIp: %s DEBUG failed ERROR
Error in executing DB update
pptpMgmtTblHandler: StaticIp: %s DEBUG handler ERROR
pptpMgmtTblHandler: NetMask: %s DEBUG unboundMgmt: unable to open the " ERROR
pptpMgmtTblHandler:
MppeEncryptSupport: %s DEBUG Can't kill pptpd ERROR
pptpMgmtTblHandler: SplitTunnel: %s DEBUG pptpd restart failed ERROR
pptpEnable: ppp dial string: %s DEBUG Can't kill pptpd ERROR
pptpEnable: spawning command %s DEBUG failed to get field value ERROR
PID File for dhcpc found DEBUG failed to get field value ERROR
pid: %d DEBUG unboundMgmt: unable to open the " ERROR
pptpMgmtDBUpdateHandler: query
string: %s DEBUG writing options.pptpd failed ERROR
pptpMgmtDBUpdateHandler: returning
with status: %s DEBUG pptpdStop failed ERROR
dhcpcReleaseLease: dhcpc release
command: %s DEBUG writing pptpd.conf failed ERROR
dhcpcMgmtTblHandler: MtuFlag: %d DEBUG writing options.pptpd failed ERROR
dhcpcMgmtTblHandler: Mtu: %d DEBUG pptpdStop failed ERROR
DHCPv6 Server started successfully. DEBUG pptpdStart failed ERROR
writing Chap-secrets/Pap-Secrets
DHCPv6 Server stopped successfully DEBUG failed ERROR
Error in executing DB update
DHCPv6 Client started successfully. DEBUG handler ERROR
251
Unified Services Router User Manual
252
Unified Services Router User Manual
253
Unified Services Router User Manual
254
Unified Services Router User Manual
eapWscProcessWscData: Invalid
Authenticator response check: Error DEBUG notification recd %d ERROR
Authenticator response check: Failed DEBUG unable to initialize MD5 ERROR
MDString: adpDigestInit for md5
MS-CHAP2 Response AVP size = %u DEBUG failed ERROR
Created EAP/MS-CHAP2 context: OK. DEBUG EAPAUTH_MALLOC failed. ERROR
pCtx NULL. DEBUG EAPAUTH_MALLOC failed. ERROR
Deleted EAP/MS-CHAPv2 context: OK DEBUG NULL context created: Error ERROR
Not authenticated yet. DEBUG NULL context received: Error ERROR
Authenticator response invalid DEBUG Authenticator ident invalid. ERROR
Success request message invalid:
EAP-MS-CHAPv2 password changed. DEBUG Error ERROR
rcvd. opCode %d. DEBUG Plugin context is NULL ERROR
pCtx NULL. DEBUG Deriving implicit challenge: Error ERROR
TLS message len changed in the
fragment, ignoring. DEBUG Generating NT response: Error ERROR
no data to send while fragment ack
received. DEBUG NULL in/out buffer: Error ERROR
TLS handshake successful. DEBUG Incorrect vendor id. ERROR
Allocating memory for outBuff:
Created EAP/TTLS context: OK DEBUG ERROR ERROR
Deleted EAP/TTLS context: OK DEBUG AVP code not recognized ERROR
No more fragments in message.
ERROR DEBUG EAPAUTH_MALLOC failed. ERROR
Upper EAP sent us: method state = %d; Converting password to unicode:
decision = %d DEBUG Error ERROR
P2: sending fragment. DEBUG Generating password hash: Error. ERROR
Generating password hash hash:
P2 send unfragmented message. DEBUG Error. ERROR
P1: sending fragment. DEBUG Generating master key: Error. ERROR
Generating first 16 bytes of session
P1: sending unfragmented message. DEBUG key: Error.n ERROR
Generating second 16 bytes of
\tTLSMsgLen = 0x%x DEBUG session key: Error.n ERROR
Send req ptr = 0x%x; Send resp ptr = Converting password to unicode:
0x%x DEBUG Error ERROR
Constructing failure response:
P2 decision=(%d); methodState=(%d) DEBUG ERROR ERROR
Default EAP: method state = %d; Error checking authenticator
decision = %d DEBUG response. ERROR
TTLS pkt: data len=(%d) flags=(0x%x) DEBUG Error generating NT response. ERROR
Username string more than 256
Got start DEBUG ASCII characters: ERROR ERROR
Got first fragment (n). DEBUG Invalid Value-Size. ERROR
Invalid MS-Length. Got (%d),
Got fragment (n). DEBUG expected (%d) ERROR
Got last fragment DEBUG Error constructing response. ERROR
Got unfragmented message. DEBUG Got type (%d), expecting (%d) ERROR
Cannot handle message; opCode =
Got frag ack. DEBUG %d ERROR
Rcvd. AVP Code-%u: flags-0x%x: len-
%u: vendorId-%u: " DEBUG EAPAUTH_MALLOC failed. ERROR
MOD EAP: method state from upper =
%d; decision = %d DEBUG tlsGlueCtxCreate failed. ERROR
255
Unified Services Router User Manual
Got AVP len = %ul. Should be less than client certificate must be set in the
16777215 DEBUG profile. ERROR
AVP length extract: Error DEBUG received TLS message length too big. ERROR
total frags len > initial total TLS
pFB is NULL DEBUG length. ERROR
Requesting message before assembly total frags len > initial total TLS
complete DEBUG length. ERROR
total data rcvd(%d) doesnt match the
pFB is NULL DEBUG initial " ERROR
pFB is NULL DEBUG couldnt write %d data to TLS buffer. ERROR
invalid flags %s passed to
Buffer cannot hold message: ERROR DEBUG eapTlsBuildResp. ERROR
pFB is NULL: Error DEBUG EAPAUTH_MALLOC failed. ERROR
pFB is NULL DEBUG tlsGlueCtxCreate failed. ERROR
TLS_FB* is NULL. DEBUG Context NULL: ERROR ERROR
pFB->msgBuff is NULL. DEBUG Setting profile to glue layer: ERROR. ERROR
Error calculating binary. DEBUG _eapCtxCreate failed. ERROR
%d authentication not enabled in the
Error calculating binary. DEBUG system. ERROR
Initializing inner non-EAP auth plugin:
adpDigestInit for SHA1 failed. DEBUG ERROR ERROR
adpDigestInit for SHA1 failed. DEBUG TTLS key derive: ERROR ERROR
TTLS context from EAP plugin is
E = %d DEBUG NULL: ERROR ERROR
Allocating memory for TTLS Phase 2
R = %d DEBUG payload: ERROR ERROR
Could not initialize des-ecb DEBUG TLS Encrypting response: ERROR ERROR
Allocating TLS read buffer is NULL:
adpDigestInit for MD4 failed. DEBUG ERROR ERROR
Inner authentication (id: %d)
adpDigestInit for SHA1 failed. DEBUG unhandled ERROR
adpDigestInit for SHA1 failed. DEBUG innerEapRecv is NULL: ERROR. ERROR
Error converting received auth reponse
to bin. DEBUG Decrypting TLS data: ERROR ERROR
Gnerating challenge hash: Error DEBUG Processing Phase 2 method: Error ERROR
Generating password hash: Error DEBUG Writing message to BIO: ERROR. ERROR
Generating challenge response: Error DEBUG TLS handshake: ERROR. ERROR
Unexpected tlsGlueContinue return
Conn cipher name=%s ver=%s: %s DEBUG value. ERROR
Send req ptr = 0x%x; Send resp ptr = NULL request (or response) PDU or
0x%x DEBUG NULL context ERROR
Request ptr = 0x%x; DEBUG Protocol version mismatch: ERROR ERROR
Response ptr = 0x%x DEBUG Creating receive buffer: ERROR ERROR
Rcvd. AVP Code - %ul DEBUG Setting first fragment: ERROR ERROR
Rcvd. AVP flags - 0x%02x DEBUG Setting fragment: ERROR ERROR
Rcvd. AVP len - %ul DEBUG Setting last fragment: ERROR ERROR
Rcvd. AVP vendor id - %ul DEBUG Getting message: ERROR ERROR
\tCode = %d DEBUG Processing TTLS message: ERROR ERROR
\tIdent = %d DEBUG Processing TTLS message: ERROR ERROR
\tLen = %d DEBUG Processing TTLS message: ERROR ERROR
\tType = %d DEBUG Decapsulating AVP: ERROR ERROR
\tOpCode = %d DEBUG Processing EAP receive: Error ERROR
\tMSID = %d DEBUG AVP code not EAP: Error ERROR
256
Unified Services Router User Manual
257
Unified Services Router User Manual
SSL_CTX_use_certificate_file (cert,
PEM) failed. ERROR Error cleaning digest context. ERROR
SSL_CTX_use_PrivateKey_file failed. ERROR Error destroying digest context. ERROR
private key does not match public key ERROR Error stripping domain name. ERROR
SSL_CTX_load_verify_locations failed ERROR Error cleaning digest context. ERROR
SSL_new failed. ERROR Error cleaning digest context. ERROR
Both SSL_VERIFY_PEER and Challenge not present in failure
SSL_VERIFY_NONE set: Error ERROR packet. ERROR
EAPAUTH_MALLOC failed. ERROR Wrong challenge length. ERROR
Incorrect password change version
EAPAUTH_MALLOC failed. ERROR value. ERROR
eapTimerCreate failed. ERROR Error generating password hash. ERROR
eapCtxDelete:pCtx == NULL ERROR Error generating password hash. ERROR
eapRole != EAP_ROLE_PEER or Error encrypting password hash with
EAP_ROLE_AUTHENTICATOR ERROR block ERROR
pEapCtx == NULL or pPDU == NULL. ERROR Could not initialize des-ecb ERROR
received EAP pdu bigger than
EAP_MTU_SIZE. ERROR Error cleaning cipher context. ERROR
received EAP pdu bigger than
EAP_MTU_SIZE. ERROR Error cleaning cipher context. ERROR
state machine is in invalid state. ERROR Error cleaning digest context. ERROR
unable to create method context. ERROR Error cleaning digest context. ERROR
method ctxCreate failed. ERROR adpDigestInit for SHA1 failed. ERROR
method profile set failed. ERROR X509_ERROR : .Query:%s ERROR
X509_ERROR : Invalid Certificate for
state machine is in invalid state. ERROR the " ERROR
Only StandAlone authenticator
supported currently. ERROR invalid x509 certificate ERROR
state machine is in invalid state. ERROR Couldn't get the x509 cert hash ERROR
BuildReq operation failed ERROR Memory allocation failed ERROR
No method ops defined for current
method ERROR FileName too lengthy ERROR
Process operation failed ERROR Couldn't execute command ERROR
state machine is in invalid state. ERROR Memory allocation failed ERROR
Packet length mismatch %d, %d ERROR Memory allocation failed ERROR
eapAuthTypeToType: Invalid
eapAuthType %d ERROR invalid certificate data ERROR
eapTypeToAuthType: Invalid eapType
%d ERROR .Query:%s ERROR
unable to create method context. ERROR .Query:%s ERROR
method ctxCreate failed. ERROR Memory allocation failed ERROR
Invalid condition, methodState = %d, X509_ERROR : Failed to validate the
respMethod = %d ERROR certficate " ERROR
A EAP Ctx map already exists ERROR Memory allocation failed ERROR
eapTimerCreate: Currently unsupported
for Peer role ERROR .Query:%s ERROR
eapTimerStart: Currently unsupported
for Peer role ERROR Invalid Sign Key Length : %d ERROR
eapTimerDestroy: Currently
unsupported for Peer role ERROR Invalid Hash Alg : %d ERROR
eapTimerCancel: Currently unsupported
for Peer role ERROR Invalid Sign Alg : %d ERROR
eapTimerHandler: Currently
unsupported for Peer role ERROR No Memory Available ERROR
258
Unified Services Router User Manual
259
Unified Services Router User Manual
260
Unified Services Router User Manual
261
Unified Services Router User Manual
pNtpControl-
>ServerNames[SECONDARY_SERVE
R]: %s DEBUG failed to take lock for compId: %d ERROR
failed to convert ioctl args to buffer
DS: %d DEBUG for" ERROR
pPriServ %s DEBUG request timeout dst(%d) <-- src(%d) ERROR
pSecServ %s DEBUG failed to take lock for compId: %d ERROR
umiIoctlArgsToBuf: failed to allocate
Making request from %d --> %d DEBUG memory ERROR
sent request dst(%d) <-- src(%d) using umiRecvFrom: could not allocate
option %d DEBUG memory ERROR
received request too small!(%d bytes) DEBUG adpMalloc failed ERROR
context with ID: %d already
Received a UMI request from %d DEBUG registered ERROR
Failed to allocate memory for
sent a reply src(%d) ---> dst(%d) DEBUG creating UMI context ERROR
Failed to create recvSem for UMI
umiRegister (%x,%x,%x,%x) DEBUG context ERROR
srcId=%d(%s) --> destId=%d(%s) Failed to create mutex locks for UMI
cmd=%d inLen=%d outLen=%d DEBUG context ERROR
Failed to create mutex recvQLock for
waiting for reply...Giving Up DEBUG UMI context ERROR
No request in the list after semTake DEBUG Invalid arguments to umiIoctl ERROR
reply timeout DEBUG could not find the destination context ERROR
timeout after semTake DEBUG memPartAlloc for %d size failed ERROR
srcId=%d(%s) <-- destId=%d(%s)
cmd=%d DEBUG memPartAlloc for %d size failed ERROR
No Handler registered for this UMI
Un-registerting component with Id %d DEBUG context ERROR
failed to send ioctl request: dst(%d) <--- Couldn't find component with ID
src(%d) DEBUG (%d)," ERROR
processed a reply dst(%d) <-- src(%d) DEBUG id=%d handler=%x ERROR
request with no result option dst(%d) <-- Received NULL buffer in
src(%d) DEBUG umiBufToIoctlArgs() ERROR
usbMgmtInit: unable to open the
cmd = %s DEBUG database file %s ERROR
cmdstring is %s %s:%d DEBUG call to printConfig failed ERROR
Calling printerConfig binary ... DEBUG Failed to Disable Network Storage" ERROR
Some error occurred while removing
Calling unmount for USB ... DEBUG device ERROR
Some error occurred while removing
Calling mount for USB ... DEBUG device ERROR
usbdevice is %d %s:%d DEBUG Sqlite update failed ERROR
Query string: %s DEBUG Failed to enable printer properly ERROR
sqlite3QueryResGet failed.Query:%s DEBUG Failed to mount device on system ERROR
%s: 1. usb is already disconnected for Failed to enable network storage
old usb type. " DEBUG device" ERROR
%s: 2.call disable for new usb type ! DEBUG Failed to mount device on system ERROR
%s: 3. usb is already disconnected for
old usb type. " DEBUG Sqlite update failed ERROR
%s: 4. Disabled old usb type . Now " DEBUG USB1 Touch failed ERROR
usbdevice is %d %s:%d DEBUG USB2 Touch failed ERROR
USB: failed to begin transaction: %s DEBUG Sqlite update failed ERROR
USB: SQL error: %s pSetString = %s DEBUG Failed query: %s ERROR
262
Unified Services Router User Manual
263
Unified Services Router User Manual
umiIoctl (%s,
UMI_CMD_IFDEV_EVENT(%d)) failed. ERROR sqlite3QueryResGet failed.Query:%s ERROR
klogctl(9) failed ERROR Error in executing DB update handler ERROR
malloc failed for %d bytes ERROR unable to open the DB file %s ERROR
klogctl(4) failed ERROR umiInit failed ERROR
emailLogs: Invalid Number of
Arguments!! Exiting. ERROR unable to register to UMI ERROR
sqlite3QueryResGet failed ERROR short DB update event request! ERROR
Could not execute the smtpClient. ERROR short ifDev event request! ERROR
Error while cleaning the
database.Exiting. %s ERROR sqlite3_mprintf failed ERROR
%s failed. status=%d ERROR
264
Unified Services Router User Manual
265
Unified Services Router User Manual
Updating traffic meter with %d mins, Enabling Firewall Rule for IGMP
%d hours, " DEBUG Protocol DEBUG
Deleting IP/MAC Bind Rule for MAC
Deleting traffic meter. DEBUG address %s and IP " DEBUG
Adding IP/MAC Bind Rule for MAC
Disabling block traffic for traffic meter. DEBUG address %s and IP DEBUG
Deleting Protocol Bind Rule for
Enabling traffic meter. DEBUG Service %s DEBUG
Deleting Protocol Bind Rule for
Adding lan group %s. DEBUG Service %s DEBUG
Deleting Protocol Bind Rule for
Deleting lan group %s. DEBUG Service %s DEBUG
Adding Protocol Bind Rule for Service
Renaming lan group from %s to %s. DEBUG %s DEBUG
Deleting host %s from %s group. DEBUG %s Session Settings DEBUG
Adding host %s to %s group. DEBUG Restarting IPv6 Firewall Rules... DEBUG
Enabling Keyword blocking for %s Deleting Port Trigger Rule for
keyword. DEBUG %d:%d:%d:%d:%d DEBUG
Disabling keyword Blocking for %s Deleting Port Trigger Rule for
keyword . DEBUG %d:%d:%d:%d:%d DEBUG
Deleting trusted domain with keyword Enabling Port Trigger Rule for
%s. DEBUG %d:%d:%d:%d:%d DEBUG
Disabling Port Trigger Rule for
Adding %s keyword to trusted domain. DEBUG %d:%d:%d:%d:%d DEBUG
Enabling Management Access from Enabling Port Trigger Rule for
Internet on port %d DEBUG %d:%d:%d:%d:%d DEBUG
Enabling remote access management Disabling Port Trigger Rule for
for IP address range" DEBUG %d:%d:%d:%d:%d DEBUG
Enabling remote access management Adding Port Trigger Rule for
to only this PC. DEBUG %d:%d:%d:%d:%d DEBUG
Disabling Management Access from
Internet on port %d DEBUG Enabling Content Filter DEBUG
Disabling remote access management
for IP address range" DEBUG Disabling Content Filter DEBUG
Disabling remote access management
only to this PC. DEBUG Enabling Content Filter DEBUG
MAC Filtering %sabled for BLOCK and Setting NAT mode for pLogicalIfName
PERMIT REST. DEBUG = %s DEBUG
MAC Filtering %sabled for PERMIT and
BLOCK REST. DEBUG Enabling DROP for INPUT DEBUG
Enabling Content Filtering. DEBUG Enabling DROP for FORWARD DEBUG
Disabling Content Filtering. DEBUG Enabling NAT based Firewall Rules DEBUG
Deleting rule, port triggering for protocol Setting transparent mode for
TCP. DEBUG pLogicalIfName \ DEBUG
Deleting rule, port triggering for protocol
UDP. DEBUG Enabling Accept for INPUT DEBUG
Deleting rule, port triggering for protocol
TCP. DEBUG Enabling Accept for FORWARD DEBUG
Deleting rule, port triggering for protocol Setting Routing mode for
UDP. DEBUG pLogicalIfName \ DEBUG
Enabling rule, port triggering for
protocol TCP. DEBUG Enabling DROP for INPUT DEBUG
Enabling rule, port triggering for
protocol UDP. DEBUG Enabling DROP for FORWARD DEBUG
Enabling rule, port triggering for
protocol TCP. DEBUG Disabling NAT based Firewall Rules DEBUG
Enabling rule, port triggering for Enabling Firewall Rules for URL
protocol UDP. DEBUG Filtering & " DEBUG
266
Unified Services Router User Manual
Enabling DNS proxy. DEBUG Adding Firewall Rule for RIP Protocol DEBUG
Restarting Schedule Based Firewall
Restarting DNS proxy. DEBUG Rules DEBUG
enabling IPS checks between %s and
checking DNS proxy for Secure zone. DEBUG %s zones. DEBUG
disabling IPS checks between %s and
checking DNS proxy for Public zone. DEBUG %s zones. DEBUG
Enabling Block traffic from %s zone. DEBUG Stopping IPS...%s DEBUG
Configuring firewall session settings for
" DEBUG IPS started. DEBUG
Disabling DMZ DEBUG Route already exists DEBUG
Route addition failed: Network
Disabling WAN-DMZ rules . DEBUG Unreachable DEBUG
Enabling WAN DMZ rules . DEBUG Route addition failed: Network is down DEBUG
Restarting DMZ rule having %s address
with %s address. DEBUG Route addition failed DEBUG
Enabling LAN DHCP relay. DEBUG Failed to add rule in iptables DEBUG
OneToOneNat configured successfully DEBUG Failed to delete rule from iptables DEBUG
fwLBSpillOverConfigure: Something
OneToOneNat configuration failed DEBUG going wrong here ERROR
fwLBSpillOverConfigure: unable to get
Deleting scheduled IPv6 rules. DEBUG interfaceName ERROR
delete from FirewallRules6 where fwLBSpillOverConfigure: Could not set
ScheduleName = '%s'. DEBUG PREROUTING rules ERROR
Update FirewallRules6 where fwLBSpillOverConfigure: Could not set
ScheduleName = '%s' to New " DEBUG POSTROUTING rules ERROR
fwLBSpillOverConfigure: Something
Dns proxy Restart failed DEBUG going wrong Here ERROR
fwL2TPGenericRules.c: unable to
deleting interface to ifgroup failed DEBUG open the database file " ERROR
fwL2TPGenericRules.c: inet_aton
adding interface to ifgroup failed DEBUG failed ERROR
deleting interface pVirtIface %s from fwPPTPGenericRules.c: unable to
ifgroup %d" DEBUG open the database file " ERROR
adding interface pVirtIface %s to fwPPTPGenericRules.c: inet_aton
ifgroup %d failed DEBUG failed ERROR
DNS proxy firewall rule add failed for
Deleting IP address %s. DEBUG %s ERROR
deleting interface %s from ifgroup %d
Adding new IP address %s. DEBUG failed ERROR
Updating old IP address %s to new IP adding interface %s to ifgroup %d
address %s. DEBUG failed ERROR
Restarting Firewall For %s Address nimfBridgeTblHandler: unable to get
Update from %s:%s DEBUG interfaceName ERROR
Disabling Firewall Rule for MSS packet
marking DEBUG nimfBridgeTblHandler: \ ERROR
Enabling Firewall Rule for MSS packet
marking DEBUG nimfBridgeTblHandler: unable to get \ ERROR
Enabling packet marking rule for %s Failed to %s traffic from %s to %s to
IDLE timer DEBUG IPS. ERROR
Deleted firewall rule %s for service %s Failed to %s traffic from %s to %s to
with action %s DEBUG IPS. ERROR
%s firewall rule %s for service %s with
action %s DEBUG failed to start IPS service. ERROR
Added firewall rule %s for service %s Timeout in waiting for IPS service to
with action %s DEBUG start. ERROR
267
Unified Services Router User Manual
268
Unified Services Router User Manual
269
Unified Services Router User Manual
270
Unified Services Router User Manual
271
Unified Services Router User Manual
272
Unified Services Router User Manual
273
Unified Services Router User Manual
274
Unified Services Router User Manual
275
Unified Services Router User Manual
276
Unified Services Router User Manual
277
Unified Services Router User Manual
pnacUmiPhyPortConfig: Invalid
sqlite3QueryResGet failed.Query:%s ERROR backend name specified ERROR
pnacUmiPhyPortConfig: could not
startStopVap failed to stop %s ERROR create PNAC physical" ERROR
pnacUmiAuthConfig: Invalid config
Invalid SQLITE operation code - %d ERROR data ERROR
./src/dot11/mgmt/dot11Mgmt.c:1177: pnacUmiAuthConfig: Invalid backend
ADP_ERROR ( ERROR name specified ERROR
only delete event expected on
dot11RogueAP. ERROR unable to create new EAP context. ERROR
unable to apply %s profile on the EAP
sqlite3QueryResGet failed ERROR context. ERROR
pnacUmiAuthConfig: could not
unhandled database operation %d ERROR configure PNAC PAE " ERROR
pnacUmiSuppConfig: Invalid config
sqlite3QueryResGet failed ERROR data ERROR
pnacUmiSuppConfig: Invalid backend
failed to configure WPS on %s ERROR name specified ERROR
pnacUmiSuppConfig: %s not
sqlite3QueryResGet failed ERROR configured for 802.1x ERROR
pnacUmiSuppConfig: could not
sqlite3QueryResGet failed ERROR PNAC port Access" ERROR
pnacUmiSuppConfig: Failed to
sqlite3QueryResGet failed ERROR register user information ERROR
pnacPortByMacDeconfig: port not
sqlite3QueryResGet failed ERROR found ERROR
pnacPortByMacDeconfig: port not
sqlite3QueryResGet failed ERROR found ERROR
no VAP rows returned. expected one ERROR pnacUmiIfDown: Invalid config data ERROR
multiple VAP rows returned. expected
one ERROR pnacUmiIfDown: Invalid config data ERROR
Error from pnacPortDeconfig: port not
sqlite3QueryResGet failed ERROR configured ERROR
invalid query result. ncols=%d pnacUmiIfDown: could not de-
nrows=%d ERROR configure port ERROR
pnacUmiPhyPortDestroy: Invalid
%s:VAP(%s) create failed ERROR config data ERROR
pnacUmiPhyPortDestroy: Invalid
sqlite3QueryResGet failed ERROR config data ERROR
invalid query result. ncols=%d pnacUmiPhyPortDestroy: Failed to
nrows=%d ERROR destroy the port ERROR
Invalid config data ERROR
Facility: Kernel
278
Unified Services Router User Manual
279
Unified Services Router User Manual
PPPOL2TP: --> %s, __FUNCTION__) DEBUG %s: %s, dev->name, buf DEBUG
%s: no memory for sysctl table!,
PPPOL2TP: <-- %s, __FUNCTION__) DEBUG __func__ DEBUG
%s: no memory for VAP name!,
%s: recv: , tunnel->name DEBUG __func__ DEBUG
%s: failed to register sysctls!, vap-
%s: xmit:, session->name DEBUG >iv_dev->name DEBUG
%s: no memory for new proc entry
%s: xmit:, session->name DEBUG (%s)!, __func__, DEBUG
%s: module use_count is %d,
__FUNCTION__, mod_use_count DEBUG %s: 0x%p len %u, tag, p, len DEBUG
PPPOL2TP %s: _fmt, DEBUG %03d:, i DEBUG
PPPOL2TP: --> %s, __FUNCTION__) DEBUG %02x, ((u_int8_t *)p)[i] DEBUG
PPPOL2TP: <-- %s, __FUNCTION__) DEBUG first difference at byte %u, i DEBUG
%s: recv: , tunnel->name DEBUG %s: , t->name DEBUG
FAIL: ieee80211_crypto_newkey
%s: xmit:, session->name DEBUG failed DEBUG
%s: xmit:, session->name DEBUG FAIL: ieee80211_crypto_setkey failed DEBUG
PPPOL2TP %s: _fmt, DEBUG FAIL: unable to allocate skbuff DEBUG
PPPOL2TP: --> %s, __FUNCTION__) DEBUG FAIL: wep decap failed DEBUG
PPPOL2TP: <-- %s, __FUNCTION__) DEBUG FAIL: decap botch; length mismatch DEBUG
FAIL: decap botch; data does not
%s: recv: , tunnel->name DEBUG compare DEBUG
%s: xmit:, session->name DEBUG FAIL: wep encap failed DEBUG
%s: xmit:, session->name DEBUG FAIL: encap data length mismatch DEBUG
IRQ 31 is triggered DEBUG FAIL: encrypt data does not compare DEBUG
[%s:%d] , __func__, __LINE__\ DEBUG PASS DEBUG
\t[R%s %#0x %#0x 0x%08x%08x],
(status == ERROR ? # : ), page, addr,
(uint32_t)(*pValue >> 32), %u of %u 802.11i WEP test vectors
(uint32_t)(*pValue & 0xffffffff) DEBUG passed, pass, total DEBUG
\t[W%s %#0x %#0x 0x%08x%08x],
(status == ERROR ? # : ), page, addr,
(uint32_t)(value >> 32),
(uint32_t)(value & 0xffffffff) DEBUG %s: 0x%p len %u, tag, p, len DEBUG
%s: mac_add
%02X:%02X:%02X:%02X:%02X:%02X
, dev->name, addr[0], addr[1], addr[2],
addr[3], addr[4], addr[5] DEBUG %03d:, i DEBUG
%s: mac_del
%02X:%02X:%02X:%02X:%02X:%02X
, dev->name, addr[0], addr[1], addr[2],
addr[3], addr[4], addr[5] DEBUG %02x, ((u_int8_t *)p)[i] DEBUG
%s: mac_kick
%02X:%02X:%02X:%02X:%02X:%02X
, dev->name, addr[0], addr[1], addr[2],
addr[3], addr[4], addr[5] DEBUG first difference at byte %u, i DEBUG
%s: mac_undefined
%02X:%02X:%02X:%02X:%02X:%02X
, dev->name, addr[0], addr[1], addr[2],
addr[3], addr[4], addr[5] DEBUG %s: , t->name DEBUG
%s: addr_add
%02X:%02X:%02X:%02X:%02X:%02X
, dev->name, addr[0], addr[1], addr[2], FAIL: ieee80211_crypto_newkey
addr[3], addr[4], addr[5] DEBUG failed DEBUG
280
Unified Services Router User Manual
%s: addr_del
%02X:%02X:%02X:%02X:%02X:%02X
, dev->name, addr[0], addr[1], addr[2],
addr[3], addr[4], addr[5] DEBUG FAIL: ieee80211_crypto_setkey failed DEBUG
%s: mac_undefined
%02X:%02X:%02X:%02X:%02X:%02X
, dev->name, addr[0], addr[1], addr[2],
addr[3], addr[4], addr[5] DEBUG FAIL: unable to allocate skbuff DEBUG
%s: set_float %d;%d, DEBUG FAIL: ccmp encap failed DEBUG
IRQ 32 is triggered DEBUG FAIL: encap data length mismatch DEBUG
ip_finish_output2: No header cache
and no neighbour! DEBUG FAIL: encrypt data does not compare DEBUG
a guy asks for address mask. Who is
it? DEBUG FAIL: ccmp decap failed DEBUG
icmp v4 hw csum failure) DEBUG FAIL: decap botch; length mismatch DEBUG
FAIL: decap botch; data does not
expire>> %u %d %d %d, expire, DEBUG compare DEBUG
expire++ %u %d %d %d, expire, DEBUG PASS DEBUG
rt_cache @%02x: %u.%u.%u.%u, %u of %u 802.11i AES-CCMP test
hash, DEBUG vectors passed, pass, total DEBUG
rt_bind_peer(0) @%p,
NET_CALLER(iph) DEBUG %s: 0x%p len %u, tag, p, len DEBUG
ip_rt_advice: redirect to DEBUG %03d:, i DEBUG
ip_rt_bug: %u.%u.%u.%u ->
%u.%u.%u.%u, %s, DEBUG %02x, ((u_int8_t *)p)[i] DEBUG
udp cork app bug 2) DEBUG first difference at byte %u, i DEBUG
udp cork app bug 3) DEBUG ieee80211_crypto_newkey failed DEBUG
udp v4 hw csum failure.) DEBUG ieee80211_crypto_setkey failed DEBUG
UDP: short packet: From
%u.%u.%u.%u:%u %d/%d to
%u.%u.%u.%u:%u, DEBUG unable to allocate skbuff DEBUG
UDP: bad checksum. From
%d.%d.%d.%d:%d to
%d.%d.%d.%d:%d ulen %d, DEBUG tkip enmic failed DEBUG
%s: lookup policy [list] found=%s, DEBUG enmic botch; length mismatch DEBUG
%s: called: [output START],
__FUNCTION__ DEBUG enmic botch DEBUG
%s: flow dst=%s, __FUNCTION__,
XFRMSTRADDR(fl->fl4_dst, family) DEBUG tkip encap failed DEBUG
%s: flow src=%s, __FUNCTION__,
XFRMSTRADDR(fl->fl4_src, family) DEBUG encrypt phase1 botch DEBUG
%s: flow dst=%s, __FUNCTION__,
XFRMSTRADDR(fl->fl6_dst, family) DEBUG encrypt data length mismatch DEBUG
%s: flow src=%s, __FUNCTION__,
XFRMSTRADDR(fl->fl6_src, family) DEBUG encrypt data does not compare DEBUG
a guy asks for address mask. Who is
it? DEBUG tkip decap failed DEBUG
icmp v4 hw csum failure) DEBUG decrypt phase1 botch DEBUG
expire>> %u %d %d %d, expire, DEBUG decrypt data does not compare DEBUG
expire++ %u %d %d %d, expire, DEBUG decap botch; length mismatch DEBUG
rt_cache @%02x: %u.%u.%u.%u,
hash, DEBUG decap botch; data does not compare DEBUG
rt_bind_peer(0) @%p,
NET_CALLER(iph) DEBUG tkip demic failed DEBUG
281
Unified Services Router User Manual
282
Unified Services Router User Manual
283
Unified Services Router User Manual
284
Unified Services Router User Manual
285
Unified Services Router User Manual
286
Unified Services Router User Manual
287
Unified Services Router User Manual
288
Unified Services Router User Manual
289
Unified Services Router User Manual
MD5 Hardware Test %s, *** New port %d ***, ntohs(expinfo- WARNIN
md5HardTest(0) ? Failed : Passed DEBUG >natport) G
WARNIN
AES Software Test: %d iterations, iter DEBUG ** skb len %d, dlen %d,(*pskb)->len, G
WARNIN
AES Software Test Duration: %d:%d, DEBUG ********** Non linear skb G
WARNIN
AES Hardware Test: %d iterations, iter DEBUG End of sdp %p, nexthdr G
WARNIN
AES Hardware Test Duration: %d:%d, DEBUG %s: unknown pairwise cipher %d, G
WARNIN
3DES Software Test: %d iterations, iter DEBUG %s: unknown group cipher %d, G
%s: unknown SIOCSIWAUTH flag WARNIN
3DES Software Test Duration: %d:%d, DEBUG %d, G
3DES Hardware Test: %d iterations, %s: unknown SIOCGIWAUTH flag WARNIN
iter DEBUG %d, G
3DES Hardware Test Duration: WARNIN
%d:%d, DEBUG %s: unknown algorithm %d, G
WARNIN
DES Software Test: %d iterations, iter DEBUG %s: key size %d is too large, G
WARNIN
DES Software Test Duration: %d:%d, DEBUG try_module_get failed \ G
WARNIN
DES Hardware Test: %d iterations, iter DEBUG %s: request_irq failed, dev->name G
WARNIN
DES Hardware Test Duration: %d:%d, DEBUG try_module_get failed G
WARNIN
SHA Software Test: %d iterations, iter DEBUG try_module_get failed \ G
WARNIN
SHA Software Test Duration: %d:%d, DEBUG %s: unknown pairwise cipher %d, G
WARNIN
SHA Hardware Test: %d iterations, iter DEBUG %s: unknown group cipher %d, G
%s: unknown SIOCSIWAUTH flag WARNIN
SHA Hardware Test Duration: %d:%d, DEBUG %d, G
%s: unknown SIOCGIWAUTH flag WARNIN
MD5 Software Test: %d iterations, iter DEBUG %d, G
WARNIN
MD5 Software Test Duration: %d:%d, DEBUG %s: unknown algorithm %d, G
WARNIN
MD5 Hardware Test: %d iterations, iter DEBUG %s: key size %d is too large, G
unable to load %s, WARNIN
MD5 Hardware Test Duration: %d:%d, DEBUG scan_modnames[mode] G
./pnac/src/pnac/linux/kernel/xcalibur.c:2 WARNIN
09:#define DEBUG_PRINTK printk DEBUG Failed to mkdir /proc/net/madwifi G
WARNIN
bcmDeviceInit: registration failed DEBUG try_module_get failed G
WARNIN
bcmDeviceInit: pCdev Add failed DEBUG %s: request_irq failed, dev->name G
too many virtual ap's (already got WARNIN
REG Size == 8 Bit DEBUG %d), sc->sc_nvaps G
Value = %x ::: At Page = %x : Addr = WARNIN
%x DEBUG %s: request_irq failed, dev->name G
rix %u (%u) bad ratekbps %u mode WARNIN
REG Size == 16 Bit DEBUG %u, G
Value = %x ::: At Page = %x : Addr = cix %u (%u) bad ratekbps %u mode WARNIN
%x DEBUG %u, G
WARNIN
REG Size == 32 Bit DEBUG %s: no rates for %s?, G
290
Unified Services Router User Manual
Value = %x ::: At Page = %x : Addr = no rates yet! mode %u, sc- WARNIN
%x DEBUG >sc_curmode G
WARNIN
REG Size == 64 Bit DEBUG %u.%u.%u.%u sent an invalid ICMP G
WARNIN
REG Size is not in 8/16/32/64 DEBUG dst cache overflow G
Written Value = %x ::: At Page = %x : WARNIN
Addr = %x DEBUG Neighbour table overflow. G
WARNIN
bcm_ioctl :Unknown Ioctl Case : DEBUG host %u.%u.%u.%u/if%d ignores G
=========Register Dump for Port martian destination %u.%u.%u.%u WARNIN
Number # %d=========,port DEBUG from G
%s : Read Status=%s WARNIN
data=%#x,regName[j], DEBUG martian source %u.%u.%u.%u from G
%s : Read Status=%s WARNIN
data=%#x,regName[j], DEBUG ll header: G
powerDeviceInit: device registration WARNIN
failed DEBUG %u.%u.%u.%u sent an invalid ICMP G
WARNIN
powerDeviceInit: adding device failed DEBUG dst cache overflow G
%s: Error: Big jump in pn number. WARNIN
TID=%d, from %x %x to %x %x. DEBUG Neighbour table overflow. G
%s: The MIC is corrupted. Drop this WARNIN
frame., __func__ DEBUG host %u.%u.%u.%u/if%d ignores G
%s: The MIC is OK. Still use this frame martian destination %u.%u.%u.%u WARNIN
and update PN., __func__ DEBUG from G
ADDBA send failed: recipient is not a WARNIN
11n node DEBUG martian source %u.%u.%u.%u from G
WARNIN
Cannot Set Rate: %x, value DEBUG ll header: G
Getting Rate Series: %x,vap- WARNIN
>iv_fixed_rate.series DEBUG %u.%u.%u.%u sent an invalid ICMP G
Getting Retry Series: %x,vap- WARNIN
>iv_fixed_rate.retries DEBUG dst cache overflow G
WARNIN
IC Name: %s,ic->ic_dev->name DEBUG Neighbour table overflow. G
usage: rtparams rt_idx <0|1> per WARNIN
<0..100> probe_intval <0..100> DEBUG host %u.%u.%u.%u/if%d ignores G
usage: acparams ac <0|3> RTS <0|1> WARNIN
aggr scaling <0..4> min mbps <0..250> DEBUG martian source %u.%u.%u.%u from G
usage: hbrparams ac <2> enable WARNIN
<0|1> per_low <0..50> DEBUG ll header: G
%s(): ADDBA mode is AUTO, martian destination %u.%u.%u.%u WARNIN
__func__ DEBUG from G
WARNIN
%s(): Invalid TID value, __func__ DEBUG %u.%u.%u.%u sent an invalid ICMP G
%s(): ADDBA mode is AUTO, WARNIN
__func__ DEBUG dst cache overflow G
WARNIN
%s(): Invalid TID value, __func__ DEBUG Neighbour table overflow. G
WARNIN
%s(): Invalid TID value, __func__ DEBUG host %u.%u.%u.%u/if%d ignores G
martian destination %u.%u.%u.%u WARNIN
Addba status IDLE DEBUG from G
%s(): ADDBA mode is AUTO, WARNIN
__func__ DEBUG martian source %u.%u.%u.%u from G
291
Unified Services Router User Manual
WARNIN
%s(): Invalid TID value, __func__ DEBUG ll header: G
Error in ADD- no node available DEBUG Unable to create ip_set_list ERROR
%s(): Channel capabilities do not
match, chan flags 0x%x, DEBUG Unable to create ip_set_hash ERROR
%s: cannot map channel to mode; freq ip_conntrack_in: Frag of proto %u
%u flags 0x%x, DEBUG (hook=%u), ERROR
ic_get_currentCountry not initialized Unable to register netfilter socket
yet DEBUG option ERROR
Country ie is %c%c%c, DEBUG Unable to create ip_conntrack_hash ERROR
%s: wrong state transition from %d to Unable to create ip_conntrack slab
%d, DEBUG cache ERROR
%s: wrong state transition from %d to
%d, DEBUG Unable to create ip_expect slab cache ERROR
%s: wrong state transition from %d to Unable to create ip_set_iptreeb slab
%d, DEBUG cache ERROR
%s: wrong state transition from %d to Unable to create ip_set_iptreed slab
%d, DEBUG cache ERROR
%s: wrong state transition from %d to %s: cannot allocate space for
%d, DEBUG %scompressor, fname, ERROR
%s: wrong state transition from %d to %s: cannot allocate space for MPPC
%d, DEBUG history, ERROR
ieee80211_deliver_l2uf: no buf %s: cannot allocate space for MPPC
available DEBUG history, ERROR
%s: %s, vap->iv_dev->name, buf /*
NB: no */ DEBUG %s: cannot load ARC4 module, fname ERROR
%s: [%s] %s, vap->iv_dev->name, DEBUG %s: cannot load SHA1 module, fname ERROR
%s: [%s] %s, vap->iv_dev->name, %s: CryptoAPI SHA1 digest size too
ether_sprintf(mac), buf DEBUG small, fname ERROR
[%s:%s] discard %s frame, %s, vap- %s: cannot allocate space for SHA1
>iv_dev->name, DEBUG digest, fname ERROR
[%s:%s] discard frame, %s, vap-
>iv_dev->name, DEBUG %s%d: trying to write outside history ERROR
[%s:%s] discard %s information
element, %s, DEBUG %s%d: trying to write outside history ERROR
[%s:%s] discard information element,
%s, DEBUG %s%d: trying to write outside history ERROR
[%s:%s] discard %s frame, %s, vap- %s%d: too big uncompressed packet:
>iv_dev->name, DEBUG %d, ERROR
[%s:%s] discard frame, %s, vap- %s%d: encryption negotiated but not
>iv_dev->name, DEBUG an ERROR
HBR list
dumpNode\tAddress\t\t\tState\tTrigger\t %s%d: error - not an MPPC or MPPE
Block DEBUG frame ERROR
Nodes
informationAddress\t\t\tBlock\t\tDroped Kernel doesn't provide ARC4 and/or
VI frames DEBUG SHA1 algorithms ERROR
%d\t
%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.
2x\t%s\t%s\t%s, DEBUG PPP: not interface or channel?? ERROR
%2.2x:%2.2x:%2.2x:%2.2x:%2.2x:%2.
2x\t%s\t\t%d, DEBUG PPP: no memory (VJ compressor) ERROR
[%d]\tFunction\t%s, j, ni-
>node_trace[i].funcp DEBUG failed to register PPP device (%d), err ERROR
[%d]\tMacAddr\t%s, j, DEBUG PPP: no memory (VJ comp pkt) ERROR
[%d]\tDescp\t\t%s, j, ni-
>node_trace[i].descp DEBUG PPP: no memory (comp pkt) ERROR
292
Unified Services Router User Manual
[%d]\tValue\t\t%llu(0x%llx), j, ni-
>node_trace[i].value, DEBUG ppp: compressor dropped pkt ERROR
ifmedia_add: null ifm DEBUG PPP: no memory (fragment) ERROR
Adding entry for DEBUG PPP: VJ uncompressed error ERROR
ifmedia_set: no match for 0x%x/0x%x, DEBUG ppp_decompress_frame: no memory ERROR
ppp_mp_reconstruct bad seq %u <
ifmedia_set: target DEBUG %u, ERROR
PPP: couldn't register device %s
ifmedia_set: setting to DEBUG (%d), ERROR
ifmedia_ioctl: switching %s to , dev- ppp: destroying ppp struct %p but
>name DEBUG dead=%d ERROR
ifmedia_match: multiple match for DEBUG ppp: destroying undead channel %p !, ERROR
PPP: removing module but units
<unknown type> DEBUG remain! ERROR
desc->ifmt_string DEBUG PPP: failed to unregister PPP device ERROR
%s: cannot allocate space for
mode %s, desc->ifmt_string DEBUG %scompressor, fname, ERROR
%s: cannot allocate space for MPPC
<unknown subtype> DEBUG history, ERROR
%s: cannot allocate space for MPPC
%s, desc->ifmt_string DEBUG history, ERROR
%s%s, seen_option++ ? , : , DEBUG %s: cannot load ARC4 module, fname ERROR
%s%s, seen_option++ ? , : , DEBUG %s: cannot load SHA1 module, fname ERROR
%s: CryptoAPI SHA1 digest size too
%s, seen_option ? > : DEBUG small, fname ERROR
%s: cannot allocate space for SHA1
%s: %s, dev->name, buf DEBUG digest, fname ERROR
%s: no memory for sysctl table!,
__func__ DEBUG %s%d: trying to write outside history ERROR
%s: failed to register sysctls!, vap-
>iv_dev->name DEBUG %s%d: trying to write outside history ERROR
Atheros HAL assertion failure: %s: line
%u: %s, DEBUG %s%d: trying to write outside history ERROR
ath_hal: logging to %s %s, %s%d: too big uncompressed packet:
ath_hal_logfile, DEBUG %d, ERROR
%s%d: encryption negotiated but not
ath_hal: logging disabled DEBUG an ERROR
%s%d: error - not an MPPC or MPPE
%s%s, sep, ath_hal_buildopts[i] DEBUG frame ERROR
ath_pci: No devices found, driver not Kernel doesn't provide ARC4 and/or
installed. DEBUG SHA1 algorithms ERROR
---:%d pri:%d qd:%u ad:%u sd:%u
tot:%u amp:%d %02x:%02x:%02x, DEBUG PPP: not interface or channel?? ERROR
SC Pushbutton Notify on %s::%s,dev-
>name,vap->iv_dev->name DEBUG PPP: no memory (VJ compressor) ERROR
Could not find Board Configuration
Data DEBUG failed to register PPP device (%d), err ERROR
Could not find Radio Configuration
data DEBUG PPP: no memory (comp pkt) ERROR
%s: No device, __func__ DEBUG ppp: compressor dropped pkt ERROR
ath_ahb: No devices found, driver not
installed. DEBUG PPP: no memory (VJ comp pkt) ERROR
PKTLOG_TAG %s:proc_dointvec
failed, __FUNCTION__ DEBUG PPP: no memory (comp pkt) ERROR
PKTLOG_TAG %s:proc_dointvec
failed, __FUNCTION__ DEBUG PPP: no memory (fragment) ERROR
293
Unified Services Router User Manual
294
Unified Services Router User Manual
295
Unified Services Router User Manual
%s:grppoll Buf allocation failed %s: 0x%p len %u, tag, p, (unsigned
,__func__ DEBUG int)len ERROR
%s: unable to start recv logic, DEBUG %03d:, i ERROR
%s: Invalid interface id = %u,
__func__, if_id DEBUG %02x, ((unsigned char *)p)[i] ERROR
%s: unable to allocate channel table,
__func__ DEBUG mic check failed ERROR
%s: Tx Antenna Switch. Do internal %s: 0x%p len %u, tag, p, (unsigned
reset., __func__ DEBUG int)len ERROR
Radar found on channel %d (%d MHz), DEBUG %03d:, i ERROR
End of DFS wait period DEBUG %02x, ((unsigned char *)p)[i] ERROR
%s error allocating beacon, __func__ DEBUG mic check failed ERROR
failed to allocate UAPSD QoS NULL tx
descriptors: %d, error DEBUG [%s] Wrong parameters, __func__ ERROR
failed to allocate UAPSD QoS NULL
wbuf DEBUG [%s] Wrong Key length, __func__ ERROR
%s: unable to allocate channel table,
__func__ DEBUG [%s] Wrong parameters, __func__ ERROR
%s: unable to update h/w beacon
queue parameters, DEBUG [%s] Wrong Key length, __func__ ERROR
ALREADY ACTIVATED DEBUG [%s] Wrong parameters, __func__ ERROR
%s: missed %u consecutive beacons, DEBUG [%s] Wrong Key length, __func__ ERROR
%s: busy times: rx_clear=%d,
rx_frame=%d, tx_frame=%d, __func__,
rx_clear, rx_frame, tx_frame DEBUG [%s] Wrong parameters, __func__ ERROR
%s: unable to obtain busy times,
__func__ DEBUG [%s] Wrong Key length, __func__ ERROR
%s: beacon is officially stuck, DEBUG [%s]: Wrong parameters, __func__ ERROR
[%s] Wrong Key Length %d,
Busy environment detected DEBUG __func__, des_key_len ERROR
[%s] Wrong parameters %d,
Inteference detected DEBUG __func__, des_key_len ERROR
rx_clear=%d, rx_frame=%d, [%s] Wrong Key Length %d,
tx_frame=%d, DEBUG __func__, des_key_len ERROR
%s: resume beacon xmit after %u
misses, DEBUG [%s] Wrong parameters, __func__ ERROR
%s: stuck beacon; resetting (bmiss
count %u), DEBUG [%s] Wrong Key Length, __func__ ERROR
EMPTY QUEUE DEBUG [%s] Wrong parameters, __func__ ERROR
SWRInfo: seqno %d isswRetry %d
retryCnt %d,wh ? (*(u_int16_t *)&wh-
>i_seq[0]) >> 4 : 0, bf->bf_isswretry,bf-
>bf_swretries DEBUG [%s] Wrong Key Length, __func__ ERROR
Buffer #%08X --> Next#%08X
Prev#%08X Last#%08X,bf,
TAILQ_NEXT(bf,bf_list), DEBUG [%s] Wrong parameters, __func__ ERROR
Stas#%08X flag#%08X
Node#%08X, bf->bf_status, bf-
>bf_flags, bf->bf_node DEBUG [%s] Wrong parameters, __func__ ERROR
Descr #%08X --> Next#%08X
Data#%08X Ctl0#%08X Ctl1#%08X,
bf->bf_daddr, ds->ds_link, ds-
>ds_data, ds->ds_ctl0, ds->ds_ctl1 DEBUG [%s] Wrong parameters, __func__ ERROR
Ctl2#%08X Ctl3#%08X
Sta0#%08X Sta1#%08X,ds->ds_hw[0],
ds->ds_hw[1], lastds->ds_hw[2],
lastds->ds_hw[3] DEBUG [%s] Wrong parameters, __func__ ERROR
296
Unified Services Router User Manual
297
Unified Services Router User Manual
298
Unified Services Router User Manual
299
Unified Services Router User Manual
CTS NC NC NC
DTR NC NC NC
TxD 6 3 RxD
GND 5 5 GND
GND 4 5 GND
RxD 3 2 TxD
DSR NC NC NC
RTS NC NC NC
300
Unified Services Router User Manual
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
1) Australia 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
36, 40, 44, 48, 149, 40, 48, 153, 36, 44, 149,
5 Ghz 153, 157, 161, 165 161 157
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
2) Russia 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
36, 40, 44, 48, 149, 40, 48, 153, 36, 44, 149,
5 Ghz 153, 157, 161, 165 161 157
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
3) Iceland 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
4) Singapore 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
5) Sweden 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
6) Taiwan 2.4Ghz 10, 11 10, 11 7
56, 60, 64, 149, 153,
5 Ghz 157, 161, 165 64, 153, 161 60, 149, 157
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
7) Finland 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
8) Slovenia 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
9) Ireland 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
United 1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
10) states 2.4Ghz 10, 11 10, 11 7
36, 40, 44, 48, 149, 40, 48, 153, 36, 44, 149,
5 Ghz 153, 157, 161, 165 161 157
Latin 1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
11) America 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
301
Unified Services Router User Manual
36, 40, 44, 48, 149, 40, 48, 153, 36, 44, 149,
5 Ghz 153, 157, 161, 165 161 157
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
12) Denmark 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
13) Germany 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
14) Netherlands 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
15) Norway 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36, 44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
16) Poland 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
Luxembour 1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
17) g 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
South 1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
18) Africa 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
United 1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
19) Kingdom 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
20) Ireland 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
21) France 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
22) Israel 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
23) Korea 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
36, 40, 44, 48, 149, 40, 48, 153, 36, 44, 149,
5 Ghz 153, 157, 161 161 157
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
24) Japan 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
5 Ghz 36, 40, 44, 48 40, 48 36,44
1, 2, 3, 4, 5, 6, 7, 8, 9, 5, 6, 7, 8, 9, 1, 2, 3, 4, 5, 6,
25) Egypt 2.4Ghz 10, 11, 12, 13 10, 11, 12, 13 7, 8, 9
302
Unified Services Router User Manual
303
Unified Services Router User Manual
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
The antennas used for this transmitter must be installed to provide a spectrum distance of at least 20cm from
all persons and must not be co-located or operating in conjunction with any other antenna or transmitter.
This transmitter is restricted to indoor use in the 5150MHz to 5250MHz frequency range.
Non-modification Statement
Use only the integral antenna supplied by the manufacturer when operating this device. Unauthorized
antennas, modifications, or attachments could damage the TI Navigator access point and violate FCC
regulations. Any changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate this equipment.
304
Unified Services Router User Manual
must follow the specific operating instructions for satisfying RF exposure compliance. To maintain compliance
with IC RF exposure compliance requirements, please follow operation instruction as documented in this
manual.
This transmitter is restricted to indoor use in the 5150MHz to 5250MHz frequency range.
This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following
test methods have been applied in order to prove presumption of conformity with the essential requirements
of the R&TTE Directive 1999/5/EC:
- EN 60950-1: 2006+A11:2009
Safety of information technology equipment
This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member
states and EFTA countries under the following conditions and/or with the following restrictions:
- In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain
authorization to use the device for setting up outdoor radio links and/or for supplying public access to
telecommunications and/or network services.
- This device may not be used for setting up outdoor radio links in France and in some areas the RF output
power may be limited to 10 mW EIRP in the frequency range of 2454 – 2483.5 MHz. For detailed information
the enduser should contact the national spectrum authority in France.
This device is a 5 GHz wideband transmission system (transceiver), intended for use in all EU member
states and EFTA countries under the following conditions and/or with the following restrictions:
- This device may only be used indoors in the frequency bands 5150 – 5250 MHz.
- In France and Luxembourg a limited implementation of the frequency bands 5150 – 5250 MHz and 5250 –
5350 MHz. In Luxermbourg it is not allowed to make use of the frequency band 5470 – 5725 MHz. End-users
are encouraged to contact the national spectrum authorities in France and Luxembourg in order to obtain the
latest information about any restrictions in the 5 GHz frequency band(s).
305
Unified Services Router User Manual
Deutsch Hiermit erklärt [D-Link Corporation], dass sich das Gerät [DSR-1000N] in Übereinstimmung
[German] mit den grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der
Richtlinie 1999/5/EG befindet.
English Hereby, [D-Link Corporation], declares that this [DSR-1000N] is in compliance with the
essential requirements and other relevant provisions of Directive 1999/5/EC.
Español Por medio de la presente [D-Link Corporation] declara que el [DSR-1000N] cumple con los
[Spanish] requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la
Directiva 1999/5/CE.
Français Par la présente [D-Link Corporation] déclare que l'appareil [DSR-1000N] est conforme aux
[French] exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE.
Italiano Con la presente [D-Link Corporation] dichiara che questo [DSR-1000N] è conforme ai
[Italian] requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
Lietuvių Šiuo [D-Link Corporation] deklaruoja, kad šis [DSR-1000N] atitinka esminius reikalavimus
[Lithuanian] ir kitas 1999/5/EB Direktyvos nuostatas.
306
Unified Services Router User Manual
Suomi [D-Link Corporation] vakuuttaa täten että [DSR-1000N] tyyppinen laite on direktiivin
[Finnish] 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen.
Svenska Härmed intygar [D-Link Corporation] att denna [DSR-1000N] står I överensstämmelse med
[Swedish] de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv
1999/5/EG.
307
Unified Services Router User Manual
2.DSR-500N
Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses, and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference to
radio communications. However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by
one or more of the following measures:
Reorient or relocate the receiving antenna.
Increase the separation between the equipment and receiver.
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
Consult the dealer or an experienced radio/TV technician for help.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
The antennas used for this transmitter must be installed to provide a spectrum distance of at least 20cm
from all persons and must not be co-located or operating in conjunction with any other antenna or
transmitter.
This transmitter is restricted to indoor use in the 5150MHz to 5250MHz frequency range.
Non-modification Statement
Use only the integral antenna supplied by the manufacturer when operating this device. Unauthorized
antennas, modifications, or attachments could damage the TI Navigator access point and violate FCC
regulations. Any changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate this equipment.
308
Unified Services Router User Manual
This device complies with the essential requirements of the R&TTE Directive 1999/5/EC. The following
test methods have been applied in order to prove presumption of conformity with the essential requirements
of the R&TTE Directive 1999/5/EC:
- EN 60950-1: 2006+A11:2009
Safety of information technology equipment
This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member
states and EFTA countries under the following conditions and/or with the following restrictions:
- In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain authorization
to use the device for setting up outdoor radio links and/or for supplying public access to telecommunications and/or
network services.
- This device may not be used for setting up outdoor radio links in France and in some areas the RF output
power may be limited to 10 mW EIRP in the frequency range of 2454 – 2483.5 MHz. For detailed information the
enduser should contact the national spectrum authority in France.
309
Unified Services Router User Manual
Deutsch Hiermit erklärt [D-Link Corporation], dass sich das Gerät [DSR-500N] in Übereinstimmung
[German] mit den grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der
Richtlinie 1999/5/EG befindet.
English Hereby, [D-Link Corporation], declares that this [DSR-500N] is in compliance with the
essential requirements and other relevant provisions of Directive 1999/5/EC.
Español Por medio de la presente [D-Link Corporation] declara que el [DSR-500N] cumple con los
[Spanish] requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la
Directiva 1999/5/CE.
Par la présente [D-Link Corporation] déclare que l'appareil [DSR-500N] est conforme aux
Français exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE.
[French]
Italiano Con la presente [D-Link Corporation] dichiara che questo [DSR-500N] è conforme ai
[Italian] requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
Lietuvių Šiuo [D-Link Corporation] deklaruoja, kad šis [DSR-500N] atitinka esminius reikalavimus
[Lithuanian] ir kitas 1999/5/EB Direktyvos nuostatas.
310
Unified Services Router User Manual
Suomi [D-Link Corporation] vakuuttaa täten että [DSR-500N] tyyppinen laite on direktiivin
[Finnish] 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen.
Svenska Härmed intygar [D-Link Corporation] att denna [DSR-500N] står I överensstämmelse
[Swedish] med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av
direktiv 1999/5/EG.
311
Unified Services Router User Manual
3.DSR-250N
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference to
radio communications. However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by
one of the following measures:
FCC Caution:
Any changes or modifications not expressly approved by the party responsible for compliance could void the
user's authority to operate this equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1)
This device may not cause harmful interference, and (2) this device must accept any interference received,
including interference that may cause undesired operation.
RSS-GEN 7.1.4:
User Manual for Transmitters with Detachable Antennas
The user manual of transmitter devices equipped with detachable antennas shall contain the following
information in a conspicuous location:
This device has been designed to operate with the antennas listed below, and having a maximum gain of [1.8]
dB. Antennas not included in this list or having a gain greater than [1.8] dB are strictly prohibited for use with
this device. The required antenna impedance is [50] ohms.
RSS-GEN 7.1.5
To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that
the equivalent isotropically radiated power (e.i.r.p.) is not more than that permitted for successful
communication.
Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils radio exempts de
licence. L'exploitation est autorisée aux deux conditions suivantes: (1) l'appareil ne doit pas produire de
brouillage, et (2) l'utilisateur de l'appareil doit accepter tout brouillage radioélectrique subi, même si le
brouillage est susceptible d'en comSpromettre le fonctionnement.
Is herewith confirmed to comply with the requirements set out in the Council Directive on the Approximation
of the Laws of the Member States relating to Electromagnetic Compatibility (2004/108/EC), Low-voltage
Directive (2006/95/EC), the procedures given in European Council Directive 99/5/EC and 2004/104/EC.
The equipment was passed. The test was performed according to the following European standards:
EN 300 328 V.1.7.1
EN 301 489-1 V.1. 8.1 / EN 301 489-17 V.2.1.1
EN 62311
EN 60950-1
312
Unified Services Router User Manual
D=0.020m is the minimum safety distance between the EUT and human body when the E-Field strength is
61V/m.
Article 12
Without permission, any company, firm or user shall not alter the frequency, increase the power, or change
the characteristics and functions of the original design of the certified lower power frequency electric
machinery.
Article 14
The application of low power frequency electric machineries shall not affect the navigation safety nor interfere
a legal communication, if an interference is found, the service will be suspended until improvement is made
and the interference no longer exists.
313
Unified Services Router User Manual
4. DSR-150N
Federal Communication Commission Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may cause harmful interference to
radio communications. However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the interference by
one of the following measures:
FCC Caution:
Any changes or modifications not expressly approved by the party responsible for compliance could void the
user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is
subject to the following two conditions:
IMPORTANT NOTE:
Note: The country code selection is for non-US model only and is not available to all US model. Per FCC
regulation, all WiFi product marketed in US must fixed to US operation channels only..
EN 60950-1:
Safety of Information Technology Equipment
EN50385 : (2002-08)
Product standard to demonstrate the compliance of radio base stations and fixed terminal stations for wireless
telecommunication systems with the basic restrictions or the reference levels related to human exposure to
radio frequency electromagnetic fields (110MHz - 40 GHz) - General public
314
Unified Services Router User Manual
Electromagnetic compatibility and Radio Spectrum Matters (ERM); ElectroMagnetic Compatibility (EMC)
standard for radio equipment and services; Part 1: Common technical requirements
Česky [Jméno výrobce] tímto prohlašuje, že tento [typ zařízení] je ve shodě se základními
[Czech] požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES.
Dansk Undertegnede [fabrikantens navn] erklærer herved, at følgende udstyr [udstyrets
[Danish] typebetegnelse] overholder de væsentlige krav og øvrige relevante krav i direktiv
1999/5/EF.
Deutsch Hiermit erklärt [Name des Herstellers], dass sich das Gerät [Gerätetyp] in
[German] Übereinstimmung mit den grundlegenden Anforderungen und den übrigen einschlägigen
Bestimmungen der Richtlinie 1999/5/EG befindet.
Eesti Käesolevaga kinnitab [tootja nimi = name of manufacturer] seadme [seadme tüüp = type of
[Estonian] equipment] vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist
tulenevatele teistele asjakohastele sätetele.
English Hereby, [name of manufacturer], declares that this [type of equipment] is in compliance
with the essential requirements and other relevant provisions of Directive 1999/5/EC.
Español Por medio de la presente [nombre del fabricante] declara que el [clase de equipo] cumple
[Spanish] con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de
la Directiva 1999/5/CE.
Ελληνική ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ [name of manufacturer] ΔΗΛΩΝΕΙ ΟΤΙ [type of equipment]
[Greek] ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ
ΔΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999/5/ΕΚ.
Français Par la présente [nom du fabricant] déclare que l'appareil [type d'appareil] est conforme aux
[French] exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE.
Italiano Con la presente [nome del costruttore] dichiara che questo [tipo di apparecchio] è
[Italian] conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva
1999/5/CE.
Latviski Ar šo [name of manufacturer / izgatavotāja nosaukums] deklarē, ka [type of equipment /
[Latvian] iekārtas tips] atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem
noteikumiem.
Lietuvių Šiuo [manufacturer name] deklaruoja, kad šis [equipment type] atitinka esminius
[Lithuanian] reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas.
Hierbij verklaart [naam van de fabrikant] dat het toestel [type van toestel] in
Nederlands overeenstemming is met de essentiële eisen en de andere relevante bepalingen van
[Dutch] richtlijn 1999/5/EG.
Malti Hawnhekk, [isem tal-manifattur], jiddikjara li dan [il-mudel tal-prodott] jikkonforma mal-
[Maltese] ħtiġijiet essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC.
315
Unified Services Router User Manual
Magyar Alulírott, [gyártó neve] nyilatkozom, hogy a [... típus] megfelel a vonatkozó alapvetõ
[Hungarian] követelményeknek és az 1999/5/EC irányelv egyéb elõírásainak.
Polski Niniejszym [nazwa producenta] oświadcza, że [nazwa wyrobu] jest zgodny z zasadniczymi
[Polish] wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC.
Português [Nome do fabricante] declara que este [tipo de equipamento] está conforme com os
[Portuguese] requisitos essenciais e outras disposições da Directiva 1999/5/CE.
Slovensko [Ime proizvajalca] izjavlja, da je ta [tip opreme] v skladu z bistvenimi zahtevami in ostalimi
[Slovenian] relevantnimi določili direktive 1999/5/ES.
Slovensky [Meno výrobcu] týmto vyhlasuje, že [typ zariadenia] spĺňa základné požiadavky a všetky
[Slovak] príslušné ustanovenia Smernice 1999/5/ES.
Suomi [Valmistaja = manufacturer] vakuuttaa täten että [type of equipment = laitteen
[Finnish] tyyppimerkintä] tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä
koskevien direktiivin muiden ehtojen mukainen.
Svenska Härmed intygar [företag] att denna [utrustningstyp] står I överensstämmelse med de
[Swedish] väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv
1999/5/EG.
Ce dispositif est conforme à la norme CNR-210 d'Industrie Canada applicable aux appareils radio exempts
de licence. Son fonctionnement est sujet aux deux conditions suivantes: (1) le dispositif ne doit pas produire
de brouillage préjudiciable, et (2) ce dispositif doit accepter tout brouillage reçu, y compris un brouillage
susceptible de provoquer un fonctionnement indésirable.
Wall-Mount Option
Before you begin, make sure you have two screws that are size #4 - this indicates a diameter measurement
of 0.112inches (2.845mm).
316