Wireless AC Services Router User Manual DSR-150/150N/250/250N/500/500N/1000/1000N/500AC/1000AC Version 3.
Preface Preface The information in this document is subject to change without notice. The manufacturer makes no representations or warranties with respect to the contents hereof and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose. The manufacturer reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of the manufacturer to notify any person of such revision or changes.
Preface Safety Instructions Use the following safety guidelines to ensure your own personal safety and to help protect your system from potential damage. Safety Cautions To reduce the risk of bodily injury, electrical shock, fire, and damage to the equipment, observe the following precautions: • Observe and follow service markings. • Do not service any product except as explained in your system documentation.
Preface • These cables are equipped with three-prong plugs to help ensure proper grounding. Do not use adapter plugs or remove the grounding prong from a cable. If you must use an extension cable, use a 3-wire cable with properly grounded plugs. • Observe extension cable and power strip ratings. Make sure that the total ampere rating of all products plugged into the extension cable or power strip does not exceed 80 percent of the ampere ratings limit for the extension cable or power strip.
Preface Protecting Against Electrostatic Discharge Static electricity can harm delicate components inside your system. To prevent static damage, discharge static electricity from your body before you touch any of the electronic components, such as the microprocessor. You can do so by periodically touching an unpainted metal surface on the chassis. You can also take the following steps to prevent damage from electrostatic discharge (ESD): 1.
Power Usage This device is an Energy Related Product (ErP) with High Network Availability (HiNA), and automatically switches to a power-saving Network Standby mode within 1 minute of no packets being transmitted. It can also be turned off through a power switch to save energy when it is not needed. DSR-250N Network Standby:7.8336 watts Switched Off: 0.1301 watts DSR-1000 Network Standby: 9.2160 watts Switched Off: 0.1499 watts DSR-250 Network Standby: 7.8588 watts Switched Off: 0.
Table of Contents Table of Contents Preface............................................................................................................................................................ i Manual Revisions.........................................................................................................................................................................i Trademarks/Copyright Notice...............................................................................................
Table of Contents Static IP..............................................................................................................................................................................31 PPPoE..................................................................................................................................................................................32 PPTP......................................................................................................................
Table of Contents ISATAP.................................................................................................................................................................................72 LAN Settings....................................................................................................................................................................73 DHCPv6 Server....................................................................................................................
Table of Contents Client................................................................................................................................................................................116 Client Routes..................................................................................................................................................................117 Open VPN.........................................................................................................................
Table of Contents Dynamic Port Forwarding.........................................................................................................................................157 Application Rules..................................................................................................................................................157 Attack Checks......................................................................................................................................................
Routing Logs..................................................................................................................................................................194 System Logs...................................................................................................................................................................195 Remote Logs.................................................................................................................................................
Appendix C - Standard Services for Port Forwarding & Firewall Configuration ................................. 231 Appendix D - Log Output Reference....................................................................................................... 232 Appendix E - RJ-45 Pin-outs .................................................................................................................... 295 Appendix F - New Wi Fi Frequency table ( New appendix section ) ............................................
Section 1 - Introduction Introduction D-Link Services Routers offer a secure, high performance networking solution to address the growing needs of small and medium businesses. Integrated high-speed IEEE 802.11n/ac and 3G wireless technologies offer comparable performance to traditional wired networks, but with fewer limitations.
Section 1 - Introduction Protocol (L2TP) to facilitate branch office connectivity through encrypted virtual links. The DSR-150/150N, DSR-250/250N, DSR-500/500N and DSR-1000/1000N support 10, 25, 35 and 100 simultaneous IPsec VPN tunnels respectively. The DSR-500AC and DSR-1000AC support 35 and 100 simultaneous IPsec VPN tunnels respectively. • Efficient D-Link Green Technology As a concerned member of the global community, D-Link is devoted to providing eco-friendly products.
Section 2 - Installation Installation This section provides information and steps on how to connect your DSR router to your network. Before you Begin Observe the following precautions to help prevent shutdowns, equipment failures, and injuries: • Ensure that the room in which you operate the device has adequate air circulation and that the room temperature does NOT exceed 40˚C (104˚F). • Allow 1 meter (3 feet) of clear space to the front and back of the device.
Section 3 - Basic Configuration Basic Configuration After you install the router, perform the basic configuration instructions described in this section which includes: • • • • • • • • • “#1 Log in to the Web UI” on page 5 “#2 Change LAN IP Address” on page 6 “#3 Configure DHCP Server” on page 7 “#4 Set Time and Date” on page 8 “#5 Internet Connection Setup” on page 9 “#6 Wireless Network Setup” on page 12 “#7 Create Users” on page 13 “#8 Security/VPN Wizard” on page 14 “#9 Dynamic DNS Wizard” on page 16
Section 3 - Basic Configuration #1 Log in to the Web UI The LAN connection may be through the wired Ethernet ports available on the router, or once the initial setup is complete, the DSR may also be managed through its wireless interface. Access the router’s Web user interface (Web UI) for management by using any web browser, such as Internet Explorer, Firefox, Chrome, or Safari. Note: The workstation from which you manage the router must be in the same subnet as the router (192.169.10.0/24).
Section 3 - Basic Configuration #2 Change LAN IP Address To change the LAN IP address of the router, follow the steps below: 1. Log in to the router. 2. Click Network > LAN > LAN Settings. The LAN Settings page will appear. 3. Under IP Address Setup, enter a new IP address for the router. 4. Enter a new subnet mask if needed. 5. Click Save at the bottom of the page. Note: If you change the IP address and click Save, the Web UI will not respond. Open a new connection to the new IP address and log in again.
Section 3 - Basic Configuration #3 Configure DHCP Server To change the DHCP settings of the router, follow the steps below: 1. Log in to the router. 2. Click Network > LAN > LAN Settings. The LAN Settings page will appear. 3. From the DHCP Mode drop-down menu under DHCP Setup, select None (disable), DHCP Server (enable), or DHCP Relay. Note: DHCP Relay will allow DHCP clients on the LAN to receive IP address leases and corresponding information from a DHCP server on a different subnet.
Section 3 - Basic Configuration #4 Set Time and Date 1. Log in to the router. 2. Click Wizard in the upper-right side of the page. If you want to manually configure your date/time settings, refer to “Date and Time” on page 163. 3. Click Run in the Date and Time Wizard box. 4. Click the continent from the map and then next to City, select your time zone from the drop-down menu. Toggle Daylight Saving to ON if it applies to you and then click Next. 5.
Section 3 - Basic Configuration #5 Internet Connection Setup This router has two WAN ports that can be used to establish a connection to the internet. It is assumed that you have arranged for internet service with your Internet Service Provider (ISP). Please contact your ISP or network administrator for the configuration information that will be required to setup the router. Supported Internet connection types include Dynamic, Static, PPPoE, PPTP, L2TP, Japanese PPPoE, and Russian PPPoE/PPTP/L2TP.
Section 3 - Basic Configuration a. If you selected DHCP, complete the fields below: Field MAC Address Source Host Name DNS Server Source Description This MAC address will be recognized by your ISP. Select from the following three options: • Use Default Address - Uses the default MAC address of the router. • Clone your PC’s MAC Address - Select to use the MAC address of the computer you are currently connecting with.
Section 3 - Basic Configuration b. If you selected Static, complete the fields below: Field IP Address Gateway IP Address IP Subnet Mask Primary DNS Server Secondary DNS Server Description Enter the IP address assigned by your ISP. Enter the gateway IP address assigned by your ISP. Enter the subnet mask assigned by your ISP. Enter the primary DNS server IP address assigned by your ISP. Enter the secondary DNS server IP address assigned by your ISP. 5. Click Save.
Section 3 - Basic Configuration #6 Wireless Network Setup This wizard provides a step-by-step guide to create and secure a new access point on the router. The network name (SSID) is the AP identifier that will be detected by supported clients. The Wizard uses a TKIP+AES cipher for WPA / WPA2 security; depending on support on the client side, devices associate with this AP using either WPA or WPA2 security with the same pre -shared key.
Section 3 - Basic Configuration #7 Create Users The Users Wizard allows you to create user account that you can assign to groups. Refer to “Users” on page 130 for more information. You may want to create Groups before users so you may assign them to groups as you create them. To create groups, refer to “Groups” on page 126. To create new users, follow the steps below: 1. Log in to the router. 2. Click Wizard in the upper-right side of the page. 3. Click Run in the Users Wizard box. 4.
Section 3 - Basic Configuration #8 Security/VPN Wizard The Security Wizard allows you to enable VPN passthrough and create a VPN. Follow the steps below: 1. Log in to the router. 2. Click Wizard in the upper-right side of the page. 3. Click Run in the Security Wizard box. 4. The wizard screen will appear. 5. Select the default outbound policy from the drop-down menu. 6. Toggle which type(s) of VPN you want allowed to pass through the router to ON and click Next.
Section 3 - Basic Configuration 7. You can quickly create both IKE and VPN policies. Once the IKE or VPN policy is created, you can modify it as required. 8. From the Select VPN Type drop-down menu, select either Site to Site or Remote Access. 9. Next to Connection Name, enter a name for this VPN connection. 10. Next to IP Protocol Version, select either IPv4 or IPv6. 11. Next to IKE Version, select the version of IKE. 12. Next to Pre-Shared Key, enter the pre-shared key used. 13.
Section 3 - Basic Configuration #9 Dynamic DNS Wizard Dynamic DNS (DDNS) is an Internet service that allows routers with varying public IP addresses to be located using Internet domain names. To use DDNS, you must setup an account with a DDNS provider such as DynDNS. org, D-Link DDNS, or Oray.net. Refer to “Dynamic DNS Settings” on page 53 for more information. Follow the steps below: 1. Log in to the router. 2. Click Wizard in the upper-right side of the page. 3. Click Run in the Dynamic DNS Wizard box.
Section 4 - LAN Configuration LAN Configuration By default, the router functions as a Dynamic Host Configuration Protocol (DHCP) server to the hosts on the LAN and WLAN network. With DHCP, PCs and other LAN devices can be assigned IP addresses as well as addresses for DNS servers, Windows Internet Name Service (WINS) servers, and the default gateway. With DHCP server enabled the router’s IP address serves as the gateway address for LAN and WLAN clients.
Section 4 - LAN Configuration LAN Settings Path: Network > LAN > LAN Settings To configure the LAN settings on the router: 1. Click Network > LAN > LAN Settings. 2. Complete the fields in the table below and click Save. Field IP Address Subnet Mask DHCP Mode Description Enter an new IP address for the router. Default is 192.168.10.1. Enter the subnet mask for your network. Default is 255.255.255.0. Select one of the following modes: • None - Turns off DHCP.
Section 4 - LAN Configuration DHCP Server 1. Select DHCP Server from the drop-down menu. 2. Complete the fields in the table below and click Save. Field DHCP Mode Description Select DHCP Server from the drop-down menu. Enter the starting IP address in the DHCP address pool. Any new DHCP client joining the LAN is Starting IP Address assigned an IP address within the starting and ending IP address range. Starting and ending IP addresses must be in the same IP address subnet as the router’s LAN IP address.
Section 4 - LAN Configuration DHCP Relay 1. Select DHCP Relay from the drop-down menu. 2. Complete the fields in the table below and click Save. Field DHCP Mode Domain Name Gateway Save Description Select DHCP Relay from the drop-down menu. Enter the domain name of your network. Enter the relay gateway IP address. Click Save at the bottom to save and activate your settings.
Section 4 - LAN Configuration DHCP Reserved IPs Path: Network > LAN > LAN DHCP Reserved IPs The router’s DHCP server can assign IP settings to your clients on your network by adding a client’s MAC address and the IP address to be assigned. Whenever the router receives a request from a client, the MAC address of that client is compared with the MAC address list present in the database.
Section 4 - LAN Configuration IGMP Setup Path: Network > LAN > IGMP Setup IGMP snooping (IGMP Proxy) allows the router to ‘listen’ in on IGMP network traffic through the router. This then allows the router to filter multicast traffic and direct it only to hosts that need this stream. This is helpful when there is a lot of multicast traffic on the network where all LAN hosts do not need to receive this multicast traffic. To enable IGMP Proxy: 1. Click Network > LAN > IGMP Setup. 2. Toggle IGMP Proxy to On.
Section 4 - LAN Configuration UPnP Setup Path: Network > LAN > UPnP Universal Plug and Play (UPnP) is a feature that allows the router to discover devices on the network that can communicate with the router and allow for auto-configuration. If a network device is detected by UPnP, the router can open internal or external ports for the traffic protocol required by that network device.
Section 4 - LAN Configuration Jumbo Frames Path: Network > LAN > Jumbo Frames Jumbo frames are Ethernet frames with more than 1500 bytes of payload. When this option is enabled, the LAN devices can exchange information at Jumbo frames rate. To enable jumbo frames: 1. Click Network > LAN > Jumbo Frames. 2. Toggle Activate Jumbo Frames to On. 3. Click Save.
Section 4 - LAN Configuration VLAN The router supports virtual network isolation on the LAN with the use of VLANs. LAN devices can be configured to communicate in a sub network defined by VLAN identifiers. LAN ports can be assigned unique VLAN IDs so that traffic to and from that physical port can be isolated from the general LAN. VLAN filtering is particularly useful to limit broadcast packets of a device in a large network VLAN support is enabled by default in the router.
Section 4 - LAN Configuration Field VLAN ID Name Captive Portal Activate InterVLAN Routing IP Address Subnet Mask DHCP Mode Enable DNS Proxy Save Description Enter a number between 2 and 4053. Enter a name for your VLAN. Toggle ON to enable Captive Portal (refer to the next page for more information). Toggle ON to allow routing between multiple VLANs or OFF to deny communication between VLANs. Enter the IP address for the VLAN. Enter the subnet mask for the VLAN.
Section 4 - LAN Configuration Captive Portal Note: The DSR-150/150N/250/250N routers do not have support for the Captive Portal feature. Captive Portal is available for LAN users only and not for DMZ hosts. Captive Portals can be enabled on a per-VLAN basis. Hosts of a particular VLAN can be directed to authenticate via the Captive Portal, which may be a customized portal with unique instructions and branding as compared to another VLAN.
Section 4 - LAN Configuration Port/Wireless VLAN Path: Network > VLAN Settings > Port VLAN In order to tag all traffic through a specific LAN port with a VLAN ID, you can associate a VLAN to a physical port and wireless segment. VLAN membership properties for the LAN and wireless LAN are listed on this page. The VLAN Port table displays the port identifier, the mode setting for that port and VLAN membership information.
Section 4 - LAN Configuration In Access mode the port is a member of a single VLAN (and only one). All data going into and out of the port is untagged. Traffic through a port in access mode looks like any other Ethernet frame. In General mode the port is a member of a user selectable set of VLANs. The port sends and receives data that is tagged or untagged with a VLAN ID. If the data into the port is untagged, it is assigned the defined PVID.
Section 5 - Connect to the Internet Connect to the Internet This router has two WAN ports that can be used to establish a connection to the internet. It is assumed that you have arranged for internet service with your Internet Service Provider (ISP). Please contact your ISP or network administrator for the configuration information that will be required to setup the router.
Section 5 - Connect to the Internet Static IP Path: Network > Internet > WAN1 Settings Select Static IP to manually enter the Internet settings supplied by your Internet Service Provider. Field IP Address IP Subnet Mask Gateway IP Address Description Enter the IP address supplied by your ISP. Enter the subnet mask supplied by your ISP. Enter the gateway IP address supplied by your ISP. Select either Get Dynamically from ISP or Use These DNS Servers to manually enter DNS DNS Server Source servers.
Section 5 - Connect to the Internet PPPoE Path: Network > Internet > WAN1 Settings Select PPPoE to enter the PPPoE Internet settings supplied by your Internet Service Provider. Field Address Mode User Name Password Service Authentication Type Description Select Dynamic IP or Static IP (IP settings supplied by your ISP). Enter your PPPoE user name. Enter your PPPoE password. Enter if your ISP requires it. Select the authentication type from the drop-down menu.
Section 5 - Connect to the Internet Path: Network > Internet > WAN1 Settings PPTP Select PPTP to enter the PPTP Internet settings supplied by your Internet Service Provider.
Section 5 - Connect to the Internet L2TP Path: Network > Internet > WAN1 Settings Select L2TP to enter the L2TP Internet settings supplied by your Internet Service Provider.
Section 5 - Connect to the Internet Japanese PPPoE Path: Network > Internet > WAN1 Settings Select Japanese PPPoE to enter the PPPoE Internet settings supplied by your Internet Service Provider. Field Address Mode User Name Password Service Authentication Type Description Select Dynamic IP or Static IP (IP settings supplied by your ISP). Enter your PPPoE user name. Enter your PPPoE password. Enter if your ISP requires it. Select the authentication type from the drop-down menu.
Section 5 - Connect to the Internet Russian PPPoE Path: Network > Internet > WAN1 Settings Select Russian PPPoE to enter the PPPoE Internet settings supplied by your Internet Service Provider. Field Address Mode User Name Password Service Authentication Type Description Select Dynamic IP or Static IP (IP settings supplied by your ISP). Enter your PPPoE user name. Enter your PPPoE password. Enter if your ISP requires it. Select the authentication type from the drop-down menu.
Section 5 - Connect to the Internet Russian PPTP Path: Network > Internet > WAN1 Settings Select Russian PPTP to enter the PPTP Internet settings supplied by your Internet Service Provider.
Section 5 - Connect to the Internet Russian L2TP Path: Network > Internet > WAN1 Settings Select Russian L2TP to enter the L2TP Internet settings supplied by your Internet Service Provider.
Section 5 - Connect to the Internet WAN2 Settings Path: Network > Internet > WAN2 Settings Select WAN and select the Internet connection type. Please refer to the previous pages (41-49) for more information. If you want to set WAN2 port to DMZ, skip to the next page.
Section 5 - Connect to the Internet DMZ This router supports one of the physical ports to be configured as a secondary WAN Ethernet port or a dedicated DMZ port. A DMZ is a sub network that is open to the public but behind the firewall. The DMZ adds an additional layer of security to the LAN, as specific services/ports that are exposed to the internet on the DMZ do not have to be exposed on the LAN.
Section 5 - Connect to the Internet WAN3 (3G Internet) Path: Network > Internet > WAN3 Settings This router supports the use of 3G Internet access. Cellular 3G internet access is available on WAN3 via a 3G USB modem for DSR series. The cellular ISP that provides the 3G data plan will provide the authentication requirements to establish a connection. The dial Number and APN are specific to the cellular carriers.
Section 5 - Connect to the Internet Path: Network > Internet > WAN Mode WAN Mode This router supports multiple WAN links. This allows you to take advantage of failover and load balancing features to ensure certain internet dependent services are prioritized in the event of unstable WAN connectivity on one of the ports. To use Auto Failover or Load Balancing, WAN link failure detection must be configured. This involves accessing DNS servers on the internet or ping to an internet address (user defined).
Section 5 - Connect to the Internet Auto-Rollover using WAN IP In this mode one of your WAN ports is assigned as the primary internet link for all internet traffic and the secondary WAN port is used for redundancy in case the primary link goes down for any reason. Both WAN ports (primary and secondary) must be configured to connect to the respective ISP’s before enabling this feature.
Section 5 - Connect to the Internet Load Balancing Path: Network > Internet > WAN Mode This feature allows you to use multiple WAN links (and presumably multiple ISP’s) simultaneously. After configuring more than one WAN port, the load balancing option is available to carry traffic over more than one link. Protocol bindings are used to segregate and assign services over one WAN port in order to manage internet flow.
Section 5 - Connect to the Internet Round Robin 1. Click Network > Internet > WAN Mode. 2. Complete the fields from the table below and click Save. Field WAN Mode Load Balance WAN Health Check Save Description Select Load Balancing from the drop-down menu. Select Round Robin. • DNS lookup using WAN DNS Servers: DNS Lookup of the DNS Servers of the primary link is used to detect primary WAN connectivity.
Section 5 - Connect to the Internet Spillover 1. Click Network > Internet > WAN Mode. 2. Complete the fields from the table below and click Save. Field WAN Mode Load Balance WAN Health Check Retry Interval is Failover After Load Tolerance Max Bandwidth Save Description Select Load Balancing from the drop-down menu. Select Spillover Mode. • DNS lookup using WAN DNS Servers: DNS Lookup of the DNS Servers of the primary link is used to detect primary WAN connectivity.
Section 5 - Connect to the Internet Routing Mode Routing between the LAN and WAN will impact the way this router handles traffic that is received on any of its physical interfaces. The routing mode of the gateway is core to the behavior of the traffic flow between the secure LAN and the internet.
Section 5 - Connect to the Internet Transparent When Transparent Routing Mode is enabled, NAT is not performed on traffic between the LAN and WAN interfaces. Broadcast and multicast packets that arrive on the LAN interface are switched to the WAN and vice versa, if they do not get filtered by firewall or VPN policies.
Section 5 - Connect to the Internet Bridge When Bridge Mode routing is enabled, the first physical LAN port and secondary WAN/DMZ (port 2) interfaces are bridged together at Layer 2, creating an aggregate network. The other LAN ports and the primary WAN (WAN1) are not part of this bridge, and the router asks as a NAT device for these other ports. With Bridge mode for the LAN port 1 and WAN2/DMZ interfaces, L2 and L3 broadcast traffic as well as ARP / RARP packets are passed through.
Section 5 - Connect to the Internet IP Aliasing Path: Network > Internet > IP Aliasing A single WAN Ethernet port can be accessed via multiple IP addresses by adding an alias to the port. This is done by configuring an IP Alias address. To edit or delete any existing aliases, right-click the alias and select either Edit or Delete. To create a new alias: 1. Click Network > Internet > IP Aliasing. 2. Click Add New IP Aliasing. 3. Enter the following information and click Save.
Section 5 - Connect to the Internet DMZ Settings Path: Network > Internet > DMZ Settings If you set WAN2 port to DMZ, you will need to configure the port here. To configure the DMZ Settings: 1. Click Network > Internet > DMZ Settings. 2. Complete the fields from the table below and click Save. Field IP Address Subnet Mask DHCP Mode DHCP Server DHCP Relay Enable DNS Proxy Primary DNS Server Secondary DNS Server WINS Server Save Description Enter an IP address for the DMZ interface.
Section 5 - Connect to the Internet DMZ LAN DHCP Reserved IPs The router’s DHCP server can assign IP settings to your DMZ clients on your network by adding a client’s MAC address and the IP address to be assigned. Whenever the router receives a request from a client, the MAC address of that client is compared with the MAC address list present in the database.
Section 5 - Connect to the Internet Dynamic DNS Settings Path: Network > Internet > Dynamic DNS Dynamic DNS (DDNS) is an Internet service that allows routers with varying public IP addresses to be located using Internet domain names. To use DDNS, you must setup an account with a DDNS provider such as DynDNS. org, D-Link DDNS, or Oray.net. Each configured WAN can have a different DDNS service if required.
Section 5 - Connect to the Internet Traffic Management Bandwidth Profiles Path: Network > Internet > Traffic Management > Bandwidth Profiles Bandwidth profiles allow you to regulate the traffic flow from the LAN to WAN 1 or WAN 2. This is useful to ensure that low priority LAN users (like guests or HTTP service) do not monopolize the available WAN’s bandwidth for cost-savings or bandwidth-priority-allocation purposes.
Section 5 - Connect to the Internet 4. Enter the following information and click Save. Field Name Policy Type WAN Interface Description Enter a name for your profile. This identifier is used to associate the configured profile to the traffic selector. Select the policy type (Inbound or Outbound) from the drop-down menu. Select which WAN interface you want to associate this profile with. Profile Type Select either Priority or Rate from the drop-down menu.
Section 5 - Connect to the Internet Traffic Shaping Path: Network > Internet > Traffic Management > Traffic Shaping Once a profile has been created it can then be associated with a traffic flow from the LAN to WAN. Traffic selector configuration binds a bandwidth profile to a type or source of LAN traffic with the following settings. To create a traffic selector: 1. Click Network > Internet > Traffic Management > Traffic Shaping. 2. Click Add New Traffic Selector. 3.
Section 5 - Connect to the Internet Routing Static Routes Path: Network > Routing > Static Routes Manually adding static routes to this device allows you to define the path selection of traffic from one interface to another. There is no communication between this router and other devices to account for changes in the path; once configured the static route will be active and effective until the network changes.
Section 5 - Connect to the Internet Field Route Name Active Private Destination IP Address IP Subnet Mask Interface Gateway IP Address Metric Save Description Enter a name for your route. Toggle to ON to activate this route or to OFF to deactivate. Toggle to ON to make this route private. If the route is made private, then the route will not be shared in a RIP broadcast or multicast. Enter the IP address of the static route’s destination. Enter the subnet mask of the static route.
Section 5 - Connect to the Internet RIP Path: Network > Routing > RIP Dynamic routing using the Routing Information Protocol (RIP) is an Interior Gateway Protocol (IGP) that is common in LANs. With RIP this router can exchange routing information with other supported routers in the LAN and allow for dynamic adjustment of routing tables in order to adapt to modifications in the LAN without interrupting traffic flow. Note: The DSR-150/150N/250/250N routers do not support RIP. To configure RIP: 1.
Section 5 - Connect to the Internet OSPF Path: Network > Routing > OSPF OSPF is an interior gateway protocol that routes Internet Protocol (IP) packets solely within a single routing domain. It gathers link state information from available routers and constructs a topology map of the network. OSPF version 2 is a routing protocol which described in RFC2328 - OSPF Version 2. OSPF is IGP (Interior Gateway Protocols). OSPF is widely used in large networks such as ISP backbone and enterprise networks.
Section 5 - Connect to the Internet Field OSPFv2 Enable Interface Area Priority Hello Interval Dead Interval Cost Authentication Type Md5 Key ID Md5 Authentication Key Save Description Toggle ON to enable OSPF. Displays the physical network interface on which OSPFv2 is Enabled/Disabled. Enter the area to which the interface belongs. Two routers having a common segment; their interfaces have to belong to the same area on that segment. The interfaces should belong to the same subnet and have similar mask.
Section 5 - Connect to the Internet Protocol Binding Path: Network > Routing > Protocol Binding Protocol bindings are useful when the Load Balancing feature is in use. Selecting from a list of configured services or any of the user-defined services, the type of traffic can be assigned to go over only one of the available WAN ports. For increased flexibility the source network or machines can be specified as well as the destination network or machines.
Section 5 - Connect to the Internet IPv6 IP Mode Path: Network > IPv6 > IP Mode This page allows you to configure the IP protocol version to be used on the router. In order to support IPv6 on your local network (LAN), you must set the router to be in IPv4 / IPv6 mode. This mode will allow IPv4 nodes to communicate with IPv6 devices through this router. To enable IPv6 on the router: 1. Click Network > IPv6 > IP Mode. 2. Select IPv4 & IPv6. 3. Click Save.
Section 5 - Connect to the Internet WAN Settings Path: Network > IPv6 > WAN1 Settings For IPv6 WAN connections, this router can have a static IPv6 address or receive connection information when configured as a DHCPv6 client. In the case where the ISP assigns you a fixed address to access the internet, the static configuration settings must be completed. In addition to the IPv6 address assigned to your router, the IPv6 prefix length defined by the ISP is needed.
Section 5 - Connect to the Internet Static IP To configure a static IPv6 Internet connection: 1. Click Network > IPv6 > WAN1 Settings. 2. Complete the fields in the table below and click Save. Field Connection Type IPv6 Address IPv6 Prefix Length Default IPv6 Gateway Primary DNS Server Secondary DNS Server Save Description Select Static. Enter the IP address supplied by your ISP. Enter the IPv6 prefix length supplied by your ISP. Enter the IPv6 gateway address supplied by your ISP.
Section 5 - Connect to the Internet PPPoE To configure a dynamic (DHCP) IPv6 Internet connection: 1. Click Network > IPv6 > WAN1 Settings. 2. Complete the fields in the table below and click Save. Field Connection Type User Name Password Authentication Type DHCPv6 Options Primary DNS Server Secondary DNS Server Save Description Select PPPoE. Enter your PPPoE user name. Enter your PPPoE password. Select the authentication type from the drop-down menu (Auto-negotiate/PAP/CHAP/MS-CHAP/MSCHAPv2).
Section 5 - Connect to the Internet Static Routing Path: Network > IPv6 > Static Routing Manually adding static routes to this device allows you to define the path selection of traffic from one interface to another. There is no communication between this router and other devices to account for changes in the path; once configured the static route will be active and effective until the network changes.
Section 5 - Connect to the Internet Field Route Name Active IPv6 Destination IPv6 Prefix Length Interface IPv6 Gateway Metric Save Description Enter a name for your route. Toggle to ON to activate this route or to OFF to deactivate. Enter the IP address of the static route’s destination. Enter the prefix length of the static route. The physical network interface (WAN1, WAN2, WAN3, DMZ or LAN), through which this route is accessible.
Section 5 - Connect to the Internet OSPFv3 Path: Network > IPv6 > OSPFv3 OSPF is an interior gateway protocol that routes Internet Protocol (IP) packets solely within a single routing domain. It gathers link state information from available routers and constructs a topology map of the network. Open Shortest Path First version 3 (OSPFv3) supports IPv6.
Section 5 - Connect to the Internet Field OSPFv3 Enable Interface Priority Hello Interval Dead Interval Cost Save Description Toggle ON to enable OSPFv3. Displays the physical network interface on which OSPFv3 is Enabled/Disabled. Helps to determine the OSPFv3 designated router for a network. The router with the highest priority will be more eligible to become Designated Router. Setting the value to 0 makes the router ineligible to become Designated Router. The default value is 1.
Section 5 - Connect to the Internet 6 to 4 Tunneling Path: Network > IPv6 > 6 to 4 Tunneling 6to4 is an Internet transition mechanism for migrating from IPv4 to IPv6, a system that allows IPv6 packets to be transmitted over an IPv4 network. Select the check box to Enable Automatic Tunneling and allow traffic from an IPv6 LAN to be sent over an IPv4 Option to reach a remote IPv6 network. To enable 6 to 4 tunneling: 1. Click Network > IPv6 > 6 to 4 Tunneling. 2. Toggle Activate Auto Tunneling to ON. 3.
Section 5 - Connect to the Internet ISATAP Path: Network > IPv6 > 6 to 4 Tunneling ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) is an IPv6 transition mechanism meant to transmit IPv6 packets between dual-stack nodes on top of an IPv4 network. ISATAP specifies an IPv6-IPv4 compatibility address format as well as a means for site border router discovery. ISATAP also specifies the operation of IPv6 over a specific link layer - that being IPv4 used as a link layer for IPv6.
Section 5 - Connect to the Internet LAN Settings DHCPv6 Server Path: Network > IPv6 > LAN Settings > IPv6 LAN Settings In IPv6 mode, the LAN DHCP server is disabled by default (similar to IPv4 mode). The DHCPv6 server will serve IPv6 addresses from configured address pools with the IPv6 Prefix Length assigned to the LAN. The default IPv6 LAN address for the router is fec0::1. You can change this 128-bit IPv6 address based on your network requirements.
Section 5 - Connect to the Internet Field IPv6 Address IPv6 Prefix Length Status Mode Domain Name Server Preference DNS Servers Lease / Rebind Time Prefix Delegation Save Description Enter the IPv6 LAN address for the router. Enter the prefix length. Toggle to ON to enable DHCPv6. The IPv6 DHCP server is either stateless or stateful. If stateless is selected an external IPv6 DHCP server is not required as the IPv6 LAN hosts are auto-configured by this router.
Section 5 - Connect to the Internet IPv6 Address Pools Path: Network > IPv6 > LAN Settings > IPv6 Address Pools This feature allows you to define the IPv6 delegation prefix for a range of IP addresses to be served by the router’s DHCPv6 server. Using a delegation prefix you can automate the process of informing other networking equipment on the LAN of DHCP information specific for the assigned prefix. To add, edit, or delete a IPv6 address pool entry: 1.
Section 5 - Connect to the Internet IPv6 Prefix Length Path: Network > IPv6 > LAN Settings > IPv6 Prefix Length To add, edit, or delete a IPv6 prefix length entry: 1. Click Network > IPv6 > LAN Settings > IPv6 Prefix Length tab. 2. Right-click a current entry and select Edit or Delete. To add a new entry, click Add New Prefix Length. 3. Complete the fields in the table below and click Save. Field Profile Prefix Length Save Description Enter a name for this profile. Enter the prefix length.
Section 5 - Connect to the Internet Router Advertisement Path: Network > IPv6 > LAN Settings > Router Advertisement Router Advertisements are analogous to IPv4 DHCP assignments for LAN clients, in that the router will assign an IP address and supporting network information to devices that are configured to accept such details. Router Advertisement is required in an IPv6 network is required for stateless auto configuration of the IPv6 LAN.
Section 5 - Connect to the Internet Advertisement Prefixes Path: Network > IPv6 > LAN Settings > Advertisement Prefixes Router advertisements configured with advertisement prefixes allow this router to inform hosts how to perform stateless address auto configuration. Router advertisements contain a list of subnet prefixes that allow the router to determine neighbors and whether the host is on the same link as the router. To add, edit, or delete an advertisement prefix entry: 1.
Section 5 - Connect to the Internet IPv6 Tunnels Status Path: Network > IPv6 > IPv6 Tunnels Status This page displays the current status of IPv6 Tunnels.
Section 6 - Wireless Settings Wireless Settings The Wireless Network Setup Wizard is available for users new to wireless networking. By going through a few configuration pages you can enable a Wi-Fi™ network on your LAN and allow supported 802.11 clients to connect to the configured Access Point. To run the wizard, refer to “#6 Wireless Network Setup” on page 12. Access Points Path: Wireless > General > Access Points This router has an integrated 802.
Section 6 - Wireless Settings 3. Complete the fields in the table below and click Save. Field AP Name Profile Name Active Time Schedule Control Start/Stop Time WLAN Partition Save Description Enter a name for your virtual access point. Select a profile from the drop-down menu to associate this access point with. If you do not want to use the default profile, create a profile (refer to the next page) and then create an access point. Toggle to ON to “turn on” this access point.
Section 6 - Wireless Settings Profiles Path: Wireless > General > Profiles Creating a profile allows you to assign the security type, encryption and authentication to use when connecting the AP to a wireless client. The default mode is “open”, i.e., no security. This mode is insecure as it allows any compatible wireless clients to connect to an AP configured with this security profile. To create a new profile, use a unique profile name to identify the combination of settings.
Section 6 - Wireless Settings Field Profile Name SSID Description Enter a name for your profile. Enter a name for your wireless network (SSID). Toggle to ON if you want your SSID broadcast openly or toggle to OFF to hide it. Clients will have to know Broadcast SSID the SSID to connect. Select what kind of wireless security you want to use: • Open: Select this option to create a public “open” network to allow unauthenticated devices to access this wireless gateway.
Section 6 - Wireless Settings Radio Settings Path: Wireless > General > Radio Settings You may configure the channels and power levels available for the AP’s enabled on the router. The router has a dual band 802.11n radio, meaning either 2.4 GHz or 5 GHz frequency of operation can be selected (not concurrently though). Based on the selected operating frequency, the mode selection will let you define whether legacy connections or only 802.11n connections (or both) are accepted on configured APs.
Section 6 - Wireless Settings 802.11AC Configuration Path: Wireless > General >Radio Settings > 5 Ghz This section provides configuration options to use the DSR-500AC or DSR-1000AC advanced wireless capabilities in the 5 GHz band. With 802.11AC, data throughput can be significantly increased as compared to 802.11n rates as the channel bandwidth can be as high as 80 MHz.
Section 6 - Wireless Settings WMM Settings Path: Wireless > Advanced > WMM Wi-Fi Multimedia (WMM) provides basic Quality of Service (QoS) features to IEEE 802.11 networks. WMM prioritizes traffic according to four Access Categories (AC) - voice, video, best effort, and background. To configure the radio settings: 1. Click Wireless > Advanced > WMM. 2. Complete the fields in the table below and click Save.
Section 6 - Wireless Settings WDS Path: Wireless > Advanced > WDS Wireless Distribution System (WDS) is a system enabling the wireless interconnection of access points in a network. This feature is only guaranteed to work between devices of the same type (i.e., using the same chipset/ driver). When you enable WDS, use the same security configuration as the default access point. The WDS links do not have true WPA/WPA2 support, as in there is no WPA key handshake performed.
Section 6 - Wireless Settings Advanced Settings Path: Wireless > Advanced > Advanced Settings You can modify the 802.11 communication parameters in this page. Generally, the default settings are appropriate for most networks. 1. Click Wireless > Advanced > Advanced Settings. 2. Complete the fields in the table below and click Save. Field Beacon Interval Description Beacons are packets sent by an Access Point to synchronize a wireless network. The default value is 100.
Section 6 - Wireless Settings WPS Path: Wireless > Advanced > WPS WPS is a simplified method to add supporting wireless clients to the network. WPS is only applicable for APs that employ WPA or WPA2 security. To use WPS, select the eligible VAPs from the drop-down menu of APs that have been configured with this security and enable WPS status for this AP. The WPS Current Status section outlines the security, authentication, and encryption settings of the selected AP.
Section 6 - Wireless Settings 4. Once enabled the following screen will appear. 5. Under WPS Setup Method, decide to either use PIN or PBC (Push Button). 6. If you want to use PIN method, enter the PIN next to Station PIN and click Configure Via PIN. You will need to enter the PIN on your wireless client and start the WPS process within one minute. 7. If you want to use push button method, click Configure Via PBC. This will initiate the WPS session.
Section 7 - VPN VPN A VPN provides a secure communication channel (“tunnel”) between two gateway routers or a remote PC client. The following types of tunnels can be created: • Gateway-to-gateway VPN: To connect two or more routers to secure traffic between remote sites. • Remote Client (client-to-gateway VPN tunnel): A remote client initiates a VPN tunnel as the IP address of the remote PC client is not known in advance. The gateway in this case acts as a responder.
Section 7 - VPN IPSec VPN Policies Path: VPN > IPSec VPN > Policies An IPsec policy is between this router and another gateway or this router and an IPsec client on a remote host. The IPsec mode can be either tunnel or transport depending on the network being traversed between the two policy endpoints. • Transport: This is used for end-to-end communication between this router and the tunnel endpoint, either another IPsec gateway or an IPsec VPN client on a host.
Section 7 - VPN Field Policy Name Policy Type IP Protocol Version IKE Version IPSec Mode Select Local Gateway Remote Endpoint IP Address/FQDN Enable Mode Config Enable NetBIOS Enable RollOver Protocol Enable DHCP Local IP/Remote IP Enable Keepalive Description Enter a unique name for the VPN Policy. This name is not an identifier for the remote WAN/client. Select either Manual or Auto. • Manual: All settings (including the keys) for the VPN tunnel are manually input for each end point.
Section 7 - VPN 3. Once the tunnel type and endpoints of the tunnel are defined you can determine the Phase 1/ Phase 2 negotiation to use for the tunnel. This is covered in the IPsec mode setting, as the policy can be Manual or Auto. For Auto policies, the Internet Key Exchange (IKE) protocol dynamically exchanges keys between two IPsec hosts. The Phase 1 IKE parameters are used to define the tunnel’s security association details.
Section 7 - VPN A Manual policy does not use IKE and instead relies on manual keying to exchange authentication parameters between the two IPsec hosts. The incoming and outgoing security parameter index (SPI) values must be mirrored on the remote tunnel endpoint. As well the encryption and integrity algorithms and keys must match on the remote IPsec host exactly in order for the tunnel to establish successfully.
Section 7 - VPN Tunnel Mode Path: VPN > IPSec VPN > Tunnel Mode When tunnel mode is selected, you can enable NetBIOS and DHCP over IPSec. DHCP over IPSec allows this router to serve IP leases to hosts on the remote LAN. You can also define a single IP address, a range of IPs, or a subnet on both the local and remote private networks that can communicate over the tunnel. The router allows full tunnel and split tunnel support.
Section 7 - VPN Split DNS Names In a split DNS infrastructure, you create two zones for the same domain, one to be used by the internal network, the other used by the external network. Split DNS directs internal hosts to an internal domain name server for name resolution and external hosts are directed to an external domain name server for name resolution. To add a DNS name: 1. Click VPN > IPSec VPN > Tunnel Mode > Split DNS Names tab. 2. Click Add New Split DNS name.
Section 7 - VPN DHCP Range This page displays the IP range to be assigned to clients connecting using DHCP over IPsec. By default the range is in 192.168.12.0 subnet. To configure the DHCP over IPSec DHCP server settings: 1. Click VPN > IPSec VPN > DHCP Range. 2. Complete the fields in the table below and click Save. Field Starting IP Address Ending IP Address Subnet Mask Save Description Enter the starting IP address to issue your clients connecting using DHCP over IPSec. Enter the ending IP address.
Section 7 - VPN Certificates This router uses digital certificates for IPsec VPN authentication. You can obtain a digital certificate from a wellknown Certificate Authority (CA) such as VeriSign, or generate and sign your own certificate using functionality available on this gateway. The router comes with a self-signed certificate, and this can be replaced by one signed by a CA as per your networking requirements.
Section 7 - VPN Active Self Certificates A self certificate is a certificate issued by a CA identifying your device (or self-signed if you don’t want the identity protection of a CA). The Active Self Certificate table lists the self certificates currently loaded on the router. The following information is displayed for each uploaded self certificate: Name: The name you use to identify this certificate, it is not displayed to IPsec VPN peers.
Section 7 - VPN Self Certificate Requests To request a self certificate to be signed by a CA, you can generate a Certificate Signing Request from the router by entering identification parameters and passing it along to the CA for signing. Once signed, the CA’s Trusted Certificate and signed certificate from the CA are uploaded to activate the self -certificate validating the identity of this gateway.
Section 7 - VPN Easy VPN Setup To upload an exported IPSec VPN policy: 1. Click VPN > IPSec VPN > Easy VPN Setup. 2. Click Browse and navigate to the policy file you want to upload. Select it and click Open. 3. Click Upload. 4. Once uploaded, go to VPN > IPSec VPN > Policies and the loaded VPN will be listed. Right-click it to edit or delete.
Section 7 - VPN PPTP VPN Server Path: VPN > PPTP VPN > Server A PPTP VPN can be established through this router. Once enabled a PPTP server is available on the router for LAN and WAN PPTP client users to access. Once the PPTP server is enabled, PPTP clients that are within the range of configured IP addresses of allowed clients can reach the router’s PPTP server. Once authenticated by the PPTP server (the tunnel endpoint), PPTP clients have access to the network managed by the router.
Section 7 - VPN Client Path: VPN > PPTP VPN > Client PPTP VPN Client can be configured on this router. Using this client you can access remote network which is local to PPTP server. Once client is enabled, the user can access Status > Active VPNs page and establish PPTP VPN tunnel clicking Connect. To configure the router as a PPTP VPN client: 1. Click VPN > PPTP VPN > Client tab. 2. Toggle Client to ON and complete the fields in the table below.
Section 7 - VPN PPTP Active Users List A list of PPTP connections will be displayed on this page. Right-click the connection to connect and disconnect.
Section 7 - VPN L2TP VPN Server Path: VPN > L2TP VPN > Server A L2TP VPN can be established through this router. Once enabled a L2TP server is available on the router for LAN and WAN L2TP client users to access. Once the L2TP server is enabled, PPTP clients that are within the range of configured IP addresses of allowed clients can reach the router’s L2TP server. Once authenticated by the L2TP server (the tunnel endpoint), L2TP clients have access to the network managed by the router.
Section 7 - VPN Client L2TP VPN Client can be configured on this router. Using this client we can access remote network which is local to L2TP server. Once client is enabled, the user can access Status > Active VPNs page and establish L2TP VPN tunnel clicking Connect. To configure the router as a L2TP VPN client: 1. Click VPN > L2TP VPN > Client tab. 2. Toggle Client to ON and complete the fields in the table below. Field Client Server IP Description Toggle to ON to enable L2TP client.
Section 7 - VPN L2TP Active Users List A list of L2TP connections will be displayed on this page. Right-click the connection to connect and disconnect.
Section 7 - VPN SSL VPN Server Policies SSL VPN Policies can be created on a Global, Group, or User level. User level policies take precedence over Group level policies and Group level policies take precedence over Global policies. These policies can be applied to a specific network resource, IP address, or IP ranges on the LAN, or to different SSL VPN services supported by the router. The List of Available Policies can be filtered based on whether it applies to a user, group, or all users (global).
Section 7 - VPN 4. Complete the fields from the table below and click Save. Network Resource Field Policy Type Available Groups/Users Apply Policy To Policy Name IP Address Mask Length ICMP Begin/End Defined Resources Service Permission Save D-Link DSR-Series User Manual IP Address Description Select Global, Group, or User. If you selected Group, select a group from the drop-down menu. If you selected User, select a user from the drop-down menu.
Section 7 - VPN Portal Layouts Path: VPN > SSL VPN > Portal Layouts You may create a custom page for remote VPN users that is viewed during authentication. You may include login instructions, services, and other details. Note that the default portal LAN IP address is https://192.168.10.1/ scgi-bin/userPortal/portal. This is the same page that opens when the “User Portal” link is clicked on the SSL VPN menu of the router web UI. To create a new portal layout: 1. Click VPN > SSL VPN > Portal Layouts. 2.
Section 7 - VPN Field Description Enter a name for this portal. This name will be used as part of the path for the SSL portal Portal Layout Name URL. Only alphanumeric characters are allowed for this field. Login Profile View Select a login profile from the drop-down menu. Enter the portal web browser window title that appears when the client accesses this Portal Site Title portal. This field is optional. Banner Title The banner title that is displayed to SSL VPN clients prior to login.
Section 7 - VPN Resources Path: VPN > SSL VPN > Resources Network resources are services or groups of LAN IP addresses that are used to easily create and configure SSL VPN policies. This shortcut saves time when creating similar policies for multiple remote SSL VPN users. Adding a Network Resource involves creating a unique name to identify the resource and assigning it to one or all of the supported SSL services.
Section 7 - VPN Field Resource Name Service ICMP Object Type Object Address Mask Length Begin/End Save D-Link DSR-Series User Manual Description Enter a unique name for this resource. Select VPN Tunnel, Port Forwarding, or All. Toggle to ON to include ICMP traffic. Select Single IP Address or IP Network. Enter the IP address. If you selected IP Network, enter the mask length (0-32). Enter a port range for the object. Click to save your settings.
Section 7 - VPN Port Forwarding Port forwarding allows remote SSL users to access specified network applications or services after they login to the User Portal and launch the Port Forwarding service. Traffic from the remote user to the router is detected and re-routed based on configured port forwarding rules. Internal host servers or TCP applications must be specified as being made accessible to remote users.
Section 7 - VPN Client Path: VPN > SSL VPN > SSL VPN Client An SSL VPN tunnel client provides a point-to-point connection between the browser-side machine and this router. When a SSL VPN client is launched from the user portal, a "network adapter" with an IP address from the corporate subnet, DNS and WINS settings is automatically created. This allows local applications to access services on the private network without any special network configuration on the remote SSL VPN client machine.
Section 7 - VPN Client Routes Path: VPN > SSL VPN > SSL VPN Client If the SSL VPN client is assigned an IP address in a different subnet than the corporate network, a client route must be added to allow access to the private LAN through the VPN tunnel. As well a static route on the private LAN‘s firewall (typically this router) is needed to forward private traffic through the VPN Firewall to the remote SSL VPN client.
Section 7 - VPN Open VPN Settings VPN > OpenVPN > Settings OpenVPN allows peers to authenticate each other using a pre-shared secret key, certificates, or username/ password. When used in a multiclient-server configuration, it allows the server to release an authentication certificate for every client, using signature and Certificate authority. An OpenVPN can be established through this router. You can select server mode, client mode, or access server client mode.
Section 7 - VPN Client To configure the router as an OpenVPN client: 1. Click VPN > OpenVPN > Settings. 2. Toggle OpenVPN to ON and complete the fields in the table below. Field Mode Server IP Port Tunnel Protocol Encryption Algorithm Hash Algorithm Save Description Select Client. Enter the IP address of the OpenVPN server. Enter what port to use. The default port is 1194. Select either TCP or UDP. Select the encryption algorithm from the drop-down menu. Select the hash algorithm from the drop-down menu.
Section 7 - VPN Access Server Client To configure the router as an OpenVPN access server client: 1. Click VPN > OpenVPN > Settings. 2. Toggle OpenVPN to ON and complete the fields in the table below. Field Mode Port Upload Status File Save Description Select Access Server Client. Enter what port to use. The default port is 1194. Displays if a configuration file has been uploaded. Click Browse and locate the configuration file. Click Open and then click Upload.
Section 7 - VPN Local Networks If you selected Split Tunnel (from OpenVPN Server), you can create a local network by following the steps below: 1. Click VPN > OpenVPN > Local Networks. 2. Click Add New OpenVPN Local Network. 3. Enter a local IP network. 4. Enter the subnet mask. 5. Click Save.
Section 7 - VPN Remote Networks To create remote networks: 1. Click VPN > OpenVPN > Remote Networks. 2. Click Add New OpenVPN Remote Network. 3. 4. 5. 6. Enter a name of the remote network. Enter a local IP network. Enter the subnet mask. Click Save.
Section 7 - VPN Authentication This page will allow you to upload certificates and keys. Click Browse and select the file you want to upload. Click Open and then click Upload.
Section 7 - VPN GRE VPN > VPN Settings > GRE GRE tunnels allow for broadcast traffic on the LAN of the router to be passed over the internet and received by remote LAN hosts. This is primarily useful in the D-Link Discovery Protocol (DDP) application where broadcast traffic from one LAN host is to be received by all LAN hosts in the local subnets of the GRE endpoints.
Section 7 - VPN 3. Complete the fields in the table below and then click Save. Field GRE Tunnel Name IP Address Subnet Mask Interface Remote End Address Enable DDP Broadcast IP Address Subnet Mask Gateway IP Address Save Description Enter a name for the tunnel. Enter the IP address of this endpoint. It will be referenced in the other router’s static route as the Gateway IP address. Enter the subnet mask. Select the interface to create this tunnel with from the drop-down menu.
Section 8 - Security Security Groups Path: Security > Authentication > User Database > Groups The group page allows creating, editing, and deleting groups. The groups are associated to set of user types. To edit/delete an existing group, or add a new group: 1. Click Security > Authentication > User Database > Groups tab. 2. Right-click a group entry and select either Edit or Delete. To add a new group, click Add New Group. 3. Complete the fields in the table below and click Save.
Section 8 - Security Login Policies Path: Security > Authentication > Internal User Database > Groups Using the following procedure, you can grant or deny a user group login access to the web management interface. 1. Click Security > Authentication > Internal User Database > Groups tab. 2. Click Add Login Policies. 3. Complete the fields from the table below and click Save. Field Group Name Description Select the group you want to configure.
Section 8 - Security Browser Policies Path: Security > Authentication > Internal User Database > Groups Use this feature to allow or deny users in a selected group from using a particular web browser to log in to the router’s web management interface. 1. Click Security > Authentication > Internal User Database > Groups tab. 2. Click Add Browser Policies. 3. Complete the fields from the table below and click Save.
Section 8 - Security IP Policies Path: Security > Authentication > Internal User Database > Groups Use this feature to allow or deny users in a user group to log in to the router’s web management interface from a particular network or IP address. 1. Click Security > Authentication > Internal User Database > Groups tab. 2. Click Add IP Policies. 3. Complete the fields from the table below and click Save.
Section 8 - Security Users User Management Path: Security > Authentication > Internal User Database > Users After you add user groups, you can add users to the user groups. Users can be added individually, or they can be imported from a comma-separated-value (CSV) formatted file. After you add users, you can edit them when changes are required or delete users when you no longer need them. To edit/delete existing users, or add a new user: 1.
Section 8 - Security Import User Database Path: Security > Authentication > Internal User Database > Get User DB The DSR administrator can add users to the local built-in database directly via an appropriately-formatted comma separated value (CSV) file. The advantage of this feature is to allow for a large number of users to be added to the system with one operation, and the same file can be uploaded to multiple DSR devices as needed.
Section 8 - Security Create a User Database (CSV File) The following parameters must be used to define the User database CSV file. 1. Create an empty text file with a .csv extension. 2. Each line in the file corresponds to a single user entry. Every line should end with carriage return equivalent of CRLF. Do not add comments or other text in this file. 3. Formatting rules: a) All the fields must be enclosed within double quotes. b) Consecutive fields are separated by commas.
Section 8 - Security External Authentication Servers RADIUS Server Path: Security > Authentication > External Auth Server > RADIUS Server A RADIUS server can be configured and accessible by the router to authenticate client connections. To configure the router to connect to your RADIUS server: 1. Click Security > Authentication > External Auth Server > RADIUS Server tab. 2. Complete the RADIUS server information from the table below and click Save. You can configure up to three servers.
Section 8 - Security POP3 Server Path: Security > Authentication > External Auth Server > POP3 Server POP3 is an application layer protocol most commonly used for e-mail over a TCP/IP connection. The authentication server can be used with SSL encryption over port 995 to send encrypted traffic to the POP3 server. The POP3 server’s certificate is verified by a user-uploaded CA certificate. If SSL encryption is not used, port 110 will be used for the POP3 authentication traffic.
Section 8 - Security POP3 Trusted Server Path: Security > Authentication > External Auth Server > POP3 Trusted CA A CA file is used as part of the POP3 negotiation to verify the configured authentication server identity. Each of the three configured servers can have a unique CA used for authentication. To configure: 1. Click Security > Authentication > External Auth Server > POP3 Trusted CA tab. 2. Click Add CA File. 3. Click Browse and select a CA file. Click Open and then click Upload.
Section 8 - Security LDAP Server Path: Security > Authentication > External Auth Server > LDAP Server The LDAP authentication method uses LDAP to exchange authentication credentials between the router and an external server. The LDAP server maintains a large database of users in a directory structure, so users with the same user name but belonging to different groups can be authenticated since the user information is stored in a hierarchal manner.
Section 8 - Security AD Server Path: Security > Authentication > External Auth Server > AD Server Active Directory authentication is an enhanced version of NT Domain authentication. The Kerberos protocol is leveraged for authentication of users, who are grouped in Organizational Units (OUs). In particular the Active Directory server can support more than a million users given is structure while the NT Domain server is limited to thousands.
Section 8 - Security Field Authentication Server (1-3) Active Directory Domain (1-3) Timeout Retries Administrator Account Save Server Check Description Enter the IP address of your AD server(s). Enter the active directory domain name(s). Set the amount of time in seconds that the router should wait for a response from the AD server. This determines the number of tries the controller will make to the AD server before giving up.
Section 8 - Security NT Domain Server Path: Security > Authentication > External Auth Server > NT Domain The NT Domain server allows users and hosts to authenticate themselves via a pre-configured Workgroup field. Typically Windows or Samba servers are used to manage the domain of authentication for the centralized directory of authorized users. To configure the router to connect to your NT domain server: 1. Click Security > Authentication > External Auth Server > NT Domain tab. 2.
Section 8 - Security Login Profiles Path: Security > Authentication > Login Profiles When a wireless client connects to the SSIDs or VLANs, the user sees a login page. The Login Profile and SLA page allows you to customize the appearance of that page with specific text and images. The wireless router supports multiple login and SLA pages. Associate login page or SLAs on SSIDs or VLANs separately. To add, delete, or edit login profiles: 1. Click Security > Authentication > Login Profiles tab. 2.
Section 8 - Security Field Profile Name Description General Details Enter a name for this captive portal profile. The name should allow you to differentiate this captive profile from others you may set up. Browser Title Enter the text that will appear in the title of the browser during the captive portal session. Background Select whether the login page displayed during the captive portal session will show an image or color. Choices are: • Image: Displays an image as the background on the page.
Section 8 - Security External Payment Gateway Enable External Payment Gateway Session Title 1 Message Session Title 2 Success Message Session Title 3 Failure Message Enable Billing Profile Service Disclaimer Text Payment Server Enables or disables external payment gateway and online wireless service purchasing from on the login page. Enter the text that appears in the title of the online purchasing login box when the user logs in to the captive portal session.
Section 8 - Security Web Content Filtering Static Filtering Path: Security > Authentication > Static Filtering You may block access to certain Internet services. To block or allow a service: 1. Click Security > Web Content Filter > Static Filtering tab. 2. Toggle Content Filtering to ON. 3. Toggle the service to ON to block. Toggle to OFF to allow. 4. Click Save.
Section 8 - Security Approved URLs Path: Security > Web Content Filter > Static Filtering > Approved URL The approved URL list is an acceptance list for all URL domain names. Domains added to this list are allowed in any form. For example, if the domain “dlink” is added to this list then all of the following URL’s are permitted access from the LAN: www.dlink.com, support.dlink.com, etc. Importing/exporting from a text or CSV file is also supported. To add/import/export URLs to the approved list: 1.
Section 8 - Security Blocked Keywords Path: Security > Web Content Filter > Static Filtering > Blocked Keywords Keyword blocking allows you to block all website URL’s or site content that contains the keywords in the configured list. This is lower priority than the Approved URL List; i.e. if a blocked keyword is present in a site allowed by a trusted domain in the Approved URL List, then access to that site will be allowed. Import/export from a text or CSV file is also supported.
Section 8 - Security Dynamic Filtering Path: Security > Web Content Filter > Dynamic Filtering Dynamic Filtering will allow you to filter content from a list of categories. The router must be upgraded with the WCF license and then the Content Filtering option, which allows the user to filter out internet sites, needs to be enabled. When enabled, access to a website belonging to one of these configured categories will be blocked with an error page. To add/import/export URLs to the approved list: 1.
Section 8 - Security Firewall Firewall Rules Path: Security > Firewall > Firewall Rules > IPv4 Firewall Rules or IPv6 Firewall Rules Inbound (WAN to LAN/DMZ) rules restrict access to traffic entering your network, selectively allowing only specific outside users to access specific local resources. By default all access from the insecure WAN side are blocked from accessing the secure LAN, except in response to requests from the LAN or DMZ.
Section 8 - Security 3. Complete the fields from the table below and click Save. Field From Zone To Zone Service Action Source Hosts Destination Hosts Log QoS Priority (IPv4 only) Description Select the source of originating traffic: either secure LAN, public DMZ, or insecure WAN. For an inbound rule WAN should be selected. Select the destination of traffic covered by this rule. If the From Zone is the WAN, the To Zone can be the public DMZ or secure LAN.
Section 8 - Security Schedules Path: Security > Firewall > Schedules Firewall rules can be enabled or disabled automatically if they are associated with a configured schedule. The schedule configuration page allows you to define days of the week and the time of day for a new schedule, and then this schedule can be selected in the firewall rule configuration page. Note: All schedules will follow the time in the router’s configured time zone.
Section 8 - Security Custom Services Path: Security > Firewall > Custom Services Custom services can be defined to add to the list of services available during firewall rule configuration. While common services have known TCP/UDP/ICMP ports for traffic, many custom or uncommon applications exist in the LAN or WAN. In the custom service configuration menu you can define a range of ports and identify the traffic type (TCP/UDP/ICMP) for this service.
Section 8 - Security ALGs Path: Security > Firewall > ALGs Application Level Gateways (ALGs) are security components that enhance the firewall and NAT support of this router to seamlessly support application layer protocols. In some cases enabling the ALG will allow the firewall to use dynamic ephemeral TCP/ UDP ports to communicate with the known ports a particular client application (such as H.
Section 8 - Security SMTP ALGs Path: Security > Firewall > ALGs > SMTP ALGs Simple Mail Transfer Protocol (SMTP) is a text based protocol used for transferring email between mail servers over the Internet. Typically the local SMTP server will be located on a DMZ so that mail sent by remote SMTP servers will traverse the router to reach the local server. Local users will then use email client software to retrieve their email from the local SMTP server.
Section 8 - Security Approved Mail IDs Path: Security > Firewall > ALGs > Approved Mail IDs 1. Click Security > Firewall > ALGs > Approved Mail IDs tab. 2. Right-click an entry and select either Edit or Delete. To add a new mail ID, click Add New Approved Mail ID. 3. Enter a mail ID and click Save.
Section 8 - Security Blocked Mail IDs Path: Security > Firewall > ALGs > Blocked Mail IDs 1. Click Security > Firewall > ALGs > Blocked Mail IDs tab. 2. Right-click an entry and select either Edit or Delete. To add a new mail ID, click Add New Blocked Mail ID. 3. Enter a mail ID and click Save.
Section 8 - Security Mail Filtering Path: Security > Firewall > ALGs > Mail Filtering 1. Click Security > Firewall > ALGs > Mail Filtering tab. 2. Right-click an entry and select either Edit or Delete. To add a new mail ID, click Add New Mail Filter. 3. Enter a subject and a mail ID. 4. Select to allow or block. 5. Click Save.
Section 8 - Security VPN Passthrough Path: Security > Firewall > VPN Passthrough This router’s firewall settings can be configured to allow encrypted VPN traffic for IPsec, PPTP, and L2TP VPN tunnel connections between the LAN and internet. A specific firewall rule or service is not appropriate to introduce this passthrough support; instead the options in the VPN Passthrough page must be toggled to ON. 1. Click Security > Firewall > VPN Passthrough. 2.
Section 8 - Security Dynamic Port Forwarding Application Rules Path: Security > Firewall > Dynamic Port Forwarding > Application Rules Application rules are also referred to as port triggering. This feature allows devices on the LAN or DMZ to request one or more ports to be forwarded to them. Port triggering waits for an outbound request from the LAN/DMZ on one of the defined outgoing ports, and then opens an incoming port for that specified type of traffic.
Section 8 - Security 3. Complete the fields from the table below and click Save. Field Name Enter a name for your rule. Description Enable Toggle to ON to activate the rule. Protocol Select TCP or UDP. Interface Select either LAN or DMZ. Outgoing (Trigger) Port Range Incoming Port Range Save Enter the start and end trigger port range. Enter the port range to open. Click to save your settings. 4. Click on the Application Rules Status tab to see a list of rules and their status.
Section 8 - Security Attack Checks Path: Security > Firewall > Attack Checks Attacks can be malicious security breaches or unintentional network issues that render the router unusable Attack checks allow you to manage WAN security threats such as continual ping requests and discovery via ARP scans. TCP and UDP flood attack checks can be enabled to manage extreme usage of WAN resources. Additionally certain Denial-of-Service (DoS) attacks can be blocked.
Section 8 - Security Intel® AMT Path: Security > Firewall > Intel® AMT Intel® Active Management Technology (AMT) allows you to remotely access and manage every networked device, even those that lack a working operating system or hard drive, or are turned off as long as the computer is connected to line power and to the network. Intel AMT uses a separate management processor that runs independently on the client machine and can be reached through the wired or wireless network. 1.
Section 8 - Security IPS Path: Security > Firewall > IPS The router’s Intrusion Prevention System (IPS) prevents malicious attacks from the internet from accessing the private network. Static attack signatures loaded to the router allow common attacks to be detected and prevented. The checks can be enabled between the WAN and DMZ or LAN, and a running counter will allow the administrator to see how many malicious intrusion attempts from the WAN have been detected and prevented.
Section 9 - Maintenance Maintenance System Settings Path: Maintenance > Administration > System Setting You may change the name of the router here. 1. Click Maintenance > Administration > System Setting. 2. Complete the fields from the table below and click Save. Field Current System Name Displays the current name for the router. New Name for System Enter a new name for the router. Save Description Click to save and activate your settings.
Section 9 - Maintenance Date and Time Path: Maintenance > Administration > Date and Time You can configure your time zone, whether or not to adjust for Daylight Savings Time, and with which Network Time Protocol (NTP) server to synchronize the date and time. You can choose to set Date and Time manually, which will store the information on the router’s real time clock (RTC). If the router has access to the internet, the most accurate mechanism to set the router time is to enable NTP server communication. 1.
Section 9 - Maintenance Session Settings Path: Maintenance > Administration > Session Settings Here you can set the timeout value for admin and guest logins. 1. Click Maintenance > Administration > Session Settings. 2. Complete the fields from the table below and click Save. Field Administrator Description Enter the timeout value in minutes for the Administrator account. Guest Enter the timeout value in minutes for the Guest account. Save Click to save and activate your settings.
Section 8 - Security License Updates Path: Maintenance > Administration > License Update Certain features can be added to the router by purchasing a license key. An activation code is provided based on the router’s MAC Address, so it will be unique to that particular device. Each license has the following three parameters: Field Model Activation Code Expiration Description The license model as it relates to the feature being added. The activation code corresponding to this license.
Section 9 - Maintenance USB Share Ports Path: Maintenance > Administration > USB Share Ports This page allows configure the SharePort feature available on this router. 1. Click Maintenance > Administration > USB Share Ports. 2. Complete the fields from the table below and click Save. Field USB Port 1 Printer Description Toggle to ON to enable USB port 1. Once enabled you will need to enter your printer information. USB Port 2 Printer Toggle to ON to enable USB port 2.
Section 9 - Maintenance SMS Service Inbox Path: Maintenance > Administration > SMS Service > Inbox The D-Link Services Router has a USB interface to connect 3G modem support to send and receive Short Messaging Service (SMS). The received messages can be seen in the Inbox and allows the user to create a new SMS. If WAN3 is used in dedicated WAN mode, load balancing mode, or if the 3G USB device is not connected to router then the controls on this page will not be available. To view any incoming messages: 1.
Section 9 - Maintenance Create SMS Path: Maintenance > Administration > SMS Service> Create SMS This page allows you to send a message using the SMS service. 1. Click Maintenance > Administration > SMS Service > Create SMS tab. 2. Complete the fields from the table below and click Send Message. Field Receiver Description Enter the phone number of the intended receiver. Text Message Enter the message you want to send. Send Message Click to send your message. Cancel Click to reset the fields.
Section 9 - Maintenance Package Manager Path: Maintenance > Administration > Package Manager A package is a set of files which are installed by the router from D-Link’s repositories. This feature allows users to download new drivers for supported USB devices and language packs to enable multi-lingual support for the router’s management interface.
Section 9 - Maintenance 2. Complete the fields from the table below. Field List of Default Drivers Manual Install Description Displays the default drivers that are installed. Click to display a list of available packages for download. You must be connected to the Internet. Here you can select the driver to update or install. If you have downloaded a packed, click Browse and select the package. Click Open and then click Install. Install History Displays a list of package installations.
Section 9 - Maintenance Set Language Path: Maintenance > Administration > Set Language You can download language packs (refer to “Package Manager” on page 169) and install them on the router. Once you have downloaded a pack, follow the steps below to install: 1. Click Maintenance > Administration > Set Language. 2. Select a loaded language pack from the drop-down menu and click Save.
Section 9 - Maintenance Web GUI Management Path: Maintenance > Administration > Web GUI Management The Web GUI Management page will allow you to specify by IP address or VLAN what users can configure the router using the web GUI. 1. Click Maintenance > Administration > Web GUI Management. 2. Toggle Enable to ON and click Save. 3. Click Add New Configuration. 4. Enter a name for this configuration. 5.
Section 9 - Maintenance Remote Management Path: Maintenance > Management > Remote Management Enable this feature to be able to manage the router from a remote location, using HTTPS or Telnet. Both HTTPS and Telnet access can be restricted to a subset of IP addresses. The router administrator can define a known PC, single IP address or range of IP addresses that are allowed to access the GUI with HTTPS.
Section 9 - Maintenance SNMP Path: Maintenance > Management > SNMP SNMP is an additional management tool that is useful when multiple routers in a network are being managed by a central Master system. When an external SNMP manager is provided with this router’s Management Information Base (MIB) file, the manager can update the router’s hierarchal variables to view or update configuration parameters.
Section 9 - Maintenance SNMP Trap List Path: Maintenance > Management > SNMP > SNMP Trap List To create a new SNMP trap: 1. Click Maintenance > Management > SNMP > SNMP Trap List tab. 2. Right-click an entry and select either Edit or Delete. To add a new trap, click Add SNMP Trap. 3. Complete the fields from the table below and click Save. Field IP Address Port Community Authentication Type Save Description The IP Address of the SNMP trap agent.
Section 9 - Maintenance Access Control Path: Maintenance > Management > SNMP > Access Control List To edit, delete, or create a new access control entry: 1. Click Maintenance > Management > SNMP > Access Control List tab. 2. Right-click an entry and select either Edit or Delete. To add a new trap, click Add Access Control. 3. Complete the fields from the table below and click Save. Field IP Address Subnet Mask Community Access Type Save Description The IP Address of the SNMP agent.
Section 9 - Maintenance SNMP System Info Path: Maintenance > Management > SNMP > SNMP System Info To create a new SNMP trap: 1. Click Maintenance > Management > SNMP > SNMP System Info tab. 2. Complete the fields from the table below and click Save. Field SysContact Description The name of the contact person for this router. Examples: admin, John Doe. SysLocation The physical location of the router: Example: Rack #2, 4th Floor. SysName Save A name given for easy identification of the router.
Section 9 - Maintenance Diagnostics Ping an IP Address/Domain Name Path: Maintenance > Management > Diagnostics > Network Tools As part of the diagnostics functions on the router, you can ping an IP address or domain name. You can use this function to test connectivity between the router and another device on the network or the Internet. 1. Click Maintenance > Diagnostics > Network Tools tab. 2.
Section 9 - Maintenance Using Traceroute Path: Maintenance > Management > Diagnostics > Network Tools The router provides a Traceroute function that lets you map the network path to a public host. Up to 30 “hops” between this router and the destination will be displayed. 1. Click Maintenance > Diagnostics > Network Tools tab. 2. Under Command Output for Ping and Traceroute, in the IP Address/Domain Name field, enter an IP address or domain name. 3. Click Traceroute.
Section 9 - Maintenance Performing DNS Lookups Path: Maintenance > Management > Diagnostics > Network Tools The router provides a DNS lookup function that lets you retrieve the IP address of a Web, FTP, Mail, or any other server on the Internet. 1. Click Maintenance > Diagnostics > Network Tools tab. 2. Under DNS Lookup, in the Domain Name field, enter an Internet name. 3. Click Lookup. The results will appear in the Command Output display.
Section 9 - Maintenance Capture Packets Path: Maintenance > Management > Diagnostics > Capture Packets The router lets you capture all packets that pass through the LAN and WAN interfaces. The packet trace is limited to 1MB of data per capture session. If the capture file size exceeds 1MB, it is deleted automatically and a new capture file is created. 1. Click Maintenance > Diagnostics > Capture Packets tab. 2. Select an interface from the drop-down menu. 3. Click Start Trace.
Section 9 - Maintenance System Check Path: Maintenance > Management > Diagnostics > System Check As part of the diagnostics functions on the router, you can view the static and dynamic routes for both IPv4 and IPv6. 1. Click Maintenance > Diagnostics > System Check tab. 2. Click Display IPv4 Table or Display IPv6 Table. The results will appear in the Command Output display.
Section 9 - Maintenance Power Saving Path: Maintenance > Management > Power Saving The router allows you to adjust the power consumption of the hardware based on your actual usage. The two “green” options available for your LAN switch are Power Saving by Link Status and Length Detection State. 1. Click Maintenance > Diagnostics > Power Saving. 2. Complete the fields from the table below and click Save.
Section 9 - Maintenance Firmware Upgrade You can upgrade to a newer firmware version from the Administration web page. In the Firmware Upgrade section, to upgrade your firmware, click Browse, locate and select the firmware image on your host, and click Upgrade. After the new firmware image is validated, the new image is written to flash and the router will automatically reboot with the new firmware.
Section 9 - Maintenance Using PC To upgrade the firmware from a PC: 1. Download the latest firmware version from the D-Link support website. 2. Once downloaded, log in to the router and click Maintenance > Firmware > Firmware Upgrade > Using System (PC) tab. 3. Click Browse and locate the firmware file you downloaded. Select it and click Open. 4. Click Upgrade. Note: The upgrade process takes a few minutes. Do not interrupt the upgrade or turn off the router; otherwise you can damage the firmware.
Section 9 - Maintenance Using USB To upgrade the firmware using a USB thumb drive: 1. Download the latest firmware version from the D-Link support website and copy the file to a USB thumb drive. 2. Plug the USB thumb drive into a USB port on the router. 3. Log in to the router and click Maintenance > Firmware > Firmware Upgrade > Using USB tab. 4. Select the firmware file from the list and click Upgrade. Note: The upgrade process takes a few minutes.
Section 9 - Maintenance Configuration Files Backup Path: Maintenance > Firmware > Backup / Restore After you configure the router, you can back up the configuration settings. When you back up the settings, they are saved as a file. You can then use the file to restore the settings on the same router if something goes wrong or on a different router (must be the same model) that will replace the existing router. To backup your configuration files: 1. Click Maintenance > Firmware > Backup / Restore tab. 2.
Section 9 - Maintenance Restore To restore your settings from a saved backup file: 1. Click Maintenance > Firmware > Backup / Restore. 2. To restore the file from your computer, click Browse and select the file. Click Open and then click Restore. To restore the file from a USB thumb drive, select the file in the list under the corresponding USB port and click Restore.
Section 9 - Maintenance Configuration Settings If there is a USB storage device currently plugged in to the router, you can enable auto-backup. The snapshot of current configuration settings will be updated on the USB storage device and overwrite any files with the same filename (i.e., if there was an earlier configuration backup done to this location). 1. Click Maintenance > Firmware > Backup / Restore > Configuration Settings tab. 2.
Section 9 - Maintenance Soft Reboot Performing a soft reboot simply performs a power cycle. 1. Click Maintenance > Firmware > Soft Reboot. 2. Click Soft Reboot. The router will power cycle.
Section 9 - Maintenance Reset to Factory Default Settings If you reset the router to its factory default settings, it returns to the state when it was new — all changes you made to the default configuration are lost. Examples of settings that get restored include critical things you need to get online, such as login password, SSID, IP addresses, and wireless security keys. 1. Click Maintenance > Firmware > Soft Reboot. 2. Click Default.
Section 9 - Maintenance Log Settings The router allows you capture log messages. You can monitor the type of traffic that goes through the router and be notified of potential attacks or errors when they are detected by the controller. The following sections describe the log configuration settings and the ways you can access these logs.
Section 9 - Maintenance For each facility, the following events (in order of severity) can be logged: • Emergency: system is unusable • Alert: action must be taken immediately • Critical: critical conditions • Error: error conditions • Warning: warning conditions • Notification: normal but significant condition • Information: informational • Debugging: debug-level messages When a particular severity level is selected, all events with severity equal to and greater than the chosen severity are captured.
Section 9 - Maintenance Routing Logs Path: Maintenance > Logs Settings > Routing Logs Traffic can be tracked based on whether the packet was accepted or dropped by the firewall. Denial of service attacks, general attack information, login attempts, dropped packets, and similar events can be captured for review. Note: Enabling logging options may generate a significant volume of log messages and is recommended for debugging purposes only.
Section 9 - Maintenance System Logs Path: Maintenance > Logs Settings > System Logs In addition to network segment logging, unicast and multicast traffic can be logged. Unicast packets have a single destination on the network, whereas broadcast (or multicast) packets are sent to all possible destinations simultaneously. One other useful log control is to log packets that are dropped due to configured bandwidth profiles over a particular interface.
Section 9 - Maintenance Remote Logs Path: Maintenance > Logs Settings > Remote Logs Once you have configured the type of logs that you want the router to collect, they can be sent to either a Syslog server or an E-Mail address. For remote logging a key configuration field is the Remote Log Identifier.
Section 9 - Maintenance Field SMTP Port Description Enter a prefix used to identify the source of the message. This identifier is prefixed to both e-mail and Syslog messages. Toggle to ON to enable E-Mail logs. Enter the IP address or network address of the SMTP server. The router will connect to this server to send e-mail logs when required. The SMTP server must be operational for e-mail notifications to be received. Enter the SMTP port of the e-mail server.
Section 9 - Maintenance Syslog Server Path: Maintenance > Logs Settings > Syslog Server An external Syslog server is often used to collect and store logs from the router. This remote device typically has less memory constraints than the local Event Viewer on the router. Therefore, a number of logs can be collected over a sustained period. This is useful for debugging network issues or to monitor router traffic over a long duration. The router supports eight concurrent Syslog servers.
Section 9 - Maintenance Event Logs Path: Maintenance > Logs Settings > Event Logs The router’s web management interface displays configured log messages from the Status menu. When traffic through or to the router matches settings in the Facility Logs page or Routing Logs page, the corresponding log message will appear in this window with a timestamp. 1. Click Maintenance > Log Settings > Event Logs. 2. Toggle to ON and click Save.
Section 9 - Maintenance IPv6 Logs Path: Maintenance > Logs Settings > IPv6 Logs This page allows you to configure what IPv6 events you want to log. 1. Click Maintenance > Log Settings > IPv6 Logs. 2. Complete the fields from the table below and click Save. Field Accepted Packets LAN to WAN Toggle to ON to log accepted packets. Dropped Packets Toggle to ON to log dropped packets. WAN Accepted Packets Toggle to ON to log accepted packets. Dropped Packets Toggle to ON to log dropped packets.
Section 10 - Status and Statistics Status and Statistics Dashboard Path: Status > Dashboard The router provides a dashboard that displays about the resources the system is using. The dashboard page is organized into the following sections: Field Traffic Overview WAN Ports Bandwidth Usage VPNs Traffic Information Description Displays a chart of traffic overview by service for each interface. Displays a chart of traffic overview by bandwidth and packet information for WAN traffic.
Section 10 - Status and Statistics Manage Dashboard To manage the dashboard: 1. Click on the Manage Dashboard button. 2. The following window will pop out and allow you to enable or disable the overview panels shown on the dashboard. Toggle the panel to ON or OFF and click Save.
Section 10 - Status and Statistics System Path: Status > System Information > Device > System The System Info page displays the current system name, firmware version, hardware version, and serial number.
Section 10 - Status and Statistics LAN Info Path: Status > System Information > Device > LAN The LAN Information page summarizes the LAN settings including MAC address, IP address, and link state.
Section 10 - Status and Statistics WAN1 Path: Status > System Information > Device > WAN1 The WAN1 Information page summarizes the WAN1 port settings.
Section 10 - Status and Statistics WAN2 Path: Status > System Information > Device > WAN2 The WAN2 Information page summarizes the WAN2 port settings.
Section 10 - Status and Statistics WAN3 Path: Status > System Information > Device > WAN3 The WAN3 Information page summarizes the WAN3 settings.
Section 10 - Status and Statistics Wireless Path: Status > System Information > Device > Wireless The Wireless Information page displays traffic statistics for each enabled access point. This page will give a snapshot of how much traffic is being transmitted over each wireless link.
Section 10 - Status and Statistics All Logs Current Logs Path: Status > System Information > All Logs > Current Logs The Current Logs window displays configured log messages from the router as they appear. Each log will appear with a timestamp as determined by the router's configured time. If remote logging such as a Syslog server or e-mail logging is configured, the same logs are sent to the remote interface while being displayed here.
Section 10 - Status and Statistics Firewall Logs Path: Status > System Information > All Logs > Firewall Logs The Firewall Logs window displays configured firewall event messages from the router as they appear. Each log will appear with a timestamp as determined by the router's configured time. Click Clear All to remove all entries in the Display Logs screen or click Send Logs to send all logs in the Current Logs screen to preconfigured e-mail recipients.
Section 10 - Status and Statistics IPSec VPN Logs Path: Status > System Information > All Logs > IPSec VPN Logs The IPSec VPN Logs window displays IPSec VPN event messages from the router as they appear. Each log will appear with a timestamp as determined by the router's configured time. Click Clear All to remove all entries in the Display Logs screen or click Send Logs to send all logs in the Current Logs screen to preconfigured e-mail recipients.
Section 10 - Status and Statistics SSL VPN Logs Path: Status > System Information > All Logs > SSL VPN Logs The SSL VPN Logs window displays SSL VPN event messages from the router as they appear. Each log will appear with a timestamp as determined by the router's configured time. Click Clear All to remove all entries in the Display Logs screen or click Send Logs to send all logs in the Current Logs screen to preconfigured e-mail recipients.
Section 10 - Status and Statistics USB Status Path: Status > System Information > USB Status The USB Status page summarizes the USB devices connected to the router. You may connect USB printer and USB storage device directly to the router.
Section 10 - Status and Statistics Network Information DHCP Leased Clients Path: Status > Network Information > DHCP Clients Three separated tabs display a list of clients whom get IP leased from the router: LAN leased clients, IPv6 leased clients, and DMZ leased clients.
Section 10 - Status and Statistics Active Sessions Path: Status > Network Information > Active Sessions This table lists the active internet sessions through the router’s firewall. The session’s protocol, state, local, and remote IP addresses are shown.
Section 10 - Status and Statistics Active VPNs Path: Status > Network Information > Active VPNs You can view and change the status (connect or drop) of the router’s VPN associations/connections. Here, the active VPN associations/connections are listed along with the traffic details and tunnel state. The traffic is a cumulative measure of transmitted/received packets since the tunnel was established.
Section 10 - Status and Statistics Interface Statistics Path: Status > Network Information > Interfaces Statistics This page displays packet information on the LAN, VLAN, and WLAN interfaces.
Section 10 - Status and Statistics View Wireless Clients Path: Status > Network Information > Wireless Clients The clients connected to a particular AP can be viewed on this page. Connected clients are sorted by the MAC address and indicate the security parameters used by the wireless link, as well as the time connected to the corresponding AP. The statistics table has auto-refresh control which allows display of the most current port level data at each page refresh.
Section 10 - Status and Statistics Device Stats Path: Status > Network Information > Device Stats Detailed transmit and receive statistics for each physical port are presented here. Each interface (WAN1, WAN2/ DMZ, LAN, and VLANs) have port specific packet level information provided for review. Transmitted/received packets, port collisions, and the cumulating bytes/sec for transmit/receive directions are provided for each interface along with the port up time.
Section 10 - Status and Statistics Wireless Statistics Path: Status > Network Information > Wireless Statistics The Wireless Statistics page displays the incrementing traffic statistics for each enabled access point. This page will give a snapshot of how much traffic is being transmitted over each wireless link. If you suspect that a radio or VAP may be down, the details on this page would confirm if traffic is being sent and received through the VAP.
Section 10 - Status and Statistics View LAN Clients Path: Status > Network Information > LAN Clients The LAN clients to the router are identified by an ARP scan through the LAN switch. The NetBIOS name (if available), IP address, and MAC address of discovered LAN hosts are displayed.
Section 11 - Troubleshooting Troubleshooting Internet Connection Symptom: You cannot access the router’s web-configuration interface from a PC on your LAN. Recommended action: 1. Check the Ethernet connection between the PC and the router. 2. Ensure that your PC’s IP address is on the same subnet as the router. If you are using the recommended addressing scheme, your PC’s address should be in the range 192.168.10.2 to 192.168.10.254. 3. Check your PC’s IP address.
Section 11 - Troubleshooting Symptom: Router cannot obtain an IP address from the ISP. Recommended action: 1. Turn off power to the cable or DSL modem. 2. Turn off the router. 3. Wait five minutes, and then reapply power to the cable or DSL modem. 4. When the modem LEDs indicate that it has resynchronized with the ISP, reapply power to the router. If the router still cannot obtain an ISP address, see the next symptom. Symptom: Router still cannot obtain an IP address from the ISP. Recommended action: 1.
Section 11 - Troubleshooting Date and time Symptom: Date shown is January 1, 1970. Possible cause: The router has not yet successfully reached a network time server (NTS). Recommended action: 1. If you have just configured the router, wait at least five minutes, select Administration > Time Zone, and recheck the date and time. 2. Verify your Internet access settings. Symptom: Time is off by one hour. Possible cause: The router does not automatically adjust for Daylight Savings Time. Recommended action: 1.
Section 11 - Troubleshooting Pinging to Test LAN Connectivity Most TCP/IP terminal devices and firewalls contain a ping utility that sends an ICMP echo-request packet to the designated device. The DSR responds with an echo reply. Troubleshooting a TCP/IP network is made very easy by using the ping utility in your PC or workstation. Testing the LAN path from your PC to your router 1. From the PC’s Windows toolbar, Click Start and in the search box at the bottom, type cmd and press Enter. 2.
Section 11 - Troubleshooting Testing the LAN path from your PC to a remote device 1. From the PC’s Windows toolbar, Click Start and in the search box at the bottom, type cmd and press Enter. 2. Type ping -n 10 where -n 10 specifies a maximum of 10 tries and is the IP address of a remote device such as your ISP’s DNS server. Example: ping -n 10 10.1.1.1. 3. Press Enter and then observe the display (see the previous procedure). 4.
Section 11 - Troubleshooting Restoring factory-default configuration settings To restore factory-default configuration settings, do either of the following: 1. Do you know the account password and IP address? • If yes, select Maintenance > Firmware & Config > Soft Reboot and click Default. • If no, do the following: On the rear panel of the router, press and hold the Reset button about 10 seconds, until the test LED lights and then blinks. Release the button and wait for the router to reboot. 2.
Appendix A - Glossary Appendix A - Glossary ARP Address Resolution Protocol. Broadcast protocol for mapping IP addresses to MAC addresses. CHAP Challenge-Handshake Authentication Protocol. Protocol for authenticating users to an ISP. DDNS Dynamic DNS. System for updating domain names in real time. Allows a domain name to be assigned to a device with a dynamic IP address. DHCP Dynamic Host Configuration Protocol.
Appendix A - Glossary PPPoE Point-to-Point Protocol over Ethernet. Protocol for connecting a network of hosts to an ISP without the ISP having to manage the allocation of IP addresses. PPTP Point-to-Point Tunneling Protocol. Protocol for creation of VPNs for the secure transfer of data from remote clients to private servers over the Internet. RADIUS Remote Authentication Dial-In User Service. Protocol for remote user authentication and accounting.
Appendix B - Factory Default Settings Appendix B - Factory Default Settings Feature Description User Login URL Default Settings http://192.168.10.1 Device Login User Name admin Password admin WAN MAC Address Use default address Internet Connection Local Area Network (LAN) Firewall D-Link DSR-Series User Manual WAN MTU size 1500 Port Speed Autosense IP Address 192.168.10.1 IPv4 Subnet Mask 255.255.255.
Appendix C - Standard Services Available for Port Forwarding & Firewall Configuration Appendix C - Standard Services for Port Forwarding & Firewall Configuration • • • • • • • • • • • • • • • • • • • • • • • • • • • ANY AIM BGP BOOTP_CLIENT BOOTP_SERVER CU-SEEME:UDP CU-SEEME:TCP DNS:UDP DNS:TCP FINGER FTP HTTP HTTPS ICMP-TYPE-3 ICMP-TYPE-4 ICMP-TYPE-5 ICMP-TYPE-6 ICMP-TYPE-7 ICMP-TYPE-8 ICMP-TYPE-9 ICMP-TYPE-10 ICMP-TYPE-11 ICMP-TYPE-13 ICQ IMAP2 IMAP3 IRC D-Link DSR-Series User Manual • • • • • • • • •
Appendix D - Log Output Reference Appendix D - Log Output Reference Facility: System (Networking) Log Message Severity Log Message DEBUG networkIntable.txt not found DEBUG sqlite3QueryResGet failed DEBUG sqlite3QueryResGet failed.Query:%s ERROR Interface is already deleted in bridge DEBUG ddnsDisable failed ERROR removing %s from bridge %s... %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR adding %s to bridge %s... %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR stopping bridge...
Appendix D - Log Output Reference nimfAdvOptSetWrap: looks like we are reconnecting. “ DEBUG ddns: SQL error: %s ERROR nimfAdvOptSetWrap: Mtu Size: %d DEBUG ddnsDisable failed ERROR nimfAdvOptSetWrap: NIMF table is %s DEBUG ddns: SQL error: %s ERROR nimfAdvOptSetWrap:WAN_MODE TRIGGER DEBUG sqlite3QueryResGet failed.
Appendix D - Log Output Reference nimfMacGet: MacAddress: %s DEBUG failed to enable IPv6 forwarding ERROR nimfMacGet: MacAddress: %s DEBUG failed to set capabilities on the “ ERROR nimfMacGet: returning with status: %s DEBUG failed to enable IPv6 forwarding ERROR Now in enableing LanBridge function DEBUG failed to set capabilities on the “ ERROR sucessfully executed the command %s DEBUG failed to disable IPv6 forwarding ERROR Now in disableing LanBridge function DEBUG failed to set ca
Appendix D - Log Output Reference nimfAdvOptSetWrap: unable to get current Port “ nimfAdvOptSetWrap: unable to get current MTU Option nimfAdvOptSetWrap: error getting Mac Address from “ nimfAdvOptSetWrap: unable to get the MTU nimfAdvOptSetWrap: error setting interface advanced “ nimfAdvOptSetWrap: error getting MTU size nimfAdvOptSetWrap: unable to get Mac Address nimfAdvOptSetWrap: error setting interface advanced “ nimfAdvOptSetWrap: failed to get old connectiontype nimfAdvOptSetWrap: old connection type
Appendix D - Log Output Reference vlan disabled, not applying vlan configuration.. DEBUG disableLan function is failed to disable ConfigPort” ERROR failed query %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR failed query %s DEBUG sqlite3QueryResGet failed.Query:%s ERROR no ports present in this vlanId %d DEBUG Unable to Disable configurable port from ERROR failed query %s DEBUG configPortTblHandler has failed ERROR vlan disabled, not applying vlan configuration..
Appendix D - Log Output Reference DialNumber: %s DEBUG Failed to Open SSHD Configuration File ERROR Apn: %s DEBUG Ipaddress should be provided with accessoption 1 ERROR GetDnsFromIsp: %s DEBUG Subnetaddress should be provided with accessoption 2 ERROR IdleTimeOutFlag: %s DEBUG Failed to restart sshd ERROR IdleTimeOutValue: %d DEBUG unable to open the “ ERROR AuthMetho: %d DEBUG sqlite3QueryResGet failed.Query:%s ERROR executing %s ...
Appendix D - Log Output Reference Invalid oidp passed DEBUG Failed to enable vlan ERROR Failed to get oid from the tree DEBUG Failed to disable vlan ERROR threegEnable: Input to wrapper %s DEBUG Failed to set vlanPort table entries, while \ ERROR threegEnable: spawning command %s DEBUG Failed to enable vlan ERROR threegMgmtHandler: query string: %s DEBUG unknown vlan state ERROR threegMgmtHandler: returning with status: %s DEBUG Error in executing DB update handler ERROR adding to dh
Appendix D - Log Output Reference PID File for pptpd found DEBUG Error in executing DB update handler ERROR pid: %d DEBUG are we getting invoked twice ?? ERROR PID File for pptpd interface found DEBUG could not open %s to append ERROR pid: %d DEBUG could not write nameserver %s to %s ERROR options.pptpd file found DEBUG could not write nameserver %s to %s ERROR options.pptpd file not found DEBUG could not open %s to truncate ERROR Conf File for pptpd found DEBUG pptpd.
Appendix D - Log Output Reference pptpMgmtTblHandler: UserName: %s DEBUG writing Chap-secrets/Pap-Secrets failed ERROR pptpMgmtTblHandler: Password: %s DEBUG xl2tpdStop failed ERROR pptpMgmtTblHandler: dynamic MyIp configured DEBUG xl2tpdStart failed ERROR pptpMgmtTblHandler: MyIp: %s DEBUG sqlite3QueryResGet failed.
Appendix D - Log Output Reference l2tpMgmtTblHandler: Mtu: %d DEBUG pppoeMultipleEnableDisable: pppoe enable failed ERROR l2tpMgmtTblHandler: IspName: %s DEBUG pppoeMultipleEnableDisable: pppoe disable failed ERROR l2tpMgmtTblHandler: UserName: %s DEBUG pppoeMgmtTblHandler: unable to get current Mtu Option ERROR l2tpMgmtTblHandler: Password: %s DEBUG pppoeMgmtTblHandler: unable to get the Mtu ERROR l2tpMgmtTblHandler: AccountName: %s DEBUG pppoeMgmtTblHandler: pppoe enable failed ERROR
Appendix D - Log Output Reference Wan is not up or in load balencing mode WARN dhcpcReleaseLease: unable to release lease ERROR threegMgmtHandler: no row found. nRows = %d nCols = %d WARN dhcpcEnable: unable to kill dhclient ERROR pppoeMgmtDBUpdateHandler: empty update. WARN dhcpcEnable: enabling dhcpc failed on: %s ERROR dhcpcEnable: dhclient already running on: %s WARN dhcpcDisable: unable to kill dhclient ERROR dhcpcDisable: deleted dhclient.
Appendix D - Log Output Reference Facility: System (VPN) Log Message Severity Log Message Severity %d command not supported by eapAuth DEBUG PEAP key derive: ERROR ERROR pCtx NULL. DEBUG PEAP context is NULL: ERROR ERROR Current cert subject name= %s DEBUG Constructing P2 response: ERROR ERROR X509_STORE_CTX_get_ex_data failed. DEBUG innerEapRecv is NULL: ERROR ERROR Cannot get cipher, no session est.
Appendix D - Log Output Reference Setting version %d DEBUG Processing PEAP message: ERROR ERROR PEAP pkt rcvd: data len=(%d) flags=(%d) version=(%d) DEBUG Processing PEAP message: ERROR ERROR Got PEAP/Start packet.
Appendix D - Log Output Reference Deleted EAP/TTLS context: OK DEBUG AVP code not recognized ERROR No more fragments in message. ERROR DEBUG EAPAUTH_MALLOC failed. ERROR Upper EAP sent us: method state = %d; decision = %d DEBUG Converting password to unicode: Error ERROR P2: sending fragment. DEBUG Generating password hash: Error. ERROR P2 send unfragmented message. DEBUG Generating password hash hash: Error. ERROR P1: sending fragment. DEBUG Generating master key: Error.
Appendix D - Log Output Reference %d authentication not enabled in the system. Initializing inner non-EAP auth plugin: ERROR Error calculating binary. DEBUG adpDigestInit for SHA1 failed. DEBUG adpDigestInit for SHA1 failed. DEBUG E = %d DEBUG R = %d DEBUG Could not initialize des-ecb DEBUG adpDigestInit for MD4 failed. DEBUG adpDigestInit for SHA1 failed. DEBUG adpDigestInit for SHA1 failed. DEBUG innerEapRecv is NULL: ERROR. ERROR Error converting received auth reponse to bin.
Appendix D - Log Output Reference Stripped username=(%s) DEBUG profile %s already exists. ERROR digestLen = %d. DEBUG EAPAUTH_MALLOC failed ERROR ClearText = DEBUG User not found. ERROR CipherText = DEBUG EAP-MD5 not enabled in system configuration. ERROR digestLen = %d. DEBUG EAP-MSCHAPV2 not enabled in system configuration. ERROR digestLen1 = %d. DEBUG EAP-TLS not enabled in system configuration. ERROR digestLen2 = %d. DEBUG EAP-TTLS not enabled in system configuration.
Appendix D - Log Output Reference BIO_new_mem_buf failed. ERROR Error initializing digest context. ERROR malloc failed. ERROR Error initializing DES in Klite ERROR BIO_new_mem_buf failed. ERROR Error initializing MD4 in Klite ERROR ERROR Error initializing RC4 in Klite ERROR ERROR Error initializing SHA in Klite ERROR ERROR Error cleaning cipher context. ERROR ERROR Error destroying cipher context. ERROR ERROR Error cleaning digest context.
Appendix D - Log Output Reference Process operation failed ERROR Couldn’t execute command ERROR state machine is in invalid state. ERROR Memory allocation failed ERROR Packet length mismatch %d, %d ERROR Memory allocation failed ERROR eapAuthTypeToType: Invalid eapAuthType %d ERROR invalid certificate data ERROR eapTypeToAuthType: Invalid eapType %d ERROR .Query:%s ERROR unable to create method context. ERROR .Query:%s ERROR method ctxCreate failed.
Appendix D - Log Output Reference Facility: System (Admin) Log Message Severity Log Message Severity Usage:%s DEBUG unable to register to UMI ERROR Could not open database: %s DEBUG sqlite3QueryResGet failed ERROR CPU LOG File not found DEBUG radSendtoServer: socket: %s ERROR MEM LOG File not found DEBUG radSendtoServer: bind() Failed: %s: %s ERROR cpuMemUsageDBUpdateHandler: update query: %s DEBUG Printing the whole list after inserting DEBUG %s at %d(minute) %d(hour) %d(da
Appendix D - Log Output Reference Verified Message-Authenticator DEBUG radGetIPByName: couldn’t resolve hostname: %s ERROR Unloaded RADIUS Dictionary DEBUG radGetHostIP: couldn’t get hostname ERROR Adding Dictionary Attribute %s DEBUG radGetHostIP: couldn’t get host IP address ERROR Adding Dictionary Value %s DEBUG RADIUS dictionary loading failed ERROR Loaded Dictionary %s DEBUG Failed to set default timeout value ERROR Adding Dictionary Attribute ‘%s’ DEBUG Failed to set default retr
Appendix D - Log Output Reference Releasing Packet and cookie:%p DEBUG Invalid arguments to ioctl handler ERROR Releasing Packet with cookie:%p DEBUG radEapSendRtn: Invalid Arguments ERROR Received EAP-Identity from Pnac: %s DEBUG radEapSendRtn: failed to allocate buffer ERROR Filling User-Name: %s DEBUG umiIoctl failed ERROR Filling State: DEBUG failed to initialize EAP message queue ERROR Filling EAP-Message: DEBUG Unable to set debug for radEap.
Appendix D - Log Output Reference Could not read data from file DEBUG Unable to initialize ntpControl ERROR ntpTblHandler DEBUG ntpMgmt : Couldn’t open database %s ERROR status: %d DEBUG ERROR : incomplete DB update information ERROR tz: %d DEBUG empty update.
Appendix D - Log Output Reference Query string: %s DEBUG Failed to enable printer properly ERROR sqlite3QueryResGet failed.Query:%s DEBUG Failed to mount device on system ERROR %s: 1. usb is already disconnected for old usb type. “ DEBUG Failed to enable network storage device” ERROR %s: 2.call disable for new usb type ! DEBUG Failed to mount device on system ERROR %s: 3. usb is already disconnected for old usb type. “ DEBUG Sqlite update failed ERROR %s: 4. Disabled old usb type .
Appendix D - Log Output Reference adpListNodeRemove : Returned with an error ERROR Failed to write access control entries ERROR command too long. Try increasing “ ERROR Failed to write snmpv3 users entries ERROR failed to allocate memory for CRON_NODE ERROR Failed to write snmp trap entries ERROR sqlite3QueryResGet failed ERROR Failed to write system entries. ERROR There was an error while reading the schedules.
Appendix D - Log Output Reference Facility: System (Firewall) Log Message Severity Log Message Severity Enabling rule for protocol binding. DEBUG Disable all NAT rules. DEBUG Disabling rule for protocol binding. DEBUG Enable all NAT rules. DEBUG Enabling Remote SNMP on WAN. DEBUG Enabling NAT URL filter rules. DEBUG Disabling Remote SNMP on WAN DEBUG Restarting all NAT rules. DEBUG wan traffic counters are restared DEBUG Deleting schedule based firewall rules.
Appendix D - Log Output Reference prerouting Firewall Rule add for Relay failed Deleting MAC Filter Policy for Address %s Disabling attack check for TCP Flood. DEBUG Disabling attack check for UDP Flood. DEBUG Disabling attack check for IPsec. DEBUG Adding MAC Filter Policy for Address %s DEBUG Disabling attack check for PPTP. DEBUG Disabling Firewall Rules for DMZ host DEBUG Disabling attack check for L2TP.
Appendix D - Log Output Reference Adding IP/MAC binding rule for %s MAC address “ Deleting IP/MAC binding rule for %s MAC “ ./src/firewall/linux/user/ firewalld.c:60:#undef ADP_DEBUG ./src/firewall/linux/user/ firewalld.
Appendix D - Log Output Reference Deleting rule, port triggering for protocol TCP. Deleting rule, port triggering for protocol UDP. Deleting rule, port triggering for protocol TCP. Deleting rule, port triggering for protocol UDP. Enabling rule, port triggering for protocol TCP. Enabling rule, port triggering for protocol UDP. Enabling rule, port triggering for protocol TCP. Enabling rule, port triggering for protocol UDP. DEBUG Setting transparent mode for pLogicalIfName \ DEBUG DEBUG Enabling Accept f
Appendix D - Log Output Reference Restarting Firewall For %s Address Update from %s:%s Disabling Firewall Rule for MSS packet marking Enabling Firewall Rule for MSS packet marking Enabling packet marking rule for %s IDLE timer Deleted firewall rule %s for service %s with action %s %s firewall rule %s for service %s with action %s Added firewall rule %s for service %s with action %s DEBUG nimfBridgeTblHandler: unable to get interfaceName ERROR DEBUG nimfBridgeTblHandler: \ ERROR DEBUG nimfBridgeTblHa
Appendix D - Log Output Reference Facility: Local0 (Wireless) Log Message Severity Log Message Severity (node=%s) setting %s to val = %d DEBUG sqlite3QueryResGet failed ERROR Custom wireless event: ‘%s’ DEBUG sqlite3QueryResGet failed ERROR Wireless event: cmd=0x%x len=%d DEBUG VAP(%s) set beacon interval failed ERROR DEBUG VAP(%s) set DTIM interval failed ERROR DEBUG VAP(%s) set RTS Threshold failed ERROR ran query %s DEBUG VAP(%s) set Fragmentation Threshold failed ERROR DBUpdate
Appendix D - Log Output Reference node not found *:*:*:%x:%x:%x DEBUG Interface name and policy must be specified ERROR error installing unicast key for %s DEBUG invalid ACL type %d ERROR cmd =%d i_type =%d i_val=%d DEBUG interface name not specified ERROR join event for new node %s DEBUG interface name not specified ERROR wpa/rsn IE id %d/%d not supported DEBUG Invalid interface - %s specified ERROR wpa IE id %d not supported DEBUG buffer length not specified ERROR leave event for n
Appendix D - Log Output Reference eapolRecvKeyMsg: replay counter not incremented DEBUG IAPP-CACHE-NOTIFY-REQUEST send to ERROR eapolRecvKeyMsg: replay counter is not same DEBUG ./src/dot11/iapp/iappLib.
Appendix D - Log Output Reference failed to send PNAC_FORCE_AUTHORIZED “ DEBUG unable to get %s mac address ERROR failed to send PNAC_AUTHORIZED “ DEBUG Failed to set %s SSID ERROR DEBUG Failed to set SSID broadcast status ERROR DEBUG Failed to set PreAuth mode ERROR DEBUG unable to install key ERROR failed to send PNAC_VAR_KEY_AVAILABLE (TRUE) “ failed to send PNAC_VAR_KEY_TX_EN (TRUE) “ failed to send PNAC_VAR_KEY_TX_EN (FALSE) “ failed to send PNAC_FORCE_AUTHORIZED “ DEBUG KDOT11_SET_P
Appendix D - Log Output Reference state changed from %s to %s DEBUG PNAC user comp id not set.
Appendix D - Log Output Reference from pnacPDUProcess: code = %d, identifier = %d, “ DEBUG from pnacPDUProcess: setting rxResp true DEBUG from pnacPDUProcess: code = %d, identifier = %d, “ DEBUG from pnacPDUProcess: received “ DEBUG from pnacPDUProcess: received “ DEBUG from pnacPDUProcess: received PNAC_ EAPOL_KEY_PACKET DEBUG doing pnacTxCannedFail DEBUG doing pnacTxCannedSuccess DEBUG doing pnacTxReqId DEBUG doing pnacTxReq DEBUG doing pnacTxStart DEBUG doing pnacTxLogoff DEBUG do
Appendix D - Log Output Reference Supplicant[%d]: DEBUG could not initialize AES-128-ECB ERROR Supp Pae state = %s DEBUG MD5 initialization failed ERROR from pnacBackAuthFail: calling pnacTxCannedFail DEBUG RC4 framework initialization failed ERROR %s returned ERROR DEBUG PNAC framework initialization failed ERROR pnacUmiIoctlHandler: cmd: %s(%d) DEBUG ERROR: option value not specified ERROR %s not configured for 802.
Appendix D - Log Output Reference PMKSA refcount not 1 WARN Error from pnacRadXlateASAdd: cannot open socket ERROR IV verification failednknown subtype> WARN Error from pnacRadXlateDemoRecv: received null EAP pkt ERROR pnacIfConfig: overwriting previous interface “ WARN From pnacRadXlateDemoRecv: send “ ERROR pnacIfConfig: overwriting previous “ WARN Error from pnacRadXlateDemoRecv: RADIUS “ ERROR pnacIfConfig: overwriting previous username” WARN pnacIfConfig: overwriting previous passwor
Appendix D - Log Output Reference pnacPhyPortParamSet: device invalid %s%d pnacPhyPortParamSet: EIOCGADDR ioctl failed pnacPhyPortParamSet: multicast addr add ioctl failed pnacPhyPortParamUnset: multicast addr del ioctl failed Recd IE data for non-existent AP %s ERROR Recd WSC Start command without interface name ERROR Recd WSC start for non-existent AP %s ERROR Recd WSC start for wrong AP %s ERROR Unable to send WSC_WLAN_CMD_PORT to WSC ERROR pnacPDUXmit: Invalid arguments ERROR Failed to get
Appendix D - Log Output Reference Profile %s does not exist ERROR kpnacPortPaeConfig failed ERROR Profile %s does not exist ERROR Invalid arguments ERROR Profile %s does not exist ERROR Profile %s does not exist ERROR Profile %s does not exist ERROR SSID not set.
Appendix D - Log Output Reference Error from pnacTxCannedSuccess: eap pkt create failed Error from pnacTxReqId: eap pkt create failed Error from pnacTxReq: eap pkt create failed Error from pnacSendRespToServer: malloc failed Error from pnacSendRespToServer: no AS configured Error from pnacTxStart: basic pkt create failed Error from pnacTxStart: basic pkt create failed Error from pnacTxRspId: eap pkt create failed Error from pnacTxRspAuth: eap pkt create failed Error from pnacEapPktRecord: EAP packet too” P
Appendix D - Log Output Reference pnacUmiSuppConfig: Invalid config data pnacUmiSuppConfig: Invalid backend name specified pnacUmiSuppConfig: %s not configured for 802.
Appendix D - Log Output Reference %s%d: bad sequence number: %d, expected: %d, DEBUG TKIP DEBUG PPPIOCDETACH file->f_count=%d, DEBUG %s: cannot map channel to mode; freq %u flags 0x%x, DEBUG PPP: outbound frame not passed DEBUG %s: %s, vap->iv_dev->name, buf DEBUG PPP: VJ decompression error DEBUG %s: [%s] %s, vap->iv_dev->name, DEBUG PPP: inbound frame not passed DEBUG PPP: reconstructed packet DEBUG PPP: no memory for DEBUG missed pkts %u..
Appendix D - Log Output Reference DEBUG %s: no memory for new proc entry (%s)!, __func__, %s: 0x%p len %u, tag, p, len DEBUG %03d:, i DEBUG PPPOL2TP: --> %s, __FUNCTION__) DEBUG %02x, ((u_int8_t *)p)[i] DEBUG PPPOL2TP: <-- %s, __FUNCTION__) DEBUG first difference at byte %u, i DEBUG %s: recv: , tunnel->name DEBUG %s: , t->name DEBUG %s: xmit:, session->name DEBUG FAIL: ieee80211_crypto_newkey failed DEBUG %s: xmit:, session->name DEBUG FAIL: ieee80211_crypto_setkey failed DEBUG PPP
Appendix D - Log Output Reference IRQ 32 is triggered DEBUG FAIL: encap data length mismatch DEBUG ip_finish_output2: No header cache and no neighbour! DEBUG FAIL: encrypt data does not compare DEBUG a guy asks for address mask.
Appendix D - Log Output Reference UDP: bad checksum. From %d.%d.%d.%d:%d to %d.%d.%d.%d:%d ulen %d, DEBUG ath_hal: logging to %s %s, ath_hal_ logfile, DEBUG a guy asks for address mask. Who is it? DEBUG ath_hal: logging disabled DEBUG fib_add_ifaddr: bug: prim == NULL DEBUG %s%s, sep, ath_hal_buildopts[i] DEBUG fib_del_ifaddr: bug: prim == NULL DEBUG ath_pci: No devices found, driver not installed.
Appendix D - Log Output Reference ip_rt_bug: %u.%u.%u.%u -> %u.%u.%u.%u, %s, DEBUG txmic DEBUG UDP: short packet: From %u.%u.%u.%u:%u %d/%d to %u.%u.%u.%u:%u, DEBUG %02x, hk->kv_txmic[i] DEBUG UDP: bad checksum. From %d.%d.%d.%d:%d to %d.%d.%d.%d:%d ulen %d, DEBUG %s: unable to update h/w beacon queue parameters, DEBUG REJECT: ECHOREPLY no longer supported.
Appendix D - Log Output Reference ip_conntrack_rtsp: max_outstanding must be a positive integer DEBUG %s: unable to collect channel list from HAL; DEBUG ip_conntrack_rtsp: setup_timeout must be a positive integer DEBUG R (%p %llx) %08x %08x %08x %08x %08x %08x %c, DEBUG ip_conntrack_rtsp: ERROR registering port %d, ports[i] DEBUG T (%p %llx) %08x %08x %08x %08x %08x %08x %08x %08x %c, DEBUG ip_nat_rtsp v IP_NF_RTSP_VERSION loading DEBUG %s: no memory for sysctl table!, __func__ DEBUG %s: Sor
Appendix D - Log Output Reference netfilter PSD unloaded - (c) astaro AG DEBUG algExceptionHandler: Exception! DEBUG %s , SELF DEBUG dnsExceptionHandler: Exception! DEBUG %s , LAN DEBUG IPsecExceptionHandler: Exception! DEBUG %s , WAN DEBUG ESP Packet Src:%x Dest:%x Sport:%d dport:%d secure:%d spi:%d isr:%p, DEBUG TRUNCATED DEBUG xlr8NatConntrackPreHook: We found the valid context, DEBUG SRC=%u.%u.%u.%u DST=%u.%u.%u.%u , DEBUG xlr8NatConntrackPreHook: Not a secured packet.
Appendix D - Log Output Reference PARAMETER=%u , DEBUG GATEWAY=%u.%u.%u.%u , DEBUG MTU=%u , ntohs(ich->un.frag.mtu) DEBUG PROTO=AH DEBUG INCOMPLETE [%u bytes] , DEBUG SPI=0x%x , ntohl(ah->spi) DEBUG PROTO=ESP INCOMPLETE [%u bytes] , SPI=0x%x , ntohl(eh->spi) PROTO=%u , ih->protocol UID=%u , skb->sk->sk_socket->file->f_uid <%d>%sIN=%s OUT=%s , loginfo->u.log.
Appendix D - Log Output Reference DEBUG DEBUG MPPE/MPPC encryption/compression module unregistered PPP generic driver version PPP_ VERSION MPPE/MPPC encryption/compression module registered MPPE/MPPC encryption/compression module unregistered PPP generic driver version PPP_ VERSION PPPoL2TP kernel driver, %s, PPPoL2TP kernel driver, %s, DEBUG PPPoL2TP kernel driver, %s, INFO DEBUG DEBUG failed to create procfs entry . proc dir not created ..
Appendix D - Log Output Reference kmalloc failed DEBUG %s: %s: mem=0x%lx, irq=%d, INFO unknown cyrpto ioctl cmd received %x, cmd DEBUG %s: %s: mem=0x%lx, irq=%d, INFO register_chrdev returned ZERO DEBUG %s: %s, dev_info, version INFO const char *descr, krb5_keyblock *k) { DEBUG %s: driver unloaded, dev_info INFO F password, &pdata DEBUG %s, buf INFO test key, key DEBUG %s: %s (, dev_info, ath_hal_version INFO pre-hashed key, key DEBUG %s: driver unloaded, dev_info INFO const cha
Appendix D - Log Output Reference 3.
Appendix D - Log Output Reference Wrong address mask %u.%u.%u.%u from Redirect from %u.%u.%u.%u on %s about source route option ICMP: %u.%u.%u.%u: ICMP: %u.%u.%u.%u: Source Wrong address mask %u.%u.%u.%u from Redirect from %u.%u.%u.%u on %s about IP: routing cache hash table of %u buckets, %ldKbytes, source route option %u.%u.%u.%u -> %u.%u.%u.
Appendix D - Log Output Reference DES Hardware Test Duration: %d:%d, SHA Software Test: %d iterations, iter SHA Software Test Duration: %d:%d, SHA Hardware Test: %d iterations, iter SHA Hardware Test Duration: %d:%d, MD5 Software Test: %d iterations, iter MD5 Software Test Duration: %d:%d, MD5 Hardware Test: %d iterations, iter DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING DEBUG try_module_get failed try_module_get failed \ %s: unknown pa
Appendix D - Log Output Reference usage: rtparams rt_idx <0|1> per <0..100> probe_intval <0..100> DEBUG host %u.%u.%u.%u/if%d ignores WARNING usage: acparams ac <0|3> RTS <0|1> aggr scaling <0..4> min mbps <0..250> DEBUG martian source %u.%u.%u.%u from WARNING usage: hbrparams ac <2> enable <0|1> per_low <0..50> DEBUG ll header: WARNING %s(): ADDBA mode is AUTO, __func__ DEBUG martian destination %u.%u.%u.%u from WARNING %s(): Invalid TID value, __func__ DEBUG %u.%u.%u.
Appendix D - Log Output Reference [%s:%s] discard frame, %s, vap->iv_dev->name, DEBUG %s%d: trying to write outside history ERROR [%s:%s] discard %s information element, %s, DEBUG %s%d: trying to write outside history ERROR [%s:%s] discard information element, %s, DEBUG %s%d: trying to write outside history ERROR [%s:%s] discard %s frame, %s, vap->iv_dev>name, DEBUG [%s:%s] discard frame, %s, vap->iv_dev->name, DEBUG HBR list dumpNode\tAddress\t\t\tState\tTrigger\ tBlock Nodes informationAdd
Appendix D - Log Output Reference %s: %s, dev->name, buf DEBUG %s: cannot allocate space for SHA1 digest, fname ERROR %s: no memory for sysctl table!, __func__ DEBUG %s%d: trying to write outside history ERROR %s: failed to register sysctls!, vap->iv_dev->name DEBUG %s%d: trying to write outside history ERROR Atheros HAL assertion failure: %s: line %u: %s, DEBUG %s%d: trying to write outside history ERROR ath_hal: logging to %s %s, ath_hal_logfile, DEBUG %s%d: too big uncompressed packet:
Appendix D - Log Output Reference Logging should be disabled before changing bufer size DEBUG JBD: Failed to read block at offset %u, ERROR %s:allocation failed for pl_info, __func__ DEBUG JBD: error %d scanning journal, err ERROR %s: Unable to allocate buffer, __func__ DEBUG JBD: IO error %d recovering block ERROR %s:allocation failed for pl_info, __func__ DEBUG ./Logs_kernel.txt:303:KERN_ERR ERROR %s: Unable to allocate buffer, __func__ DEBUG ./Logs_kernel.
Appendix D - Log Output Reference rx FIFO overrun; reseting DEBUG addr family wrong: %d, usin->sin_ family ERROR %s: During Wow Sleep and got BMISS, __func__ DEBUG udp addr=%x/%hu, usin->sin_addr.s_ addr, usin->sin_port ERROR AC\tRTS \tAggr Scaling\tMin Rate(Kbps)\tHBR \ tPER LOW THRESHOLD DEBUG %s: %s:%d: BAD TUNNEL MAGIC ERROR BE\t%s\t\t%d\t%6d\t\t%s\t%d, DEBUG %s: %s:%d: BAD TUNNEL MAGIC ERROR BK\t%s\t\t%d\t%6d\t\t%s\t%d, DEBUG socki_lookup: socket file changed! ERROR VI\t%s\t\t%d\t%6
Appendix D - Log Output Reference Radar found on channel %d (%d MHz), DEBUG %03d:, i ERROR End of DFS wait period DEBUG %02x, ((unsigned char *)p)[i] ERROR %s error allocating beacon, __func__ DEBUG mic check failed ERROR failed to allocate UAPSD QoS NULL tx descriptors: %d, error DEBUG [%s] Wrong parameters, __func__ ERROR failed to allocate UAPSD QoS NULL wbuf DEBUG [%s] Wrong Key length, __func__ ERROR %s: unable to allocate channel table, __func__ DEBUG [%s] Wrong parameters, __fun
Appendix D - Log Output Reference Pattern added already DEBUG ERROR Error : All the %d pattern are in use.
Appendix D - Log Output Reference %s: unable to reset hardware; hal status %u, __func__, status DEBUG ****ASSERTION HIT**** DEBUG MacAddr=%s, DEBUG TxBufIdx=%d, i DEBUG Tid=%d, tidno DEBUG AthBuf=%p, tid->tx_buf[i] DEBUG %s: unable to reset hardware; hal status %u, DEBUG %s: unable to reset hardware; hal status %u, DEBUG %s: unable to start recv logic, DEBUG _fmt, __VA_ARGS__ \ DEBUG sample_pri=%d is a multiple of refpri=%d, sample_pri, refpri DEBUG ===========ft->ft_ numfilters=%u====
Appendix D - Log Output Reference mac 00-00-00-00-00-00 DEBUG FAST PATH Breaks on MAX PACKET %d %d,bufMgrLen(pBufMgr),IP_MAX_ PACKET CRITICAL %02x, hk->kv_mic[i] DEBUG SAV CHECK FAILED IN ENCRYPTION CRITICAL txmic DEBUG Match Found proto %d spi %d,pPktInfo->proto,pFlowEntry->pre. spi CRITICAL %02x, hk->kv_txmic[i] DEBUG PRE: proto: %u srcip:%u.%u.%u.%u sport :%u dstip: %u.%u.%u.%u dport: %u, CRITICAL Cannot support setting tx and rx keys individually DEBUG POST: proto: %u srcip:%u.%u.%u.
Appendix E - RJ-45 Pin-outs Appendix E - RJ-45 Pin-outs Signal CTS DTR TxD GND GND RxD DSR RTS D-Link DSR-Series User Manual RJ-45 Cable RJ-45 PIN NC NC 6 5 4 3 NC NC Adapter DB-9 PIN NC NC 3 5 5 2 NC NC Signal NC NC RxD GND GND TxD NC NC 295
Appendix F - New Wi Fi Frequency table ( New appendix section ) Appendix F - New Wi Fi Frequency table ( New appendix section ) Channel supported in20 Mhz Country 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) Australia Russia Iceland Singapore Sweden Taiwan Finland Slovenia Ireland United states D-Link DSR-Series User Manual Channel supported in 40 Mhz Upper side band Lower side band 2.
Appendix F - New Wi Fi Frequency table ( New appendix section ) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) Latin America Denmark Germany Netherlands Norway Poland Luxembourg South Africa United Kingdom Ireland France Israel Korea 2.4Ghz 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13 5, 6, 7, 8, 9, 10, 11, 12, 13 1, 2, 3, 4, 5, 6, 7, 8, 9 5 Ghz 36, 40, 44, 48, 149, 153, 157, 161, 165 40, 48, 153, 161 36, 44, 149, 157 2.
Appendix F - New Wi Fi Frequency table ( New appendix section ) 27) 28) Canada China D-Link DSR-Series User Manual 5 Ghz 36, 40, 44, 48, 149, 153, 157, 161, 165 40, 48, 153, 161 36, 44, 149, 157 2.4Ghz 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 5, 6, 7, 8, 9, 10, 11 1, 2, 3, 4, 5, 6, 7 5 Ghz 36, 40, 44, 48, 149, 153, 157, 161, 165 40, 48, 153, 161 36, 44, 149, 157 2.
Appendix G - Product Statement Appendix G - Product Statement 1. DSR-1000N Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix G - Product Statement Canadian Department of Communications Industry Canada (IC) Notice CAN ICES-3(B)/NMB-3(B) Industry Canada Statement This device complies with Industry Canada licence-exempt RSS standard(s). Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device.
Appendix G - Product Statement This device is a 2.4 GHz wideband transmission system (transceiver), intended for use in all EU member states and EFTA countries under the following conditions and/or with the following restrictions: - In Italy the end-user should apply for a license at the national spectrum authorities in order to obtain authorization to use the device for setting up outdoor radio links and/or for supplying public access to telecommunications and/or network services.
Appendix G - Product Statement Česky [Czech] [D-Link Corporation] tímto prohlašuje, že tento [DSR-1000N] je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES. Dansk [Danish] Undertegnede [D-Link Corporation] erklærer herved, at følgende udstyr [DSR-1000N] overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF.
Appendix G - Product Statement Português [Portuguese] [D-Link Corporation] declara que este [DSR-1000N]está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE. Slovensko [Slovenian] [D-Link Corporation] izjavlja, da je ta [DSR-1000N] v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/ES. Slovensky [Slovak] [D-Link Corporation] týmto vyhlasuje, že [DSR-1000N] spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES.
Appendix G - Product Statement 2.DSR-500N Federal Communications Commission (FCC) Compliance Notice: Radio Frequency Notice This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix G - Product Statement Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: 1) This device may not cause harmful interference, and 2) This device must accept any interference received, including interference that may cause undesired operation. IMPORTANT NOTE: Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment.
Appendix G - Product Statement Česky [Czech] [D-Link Corporation] tímto prohlašuje, že tento [DSR-500N] je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/ES. Dansk [Danish] Undertegnede [D-Link Corporation] erklærer herved, at følgende udstyr [DSR-500N] overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF.
Appendix G - Product Statement Português [Portuguese] Slovensko [Slovenian] Slovensky [Slovak] [D-Link Corporation] declara que este [DSR-500N]está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/CE. [D-Link Corporation] izjavlja, da je ta [DSR-500N] v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/ES. [D-Link Corporation] týmto vyhlasuje, že [DSR-500N] spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/ES.
Appendix G - Product Statement 3.DSR-250N Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix G - Product Statement EC), Low-voltage Directive (2006/95/EC), the procedures given in European Council Directive 99/5/EC and 2004/104/EC. The equipment was passed. The test was performed according to the following European standards: EN 300 328 V.1.7.1 EN 301 489-1 V.1. 8.1 / EN 301 489-17 V.2.1.1 EN 62311 EN 60950-1 Regulatory statement (R&TTE) European standards dictate maximum radiated transmit power of 100mW EIRP and frequency range 2.4002.
Appendix G - Product Statement Radiation Exposure Statement: The device meets the exemption from the routine evaluation limits in section 2.5 of RSS 102 and compliance with RSS-102 RF exposure, users can obtain Canadian information on RF exposure and compliance. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. This equipment should be installed and operated with a minimum distance of 20 centimeters between the radiator and your body.
Appendix G - Product Statement 4. DSR-150N Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix G - Product Statement EN 60950-1: Safety of Information Technology Equipment EN50385 : (2002-08) Product standard to demonstrate the compliance of radio base stations and fixed terminal stations for wireless telecommunication systems with the basic restrictions or the reference levels related to human exposure to radio frequency electromagnetic fields (110MHz - 40 GHz) - General public EN 300 328 V1.7.
Appendix G - Product Statement Česky [Czech] Dansk [Danish] Deutsch [German] Eesti [Estonian] English Español [Spanish] Ελληνική [Greek] Français [French] Italiano [Italian] Latviski [Latvian] Lietuvių [Lithuanian] Nederlands [Dutch] Malti [Maltese] Magyar [Hungarian] Polski [Polish] Português [Portuguese] Slovensko [Slovenian] Slovensky [Slovak] Suomi [Finnish] Svenska [Swedish] [Jméno výrobce] tímto prohlašuje, že tento [typ zařízení] je ve shodě se základními požadavky a dalšími příslušnými ustanoveními
Appendix G - Product Statement Industry Canada statement: This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) This device must accept any interference received, including interference that may cause undesired operation. Ce dispositif est conforme à la norme CNR-210 d’Industrie Canada applicable aux appareils radio exempts de licence.
Appendix G - Product Statement 5.DSR-500AC Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix G - Product Statement Caution: (i) the device for operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems; Avertissement: (i) les dispositifs fonctionnant dans la bande 5150-5250 MHz sont réservés uniquement pour une utilisation à l’intérieur afin de réduire les risques de brouillage préjudiciable aux systèmes de satellites mobiles utilisant les mêmes canaux; Radiation Exposure Statement: This equipment compl
Appendix G - Product Statement 6.DSR-1000AC Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix G - Product Statement Caution: (i) the device for operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to co-channel mobile satellite systems; Avertissement: (i) les dispositifs fonctionnant dans la bande 5150-5250 MHz sont réservés uniquement pour une utilisation à l’intérieur afin de réduire les risques de brouillage préjudiciable aux systèmes de satellites mobiles utilisant les mêmes canaux; Radiation Exposure Statement: This equipment compl