Problem Upgrading Router Firmware on MI424WR-GEN3I

Having trouble updating my router firmware.  Current version says:  40.21.18.  Status says: OK.  However, it says this below:
" Internet Version:  Old Wireless Broadband Router version 40.21.10.3 found?
Does this mean anything?  I'm wondering if the firmware is still not upgraded.  Any thoughts on this?  Did my firmware upgrade?  

Your configuration indicates you do indeed have the latest firmware version installed.  The Internet version is what is available to restore to a previous version, should you ever have the need to do so.
You can see how this would work (without actually activating it) by clicking on Advanced > Firmware Restore.  It will show you what your current version is and the previous version that's avialable to restore to.
Once you've taken a look, click on Cancel  to avoid actually reverting to the older version.

Similar Messages

  • Problem mounting network drive after upgrading router firmware

    Hi guys,
    It's been a while since I last posted a question of my own here, but I'm at my wits end. As I may have mentioned, I live in France, and my ISP is Free (no, not free, Free...). I've got what they call a "box" here, i.e. a sort of super-modem that will let you connect to the Internet via xDSL (and soon VDSL2), receive hundreds of TV channels, read BluRay discs, store files (videos, music, photos, what have you) on a integrated NAS, place and receive phone calls, whether via a landline (DECT) or, since recently, through a femtocell.
    All in all, the package is impressive and works flawlessly. But...
    (Of course, there had to be a "but)
    ... Yesterday, I let my "box" (it's called a Freebox Revolution, or Freebox V6--for Version 6--by the way) upgrade its firmware, reboot as it always does in such circumstances, and  since that,  the NAS won't mount in the Finder the way it used to under the Shared left pane.
    Now, every time I reboot my Mac, I have to open a browser windows and type "smb://mafreebox.freebox.fr" in order mount the NAS in the Finder. I've saved the credentials (login, no password) in the keychain, hoping it would help, but it doesn't. I've got a PC running Windows 8.1 Preview at the moment, and created a shortcut to the NAS on the Desktop. Guess what? I double-click on the shortcut, and sure enough, I can access the content of the NAS from Windows, but not from the Mac.
    I must add that I haven't changed anything on the Mac since, or before, upgrading the "box" firmware.
    Any ideas?

    OK, you must think I'm going bananas, but my issue is gone... For now...
    Seriously, what do you guys think about this problem with network drives mounting or not, depending on, I don't know, the weather, maybe?

  • Can't upgrade router firmware

    I want to upgrade the firmware in my BEFW11s4 v4.  Have already downloaded the file but when I click upgrade the page goes blank and nothing happens.  What am I doing wrong?

    i think firmware has been upgraded on the router... logon to router's setup page and click on the status and check whether the latest firnmware is installed or not, if you you found old firmware on the router try upgrading firmware using tftp utility...go to ftp.linksys.com/pub/network and download tftp.exe file and try upgrading firmware check whether it makes any difference or not.

  • Fios Router Actionec MI424WR-GEN3 REV I Firmware version 40.20.1 download

    Where can I download the firmware version 40.20.1 for Fios Router Actionec MI424WR-GEN3 REV I
    Thanks

    walt178 wrote:Nhan wrote:
    Where can I download the firmware version 40.20.1 for Fios Router Actionec MI424WR-GEN3 REV I ...
    Login into your router, go to Advanced, on the upper right is an option for Firmware upgrade.
    To login into your router: 
    the address is  192.168.1.1
    username and password are on the router label ... 
    A caution: others (myself included) have reported that the firmware update available at ...
    https://upgrade.actiontec.com
    ... is not necessarily the latest version.  E.g., my router reports the current version as 40.20.1 while the upgrade site reports the available "upgrade" as 40.19.36 ()obviously an earlier version).  I once mistakenly forced the upgrade and messed up things, until I finally reverted to the prior version.
    I seem to recall that the explanation for this is that the latest firmware is usually pumped by Verizon and not Actiontec, which means all you have to do is let the router itself handle the chores.  Check this thread for more details:
    http://forums.verizon.com/t5/FiOS-Internet/ActionTec-MI424WR-GEN2-router-firmware-upgrade/m-p/401761...
    BTW what version are you showing at this time?

  • Too many errors after upgrading the firmware to 1.0.3.10 on Cisco RV180W wireless router

    My company purchased one Cisco RV180W wireless router few days ago and it worked normal with default firmware version of 1.0.0.30. Today I upgraded the firmware to version 1.0.3.10, the users can still access this router via wired and wireless devices, but on the dashboard I observed two major problems, one is the CPU utilization always shows 100%, another is the more and more errors appearing, on the Syslog Summary panel "Error" log has been up to 625 and is still increasing, there is one message repeatedly displaying in the log, see in below:
    Wed Nov 13 13:55:25 2013(GMT+0800) [rv180w][System][PLATFORM] /pfrm2.0/bin/bwLimitConfig /tmp/system.db 18 dot11STA 100 failed. status=-1
    Who can tell me what does this error message mean and how to elinate this error message ?  also how to deal with 100% CPU utilization ?
    Thanks.

    Hello,
    i have been looking at different VPN routers over the last few weeks and i was very close to buying the RV180W, but then i stumbled across many posts reffering to firmware issues, one issue is that the cpu sits at 100% useage, i just wondered if this is a bug in GUI or is the CPU actually max'd out? has anyone had any resolution into this?
    also the firmware on the emulator is a newer version than is listed on the support page, does anyone know when 1.0.3.14 will be released for download?
    when i buy a new product i like to ensure that the system is fully upto date before its put into use but i obviously dont want to add any performance issues from the ofset due to the CPU useage.
    i also have a could of questions if anyone can help
    the Ipsec VPN, will this work with the Built-in VPN client for apple devices? (New IOS7), i am unable to find a quickvpn application for apple IOS.
    is the site-to-site IPSec VPN also compatible with the Cisco Wvrs4400n router?
    thanks in advance.

  • WRT160N Severe Problem, Cant upgrade (downgrade) firmware PLEASE HELP!!!

    Had this router running for acouple weeks. Its had that **bleep** connection problem but just today it got even worse. About every 30 seconds it will lose connection to the modem and internet for about 2 seconds. So even if i try to upgrade my firmware down to 008 i dont get the chance. The upgrade gets about 50% done and then i lose internet and it fails. **bleep**?! please please please help
    Solved!
    Go to Solution.

    If you have downloaded the firmware already then disconnect your modem from the router, and just connect a computer straight to the router on any one of the LAN Port's...
    Follow these steps to upgrade the firmware on the device : -
    Open an Internet Explorer browser page on a computer hard wired to the router...
    In the address bar type - 192.168.1.1...Leave the username blank & in password use admin in lower case...
    Click on the 'Administration' tab- Then click on the 'Firmware Upgrade' sub tab- Here click on 'Browse' and browse the .bin firmware file and click on "Upgrade"...
    Wait for few seconds until it shows that "Upgrade is successful"  After the firmware upgrade, click on "Reboot" and you will be returned back to the same page OR it will say "Page cannot be displayed".
    Now reset your router :
    Press and hold the reset button for 30 seconds...Release the reset button...Unplug the power cable from your router, wait for 30 seconds and re-connect the power cable...Now re-configure your router...

  • FAQ Broken: How do I upgrade the firmware on a WRT54G Wireless-G Broadband Router?

    I tried to view the above question in the FAQ, but it goes to the answer for a different question.
    I then tried "How do I upgrade the firmware on my router?" a little further down,
    but it acts like I'm not authenticated, and won't accept my Linksys Forums e-mail address
    and password. When I try the password recovery, it says my e-mail address is invalid.
    Can someone please point me to instructions for upgrading the firmware on my WRT54G?
    Specifically, someone told me that the router needs to be listening on the default 192.168.1.1
    IP address, but mine is listening on 10.1.1.2. Do I need to change this just to flash new
    firmware, because that will be a little painful.
    Thanks,

    Go to website linksysbycisco.com/downloads.........insert model no of your router in serach tab......select proper version of your router........download the firmware file......save that file on desktop
    Follow these steps to upgrade the firmware on the device : -
    Open an Internet Explorer browser page on a computer hard wired to the router...
    In the address bar type - "Default Gateway of Your Router"...Leave the Username blank & in Password use admin in lower case...
    Click on the 'Administration' tab- Then click on the 'Firmware Upgrade' sub tab- Here click on 'Browse' and browse the .bin firmware file and click on "Upgrade"...
    Wait for few seconds until it shows that "Upgrade is successful"  After the firmware upgrade, click on "Reboot" and you will be returned back to the same page OR it will say "Page cannot be displayed".
    Now reset your router :
    Press and hold the reset button for 30 seconds...Release the reset button...Unplug the power cable from your router, wait for 30 seconds and re-connect the power cable...Now re-configure your router...
    **To Check the Default Gateway of the router...Click Start >> All Programs >> Accessories >> Command Prompt...A black box will appear(Command Prompt)...In the Command Prompt window type ipconfig and press 'Enter'...Look for Ethernet Adapter Local Area Connection IP Address , Subnet Mask and Default Gateway...
    **To all the above setting using the wired computer.

  • Mi424wr-gen3I no internet access from secondary subnet / router

    All,
    I am looking to provide internet access to my internal LAN / WLAN devices on another router.  I have configured my second router to connect to the 192.168.1.0/24 network on the mi424wr LAN. 
    Static routes: 192.168.2.0/24  next hop 192.168.1.254 (secondary router interface connected to m1424wr LAN)
    Firewall policy filter: Network Home  Inbound and outbound allow access sourced and destined to both subnets.
    I have layer 3 conectivity between the routers but I am not able to browse the internet from secondary router 192.168.2.0 network. My default router on the 192.168.2.0/24 is the 192.168.1.1 router.
    I tried to modifiy the DNS setting for devices on the 192.168.2.0 net but nothing works.  Used 192.168.1.1 (mi424wr interface which the setting for the 192.168.1.0 net devices. Even tried using verizon's DNS server 68.237.161.12 but no internet access.  The mi424wr does have a dns server setting which I tried to statically add 192.168.2.x host but that did not work. 
    So I am not sure if the mi424wr DNS server is not allowing any other subnets beside the 192.168.1.0/24 to access its DNS services or some other policy is needed to be created.  My secondary router is not NATing and at a loss.
    Tried to research other methods of using my secondary router to connect to internet with the mi424wr-gen3I but nothing seems worth trying.  Setting the mi424wr-gen3I to bridge mode would be an option but have not seen any configuration for the REV I router vesion.  My last setup worked in bridge mode and STB were functional but VOD was always very choppy.  Seem there are some QoS setting the mi424wrI has configure to improve traffic priority for video.
    Any assistance appreciated. 
    Rich

    As STX said.  All you need to do is to connect an ethernet cable from a lan port of the Verizon router to the wan port of your own router.  Your own router needs to be configured with an address on the 192.168.1 subnet, either dhcp or static, yours is you say at 192.168.1.254 as is mine.  Then you should have configured the dhcp side of your router with a subnet other than 192.168.1 which apparently you have done.  You do not need static routes or anything else for devices on the 192.168.2 subnet to access the internet, other than valid DNS server addresses - did you set valid dns servers addresses in the static ip internet connection on your router?  You could set it to 192.168.1.1 and pick up whatever dns the vz router is using or you could set it dns servers of your choice, personally I set mine to opeDNS server addresses.
    What kind of router is the second router?
    Your description of your setup sound OK and the only difference I see between your setup and mine is that you say your second router is not NATing

  • Airport time capsule Extreme dropping connection issue i have already upgraded new firmware 7.7.3 but problem is still in wifi connectivity drop please solve this issue i have expanded my money in tc drive

    time capsule drop wifi connection issue .I have already upgraded new firmware 7.7.3 but  problem in not solve i am very confuse to resolving this issue.also i attached my log here.
    May 15 11:37:43
    5
    Initialized (firmware 7.7.3).
    May 15 11:37:50
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 3).
    May 15 11:37:50
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 2).
    May 15 11:37:50
    5
    Rotated TKIP group key.
    May 15 11:37:51
    5
    Clock synchronized to network time server time.apple.com (adjusted +1 seconds).
    May 15 11:37:54
    5
    Associated with station b8:e8:56:1f:2c:98
    May 15 11:37:54
    5
    Installed unicast CCMP key for supplicant b8:e8:56:1f:2c:98
    May 15 11:38:27
    5
    Associated with station 78:a3:e4:ba:90:42
    May 15 11:38:27
    5
    Installed unicast CCMP key for supplicant 78:a3:e4:ba:90:42
    May 15 11:39:14
    5
    Connection accepted from [::ffff:192.168.1.170]:49439.
    May 15 11:40:49
    5
    SMB/CIFS login OK from [email protected].
    May 15 11:43:14
    5
    Connection accepted from [::ffff:192.168.1.170]:49452.
    May 15 11:43:19
    5
    Connection accepted from [::ffff:192.168.1.170]:49454.
    May 15 11:43:20
    5
    Connection accepted from [::ffff:192.168.1.170]:49456.
    May 15 11:43:42
    5
    Disassociated with station b8:e8:56:1f:2c:98
    May 15 11:43:43
    5
    Rotated TKIP group key.
    May 15 11:44:20
    5
    Connection accepted from [::ffff:192.168.1.170]:49460.
    May 15 11:45:21
    5
    SMB/CIFS login OK from [email protected].
    May 15 11:47:33
    5
    Associated with station b8:e8:56:1f:2c:98
    May 15 11:47:33
    5
    Installed unicast CCMP key for supplicant b8:e8:56:1f:2c:98
    May 15 11:47:34
    5
    Disassociated with station b8:e8:56:1f:2c:98
    May 15 11:47:35
    5
    Rotated TKIP group key.
    May 15 11:47:57
    5
    Associated with station e4:92:fb:dc:02:0b
    May 15 11:47:57
    5
    Installed unicast CCMP key for supplicant e4:92:fb:dc:02:0b
    May 15 11:49:25
    5
    SMB/CIFS login OK from [email protected].
    May 15 11:50:37
    5
    Connection accepted from [::ffff:192.168.1.170]:49472.
    May 15 11:50:42
    5
    Connection accepted from [::ffff:192.168.1.170]:49474.
    May 15 11:50:44
    5
    Connection accepted from [::ffff:192.168.1.170]:49476.
    May 15 11:51:18
    5
    SMB/CIFS login OK from [email protected].
    May 15 11:51:25
    5
    SMB/CIFS login OK from [email protected].
    May 15 11:51:53
    5
    Connection accepted from [::ffff:192.168.1.170]:49478.
    May 15 11:53:07
    5
    Idle timeout for station e4:92:fb:dc:02:0b
    May 15 11:53:07
    5
    Disassociating with station e4:92:fb:dc:02:0b (reserved 4).
    May 15 11:53:07
    5
    Disassociated with station e4:92:fb:dc:02:0b
    May 15 11:53:07
    5
    Rotated TKIP group key.
    May 15 11:54:45
    5
    Connection accepted from [::ffff:192.168.1.170]:49497.
    May 15 11:54:52
    5
    Connection accepted from [::ffff:192.168.1.170]:49499.
    May 15 11:54:57
    5
    Connection accepted from [::ffff:192.168.1.170]:49502.
    May 15 11:55:15
    5
    Connection accepted from [::ffff:192.168.1.170]:49504.
    May 15 11:55:24
    5
    Connection accepted from [::ffff:192.168.1.170]:49506.
    May 15 11:55:45
    5
    Connection accepted from [::ffff:192.168.1.170]:49508.
    May 15 12:05:39
    5
    SMB/CIFS login OK from [email protected].
    May 15 12:05:40
    5
    unloading current configuration.
    May 15 12:05:55
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 3).
    May 15 12:05:55
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 2).
    May 15 12:05:55
    5
    Rotated TKIP group key.
    May 15 12:05:56
    5
    Clock synchronized to network time server time.apple.com (adjusted +0 seconds).
    May 15 12:06:00
    5
    Associated with station 78:a3:e4:ba:90:42
    May 15 12:06:00
    5
    Installed unicast CCMP key for supplicant 78:a3:e4:ba:90:42
    May 15 12:06:45
    5
    Disassociated with station 78:a3:e4:ba:90:42
    May 15 12:06:45
    5
    Rotated TKIP group key.
    May 15 12:07:19
    5
    Associated with station 78:a3:e4:ba:90:42
    May 15 12:07:19
    5
    Installed unicast CCMP key for supplicant 78:a3:e4:ba:90:42
    May 15 12:09:15
    5
    Connection accepted from [::ffff:192.168.1.170]:49576.
    May 15 12:09:35
    5
    Connection accepted from [::ffff:192.168.1.170]:49578.
    May 15 12:09:49
    5
    Connection accepted from [::ffff:192.168.1.170]:49580.
    May 15 12:25:40
    5
    Connection accepted from [::ffff:192.168.1.170]:49709.
    May 15 12:25:51
    5
    Connection accepted from [::ffff:192.168.1.170]:49711.
    May 15 12:26:12
    5
    Connection accepted from [::ffff:192.168.1.170]:49717.
    May 15 12:27:40
    5
    Connection accepted from [::ffff:192.168.1.170]:49723.
    May 15 12:27:41
    5
    unloading current configuration.
    May 15 12:27:56
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 3).
    May 15 12:27:56
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 2).
    May 15 12:27:56
    5
    Rotated TKIP group key.
    May 15 12:28:00
    5
    Associated with station 78:a3:e4:ba:90:42
    May 15 12:28:00
    5
    Installed unicast CCMP key for supplicant 78:a3:e4:ba:90:42
    May 15 12:29:23
    5
    SMB/CIFS login OK from [email protected].
    May 15 12:29:31
    5
    Connection accepted from [::ffff:192.168.1.170]:49730.
    May 15 12:29:31
    5
    Connection accepted from [::ffff:192.168.1.170]:49732.
    May 15 12:34:15
    5
    Connection accepted from [::ffff:192.168.1.170]:49739.
    May 15 12:34:16
    5
    unloading current configuration.
    May 15 12:34:31
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 3).
    May 15 12:34:31
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 2).
    May 15 12:34:31
    5
    Rotated TKIP group key.
    May 15 12:34:49
    5
    Associated with station 78:a3:e4:ba:90:42
    May 15 12:34:50
    5
    Installed unicast CCMP key for supplicant 78:a3:e4:ba:90:42
    May 15 12:36:07
    5
    Connection accepted from [::ffff:192.168.1.170]:49745.
    May 15 12:36:08
    5
    Connection accepted from [::ffff:192.168.1.170]:49747.
    May 15 12:40:40
    5
    Associated with station 10:68:3f:46:d2:69
    May 15 12:40:41
    1
    WPA handshake failed with STA 10:68:3f:46:d2:69 likely due to bad password from client
    May 15 12:40:41
    5
    Deauthenticating with station 10:68:3f:46:d2:69 (reserved 2).
    May 15 12:40:41
    5
    Disassociated with station 10:68:3f:46:d2:69
    May 15 12:41:48
    5
    Disassociated with station 10:68:3f:46:d2:69
    May 15 12:42:12
    5
    Connection accepted from [::ffff:192.168.1.170]:49759.
    May 15 12:42:13
    5
    unloading current configuration.
    May 15 12:42:28
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 3).
    May 15 12:42:28
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 2).
    May 15 12:42:28
    5
    Rotated TKIP group key.
    May 15 12:42:32
    5
    Associated with station 78:a3:e4:ba:90:42
    May 15 12:42:32
    5
    Installed unicast CCMP key for supplicant 78:a3:e4:ba:90:42
    May 15 12:44:04
    5
    Connection accepted from [::ffff:192.168.1.170]:49768.
    May 15 12:44:10
    5
    Connection accepted from [::ffff:192.168.1.170]:49771.
    May 15 12:45:03
    5
    Connection accepted from [::ffff:192.168.1.170]:49773.
    May 15 12:45:03
    5
    unloading current configuration.
    May 15 12:45:18
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 3).
    May 15 12:45:18
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 2).
    May 15 12:45:18
    5
    Rotated TKIP group key.
    May 15 12:45:23
    5
    Associated with station 78:a3:e4:ba:90:42
    May 15 12:45:23
    5
    Installed unicast CCMP key for supplicant 78:a3:e4:ba:90:42
    May 15 12:46:23
    5
    Associated with station e4:92:fb:dc:02:0b
    May 15 12:46:24
    5
    Installed unicast CCMP key for supplicant e4:92:fb:dc:02:0b
    May 15 12:46:43
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:46:43
    5
    Installed unicast CCMP key for supplicant 24:fd:52:d0:3c:50
    May 15 12:46:58
    5
    Connection accepted from [::ffff:192.168.1.170]:49780.
    May 15 12:47:02
    5
    Connection accepted from [::ffff:192.168.1.170]:49782.
    May 15 12:47:05
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:47:05
    5
    Installed unicast CCMP key for supplicant 24:fd:52:d0:3c:50
    May 15 12:47:13
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:47:14
    5
    Installed unicast CCMP key for supplicant 24:fd:52:d0:3c:50
    May 15 12:47:27
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:47:30
    5
    Installed unicast CCMP key for supplicant 24:fd:52:d0:3c:50
    May 15 12:47:39
    5
    Disassociated with station 24:fd:52:d0:3c:50
    May 15 12:47:40
    5
    Rotated TKIP group key.
    May 15 12:47:44
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:47:44
    5
    Installed unicast CCMP key for supplicant 24:fd:52:d0:3c:50
    May 15 12:49:07
    5
    Disassociated with station 24:fd:52:d0:3c:50
    May 15 12:49:07
    5
    Rotated TKIP group key.
    May 15 12:49:13
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:49:13
    5
    Installed unicast CCMP key for supplicant 24:fd:52:d0:3c:50
    May 15 12:51:19
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:51:20
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:51:20
    5
    Installed unicast CCMP key for supplicant 24:fd:52:d0:3c:50
    May 15 12:51:26
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:51:30
    5
    Deauthenticating with station 24:fd:52:d0:3c:50 (reserved 2).
    May 15 12:51:30
    5
    Disassociated with station 24:fd:52:d0:3c:50
    May 15 12:51:31
    5
    Rotated TKIP group key.
    May 15 12:51:31
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:51:31
    5
    Installed unicast CCMP key for supplicant 24:fd:52:d0:3c:50
    May 15 12:51:34
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:51:38
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:51:40
    5
    Deauthenticating with station 24:fd:52:d0:3c:50 (reserved 2).
    May 15 12:51:40
    5
    Disassociated with station 24:fd:52:d0:3c:50
    May 15 12:51:40
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:51:41
    5
    Rotated TKIP group key.
    May 15 12:51:42
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:51:42
    5
    Installed unicast CCMP key for supplicant 24:fd:52:d0:3c:50
    May 15 12:51:47
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:51:49
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:51:49
    5
    Installed unicast CCMP key for supplicant 24:fd:52:d0:3c:50
    May 15 12:51:55
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:51:57
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:51:59
    5
    Deauthenticating with station 24:fd:52:d0:3c:50 (reserved 2).
    May 15 12:51:59
    5
    Disassociated with station 24:fd:52:d0:3c:50
    May 15 12:51:59
    5
    Rotated TKIP group key.
    May 15 12:52:05
    5
    Associated with station 24:fd:52:d0:3c:50
    May 15 12:52:09
    5
    Deauthenticating with station 24:fd:52:d0:3c:50 (reserved 2).
    May 15 12:52:09
    5
    Disassociated with station 24:fd:52:d0:3c:50
    May 15 12:52:20
    5
    Disassociated with station 24:fd:52:d0:3c:50
    May 15 12:59:22
    5
    Connection accepted from [::ffff:192.168.1.170]:49810.
    May 15 12:59:22
    5
    Connection accepted from [::ffff:192.168.1.170]:49812.
    May 15 13:00:07
    5
    Connection accepted from [::ffff:192.168.1.170]:49817.
    May 15 13:00:07
    5
    unloading current configuration.
    May 15 13:00:22
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 3).
    May 15 13:00:22
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 2).
    May 15 13:00:22
    5
    Rotated TKIP group key.
    May 15 13:00:35
    5
    Associated with station 78:a3:e4:ba:90:42
    May 15 13:00:35
    5
    Installed unicast CCMP key for supplicant 78:a3:e4:ba:90:42
    May 15 13:02:00
    5
    Connection accepted from [::ffff:192.168.1.170]:49826.
    May 15 13:02:00
    5
    Connection accepted from [::ffff:192.168.1.170]:49828.
    May 15 13:03:14
    5
    Connection accepted from [::ffff:192.168.1.170]:49832.
    May 15 13:03:15
    5
    unloading current configuration.
    May 15 13:03:31
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 3).
    May 15 13:03:31
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 2).
    May 15 13:03:31
    5
    Rotated TKIP group key.
    May 15 13:04:03
    5
    Associated with station 78:a3:e4:ba:90:42
    May 15 13:04:03
    5
    Installed unicast CCMP key for supplicant 78:a3:e4:ba:90:42
    May 15 13:05:07
    5
    Connection accepted from [::ffff:192.168.1.170]:49843.
    May 15 13:05:07
    5
    Connection accepted from [::ffff:192.168.1.170]:49845.
    May 15 13:06:15
    5
    Connection accepted from [::ffff:192.168.1.170]:49848.
    May 15 13:06:16
    5
    unloading current configuration.
    May 15 13:06:31
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 3).
    May 15 13:06:31
    5
    Deauthenticating with station ff:ff:ff:ff:ff:ff (reserved 2).
    May 15 13:06:31
    5
    Rotated TKIP group key.
    May 15 13:07:04
    5
    Associated with station 78:a3:e4:ba:90:42
    May 15 13:07:04
    5
    Installed unicast CCMP key for supplicant 78:a3:e4:ba:90:42
    May 15 13:08:08
    5
    Connection accepted from [::ffff:192.168.1.170]:49854.
    May 15 13:08:09
    5
    Connection accepted from [::ffff:192.168.1.170]:49856.
    May 15 13:08:20
    5
    Connection accepted from [::ffff:192.168.1.170]:49858.
    May 15 13:12:31
    5
    unloading current configuration.
    May 15 13:32:36
    1
    WPA handshake failed with STA 1c:7b:21:9c:20:fd likely due to bad password from client
    May 15 13:32:57
    1
    WPA handshake failed with STA 1c:7b:21:9c:20:fd likely due to bad password from client
    May 15 13:33:09
    1
    WPA handshake failed with STA 1c:7b:21:9c:20:fd likely due to bad password from client
    May 15 13:33:22
    1
    WPA handshake failed with STA 1c:7b:21:9c:20:fd likely due to bad password from client
    May 15 13:33:33
    1
    WPA handshake failed with STA 1c:7b:21:9c:20:fd likely due to bad password from client
    May 15 15:21:21
    1
    WPA handshake failed with STA 10:68:3f:46:d2:69 likely due to bad password from client
    May 15 15:21:26
    1
    WPA handshake failed with STA 10:68:3f:46:d2:69 likely due to bad password from client
    May 15 15:21:41
    1
    WPA handshake failed with STA 10:68:3f:46:d2:69 likely due to bad password from client

    It says you have the wrong password.
    WPA handshake failed with STA 10:68:3f:46:d2:69 likely due to bad password from client
    Reset the TC to factory and start again.
    But do not be surprised if the v5 utility no longer works to do the setup.

  • Problem after upgrading New Firmware 14.1.G.1.534. Asking for Password when i click settings menu

    Problem after upgrading New Firmware 14.1.G.1.534. Asking for Password when i click settings menu, for which i never kept any password. 
    Any DEFAULT Password so that i can unlock the settings menu.

    That's quite odd, just repeat the update process
    Update Service (SUS)
    http://www.sonymobile.com/gb/tools/update-service/
    http://www-support-downloads.sonymobile.com/Software%20Downloads/Update_Service_Setup-2.11.12.5.exe
    PC Companion (PCC)
    Bridge (for Mac)
    Alternatives on How to backup Xperias
    http://talk.sonymobile.com/thread/36355
    "I'd rather be hated for who I am, than loved for who I am not." Kurt Cobain (1967-1994)

  • Problem after E61 firmware upgrade

    Since I upgraded my firmware last week end a strange thing has happened. When I get a text message or call only the number appears on my phone and not the name of the person calling.
    Yes all the incoming communications are from people on my Contact list.
    How can I get their names back?
    Thanks

    Are you sure that during the backup / restore process you did that no duplicate contacts were added to your phonebook ?

  • Cannot upgrade the firmware.

    I am using a BEFW11S4 router Version 4. When I checked the site and after a full day of messing around I found that the problem I was having was covered in the latest update. I downloaded the bin file and tried the upgrade process from the router management. It failed. leaving the router still working but still with my original problem. Went to user groups and read what i could find. I turned off virus program, firewall and connected directly to internet to download bin file. (did this 4 times) tried again. failed. still did not upgrade the firmware and read more and downloaded the utility It could not access the router - Login failed. tried to login to router and logged in fine. spent another 4 hours trying to find any other suggestions either on the linksys site and in the forums and could not find anything. Keep in mind I have been using cisco products for about 20 years now and I am fully qualified Network technician. Please don't annoy me with any more simplistic suggestions I need a workable solution since I have about two or three hundred of these types of units out there. My interim solution was to go to staples and pick up a $49 Belkin router that works just fine. The solution suggested by the linksys person on the phone was to pay $29 to maybe resolve the issue. can anyone see the economics in that?
    P.S. went to the lela download link in the message at the top of this forum. It says to download lela click here. Did so and got a really nice demo. there was no download. so if anyone knows where to download that it might be worth a try.
    Message Edited by tekkiefirst on 07-17-2008 03:22 AM

    Try upgrading the firmware of router ... reset it & reconfigure it ... if it works ... that will be fine if not ... then possibly the router is gone bad ...

  • Reoccuring Problem with Router

    Every once in a while, my router will disconnect for no reason. When I try to reconnect, Windows says it can not connect, and when I diagnose the problem, it says the connection was cancelled. I'm using Windows Vista Home Edition, and my router Model # is WRT54GS.

    Upgrade the firmware of your Router to the latest firmware version. This procedure often resolve router issues. You may need to download the latest firmware version at www.linksys.com. Be sure that you will be able to download the exact firmware for your router.
    After the successful firmware upgrade, make sure that you will be able to "reset" the router to its' default settings. You can press and hold the Reset button at the back of the router for 10 seconds while it is turned On. Do a powercycle (Unplug and Re-plug the power of the device) after the reset.
    Hope this helps!
    Dreamers*

  • Actiontec MI424WR-GEN3I with ChangeIP dynamic dns

    I'm trying to configure my router (Actiontec MI424WR-GEN3I, v. 40.21.10.3) with ChangeIP.com dynamic DNS.  It's listed in the provider drop-down in the Dynamic DNS section of the router GUI, so i figured i'd be all set.  I setup an account with ChangeIP, and then got a hostname from them.
    In the router i'm configured as follow..
    Hostname: MyHost.changeip.com  (<-- actually MyHost.onmypc.org; "onmypc.org" being one of the domains ChangeIP offers for free.)
    Connection: Broadband Connection (Ethernet/Coax)
    Provider: changeip.com
    Username: My changeip username
    Password: My changeip password
    Dynamic DNS System: Dynamic DNS
    Offline: (not checked)
    SSL Mode: None
    In the status area it just says "Error - Unknown changeip.com error".  There's nothing in the changeip knowledgebase.  Has anyone tried configuring changeip on their router?  I know they have something called homeing beacon, but really i just want this to work as configured without having to install anything extra.
    Thanks!

    Hello, I had the exact same problem.  It seem Verison FiOS router is not very flexible.  You can't enter another Dynamic DNS (DDNS) and can only use one on the list. The only two free one I found was no-ip.com and changeip.com. 
    The no-ip.com came back with a host not found cause they've changed the name to noip.com (without the dash) so the dumb router is not able to find it.
    The changeip.com is no help either as you've found out.  I keep getting Error but it does not say why.  Fortunetely I did found a solution.  You can download changeip.com's DDNS Update Client (for Windows, Linux, or OSX).  The called this software as Homeing Beacon.
    http://www.changeip.com/accounts/downloads.php
    In Windows it runs as a self startup service so you don't to remember to run it but you will need a Windows PC to be on for the update to occur.  Basically instead of updating changeip.com's DDNS entry from the router, you have a Windows client that somehow figures out what the router's IP and act as a proxy agent and update your DNS entry on changeip.com.  This is a workable workaround, I think.  The drawback is you need a PC running every so often on your home network so updates occur.  But, the price is FREE and you can't beat that.

  • Apple TV Setup Problems - Buffalo Router keeps crashing / update keeps failing

    So I've been having a multitude of problems getting my brand-new Apple TV (3rd generation) set up and working. Let's start with the fact that no matter what I try, I can't seem to upgrade its firmware (which I figure is step 1 to getting everything else working).
    In general, it seems that my problems are related to my router. I have a Buffalo WHR-HP-G54 that's a few years old. No firmware updates, I've checked. Doesn't seem to have *any* firewall settings. But whenever I try to connect my Apple TV to this router, the following will occur:
    - I will be unable to connect or sign in to the iTunes Store via the Apple TV
    - I will be unable to update the Apple TV's system software
    - The router will inevitably stop responding to all connected devices, requiring me to manually restart it.
    And *here's* a fun development: so having gone through the above multiple times, I try connecting the Apple TV to my (Mac) computer and try a system restore through iTunes (latest version). Not only does the download fail (see screenshot below for error), but the router will stop responding/crash *yet again*, just as if I'd had the Apple TV connected directly to it!
    Does anyone know what's going on here, and how I might go about fixing it? Thank you.

    Given all the problems you've had I would suggest an erase and reinstall using Disk Utility in the Recovery Volume (command - R or hold down the option key during a restart).
    Disk Utility - Format,  Erase,  or  Reformat  a  Drive

Maybe you are looking for