WLAN Authentication

Our wireless network consists of Wireless LAN Controllers and multiple APs.  We require 802.1x authentication on our SSID.  We use IAS as our authentication server for both machines and users.  Each device connecting to our WLAN is required to have a certificate issued from one of our DCs.  Each device and user is also required to be in specific AD Groups, checked by IAS.
Can someone please let me know what the steps are when a Wireless Client tries to connect to this wireless network, from selecting the SSID to being able to communicate on the WLAN?  If things happen prior to this, please include those steps as well.
We are occassionally experiencing issues where some clients will stop communicating with the network altogether.  To resolve the problem we plug the device into the network and reboot and login to AD.
Thanks,

Heres what happens as I see it on capture files:
Step 1When a STA wants to access an existing BSS (either after power up, sleep mode or simply just entering the RF BSS domain), the station needs to get synchronisation information from the AP.
It can get this information by one of two ways:
Passive scanning of the RF: STA just waits and received Beacon frames from the AP(s) sent periodically by all APs with the synchronisation information
Active scanning: The STA tries to actively find an AP by transmitting a probe request frame which can either contain the name of the SSID it wants to connect to, or I believe the probe request can be a broadcast to allow all APs to send their SSIDs back in probe responses (Excerpt from the definite guide: Probe Requests: This may be set to the SSID of a specific network or set to join any compatible network. Drivers that allow cards to join any network use the broadcast SSID in Probe Requests.)
Note: The AP responds with its security capabilities in the RSNIE field of the Probe Response frame if you have configure dot1x on the WLAN; this includes all of its enabled encryption and authentication capabilities etc etc etc, if you have a guest WLAN with web-auth, there is no RSN field. Also, the probe response do all the usual 802.11 management stuff like advertised data rates, ssid, QoS etc etc etc
Step 2When the STA receives the Probe Response or desire beacon frame, it performs open system authentication
—null authentication—with the AP. The purpose of this frame sequence, which provides no security, is simply to maintain backward compatibility with the IEEE 802.11 state machine, as implemented in existing IEEE 802.11 hardware.Step 3Now the station sends a the all important packet to try to connect to the selected AP and thus BSS. It sends the association Request. In the frame is contains the RSN tagged data that should match that of the RSNIE in the prevision probe response.
Step 4.The AP send back an association response. This frame has a field in the fixed parameters that either says Successful Status code 0x0000 and an association ID or some other value which im not sure of at this time.
The STA and AP are Connected.
Step 5.Optionally, the STA can send an EAPOL start which is fired off to the AP, LWAPPed up to the WLC. This is the STA starting the real authentication process, (not that that is describe in step 2 above). Like I say, this is optional, if the STA does not send this packet, the WLC just sends an EAP-Identity request. Sometimes you see a WLC eap-identity request come into the STA before it has had a chance to send the option al EAPOL start frame to the WLC. EAPOL-start packet contains just a 802.1x start message. The STA is saying lets start the 802.1x handshake. Eap-Reqest ID packets just contain the SSID and WLC identity
Step 6.STA now has to send its identity to the WLC. Basically, hostname, device name etc etc. Again, this is LWAPPed up to the WLC and now the WLC forwards this packet encapsulated/converted ina Radius access-request packet to the configured RADIUS server on the WLAN.
Step 7.Radius server sends a Radius packet to the WLC which now converts it into an eap-request packet (just the same as the eap-packet in step 5) and the WLC fires that down to the client. The difference in the eap-reuqest packet in this step as supposed to the one in step 5, is that it is not an eap-request identify (type 1), it is an eap-request protocol packet, ie type code 13 for EAP-TLS.
Step 8.EAP-Exchange, ei, EAP-TLS, EAP-PEAP between STA and Radius Server via WLC. If good, get an eap-success from Radius server to STA, if bad, EAP-Failure message.
Step 9.WLC and STA now build session keys and this is the EAPOL Four-way handshake between STA and WLC.
Step10 (at last)Get a DHCP IP address hopefully
HTHs

Similar Messages

  • 801.x WLANs authenticated via Radius and Active Directory permit any user access any WLAN

    Hi,
    I have configured several WLANs with WPA2 and 8021.x which authenticate users through Radius server (Windows Internet authentication service) that conects with an Active Directory, into the AD exists one user group for each WLAN but the problem is that any user that was added to some group can get access to any WLAN, does anyboby know if I need some configuraion on the WLC to restric that?
    thanks for your help.

    Hi Scott,
    I have done some test modifying the Radius Policy to look at called station ID and test too looking at the NAS-ID, In the first case, I change the Call Station ID Type into WLC RADIUS Authentication Servers configuration to AP MAC Address:SSID and AP Name:SSID and into the Radius Server using .*:SSID-NAME$ and SSID-NAME$ ,but it blocks access for any user. In the second case, I change the NAS-ID into WLC WLAN and interface confguration and into the radius server Policy to match all, but it doesn´t have any impact, what other test could I try?
    thanks for your help. 

  • 802.1x wlan authentication wont work with Access Connections

    Hi - hope someone can help. I have a WLAN configured to use 802.1x authentication using PEAP, passwords and an internal CA.
    I can conect and authenticate a wireless client using the inbuilt windows wireless client; i am unable to connect when i configure Access Connections on the same computer with the same wireless settings. This is really annoying.....
    The version of access connections is 5.21 running on windows XP SP3. Laptop is T61.
    The connection fails as Access connections seems to think that there is no certificate installed on the client; there is and of course this would not have worked with the windows wireless client.
    error message is:
    The identity of the server was rejected. Verify that the correct server name has been specified in the 'Validate Server Certificate' section of the profile.
    Any suggestions appreciated.
    Thanks.

    did you find any resolution to this?  our mba- mid 2013 deployment is having a very similar problem.  We've gone through loads of troubleshooting and have yet to come to a resolution.  all our mid 2012 mba's are working fine they're 10.7.5/10.8.4 mixed.  console logs don't show much, i'll try the wireless diags tomorrow.  our other 10.8.4 build appears fine on other models of machines.  i've read posts about deleteing the adapters, deleting the system config plists and changing the mtu size, these steps do not work for us.
    we don't have as high a failure rate with our deployment, but 25%-30% of our clients randomly drop connectivity and are unable to reconnect (fluttering wi-fi wave).  when you slect the wifi symbol in the menu bar other wireless networks do not show, the 'looking for networks' fly wheel continues to spin.  ocasionaly on login the yellow jelly bean will appear then disappear before finally timeing out without logging the user in (depsite having mobile accounts enabled).    mostly the problem manifests itself when waking from sleep - the wifi symbol flutters endlessly without connecting.  deleting the 8021x profile and readding it will reenable connectivity.  we've tried new profiels, but to the same end.  i know our certs and systems are fine because previous mac os x builds work fine as do our windows clients.
    any input would be much appreciated.

  • WLC WLAN Authentication from External RADIUS Server

    Dears,
    How to make WLC Receive PoD (Packet of Disconnect) from the RADIUS server to terminate the session and disconnect authenticating clients.
    Thanks,

    Hi Ahmed,
    Its not documented well, but here is it:
    CSCso52532 No Documentation for sending RADIUS Disconnect-Request (RFC 3576)
    . If a user has to be logged out then, following attributes are expected
      - SSH_RADIUS_AVP_SERVICE_TYPE(6) attribte with following value.
             SSH_RADIUS_SERVICE_TYPE_LOGIN(1)
           - SSH_RADIUS_AVP_CALLING_STATION_ID(31) - this is needed, if
                  we want to delete  particular user  session via particular device
                  (like PDA, Phone or PC)
           - SSH_RADIUS_AVP_USER_NAME(1)
    . If a management user has to be logged out then, following attributes
    are expected
      - SSH_RADIUS_AVP_SERVICE_TYPE(6) attribte with following value
      - SSH_RADIUS_SERVICE_TYPE_ADMINISTRATIVE
                          OR
       - SSH_RADIUS_SERVICE_TYPE_NAS_PROMPT
       - SSH_RADIUS_AVP_USER_NAME(1)
       - SSH_RADIUS_AVP_FRAMED_IP_ADDRESS(8)
    Eg:
    *Dec 17 12:59:08.926:   Packet contains 14 AVPs:
    *Dec 17 12:59:08.926:       AVP[01] User-Name................................user@domain (17 bytes)
    *Dec 17 12:59:08.926:       AVP[02] Nas-Port.................................0x0000000d (13) (4 bytes)
    *Dec 17 12:59:08.926:       AVP[03] Nas-Ip-Address...........................0x0a0047fb (167790587) (4 bytes)
    *Dec 17 12:59:08.926:       AVP[04] Framed-IP-Address........................0x0a003f1b (167788315) (4 bytes)
    *Dec 17 12:59:08.926:       AVP[05] NAS-Identifier...........................wlcRM_1 (7 bytes)
    *Dec 17 12:59:08.926:       AVP[06] Airespace / WLAN-Identifier..............0x00000004 (4) (4 bytes)
    *Dec 17 12:59:08.926:       AVP[07] Acct-Session-Id..........................4b2a1d0c/00:1c:26:cb:27:71/4 (28 bytes)
    *Dec 17 12:59:08.926:       AVP[08] Acct-Authentic...........................0x00000001 (1) (4 bytes)
    *Dec 17 12:59:08.926:       AVP[09] Tunnel-Type..............................0x0000000d (13) (4 bytes)
    *Dec 17 12:59:08.926:       AVP[10] Tunnel-Medium-Type.......................0x00000006 (6) (4 bytes)
    *Dec 17 12:59:08.926:       AVP[11] Tunnel-Group-Id..........................0x3633 (13875) (2 bytes)
    *Dec 17 12:59:08.926:       AVP[12] Acct-Status-Type.........................0x00000001 (1) (4 bytes)
    *Dec 17 12:59:08.926:       AVP[13] Calling-Station-Id.......................10.0.63.27 (10 bytes)
    *Dec 17 12:59:08.926:       AVP[14] Called-Station-Id........................10.0.71.251 (11 bytes)
    *Dec 17 12:59:10.943: 00:1c:26:cb:27:71 Accounting-Response received from RADIUS server 10.0.71.249 for mobile 00:1c:26:cb:27:71 receiveId = 0
    *Dec 17 12:59:34.044: Received a 'RFC-3576 Disconnect-Request' from 10.0.71.249
    *Dec 17 12:59:34.044:   Packet contains 6 AVPs:
    *Dec 17 12:59:34.044:       AVP[01] Nas-Ip-Address...........................0x0a0047fb (167790587) (4 bytes)
    *Dec 17 12:59:34.044:       AVP[02] User-Name................................user@domain (17 bytes)
    *Dec 17 12:59:34.044:       AVP[03] Acct-Session-Id..........................4b2a1d0c/00:1c:26:cb:27:71/4 (28 bytes)
    *Dec 17 12:59:34.044:       AVP[04] Calling-Station-Id.......................10.0.63.27 (10 bytes)
    *Dec 17 12:59:34.044:       AVP[05] Called-Station-Id........................10.0.71.251 (11 bytes)
    *Dec 17 12:59:34.044:       AVP[06] Service-Type.............................0x00000001 (1) (4 bytes)
    *Dec 17 12:59:34.044: Error cause 503 generated for 'RFC-3576 Disconnect-Request' from 10.0.71.249 (Session Identification attributes not valid)
    *Dec 17 12:59:34.045: Sent a 'RFC-3576 Disconnect-Nak' to 10.0.71.249:3799
    *Dec 17 12:59:36.561: ****Enter processIncomingMessages: response code=5
    **Share your knowledge. It’s a way to achieve immortality.
    --Dalai Lama**
    Please Rate if helpful.
    Regards
    Ed

  • Wlan authentication and DHCP process takes about 120 seconds

    I have an SSID implemented to terminate on an anchor controller. Authentication takes place outside of the CAPWAP tunnel and the foreign controller authenticates the users with the AAA server directly. This authentication takes about 90-120 seconds and I do not see any problems as far as configuration is considered. This authentication traffic goes through 2 firewalls.
    Any ideas on where the problem could be? I use the same AAA server for other SSID authentication and so the problem is not related to the AAA server.
    Meena

    My response is meant more to Apple in general and is certainly not aimed at you Lennart ;-) I wouldn't want to shoot the messenger!!!
    If this were an unusual or isolated event, then perhaps re-installing the OS might be considered a solution, but until we determine why and how this is happening to so many systems, this is only a workaround that offers no guarantee that we won't end up right back here at any time. I'm sorry, but an OS reinstall to repair a widespread issue with an errant system level process that is making systems practically unusable is only a band-aid and not a final solution! (not that I won't do it myself ;-), but Apple needs to address the issue and not ask us to re-install the OS that caused/experienced the issue in the first place. Address the root cause not a symptom! Even though they make it fairly simple, an OS re-install is not something I accept as a trivial process to be used when one process is acting up.)
    Thanks Lennart for at least an immediate answer to make (i hope) both of my MacBooks usable again!

  • WLAN Authenticated Proxy, Nokia 5630

    Hello,
    I am using Nokia 5630 which has wireless feature.
    I have defined a wireless access point. In advanced settings of this wap, we can define a proxyort which let us use internet on on an access point which is behind a proxy server.
    BUT , we can not define a proxy username and password at all. In many places especially in university, accessing to internet needs a proxy username and password.In other words, there is an authenticated proxy instead of open proxy server.
    Please add this feature to advanced settings so that we would be able to define a proxy username and password in it.
    Best Regards

    I would suggest to backup all your important data like contacts, messages etc and goto Nokia Care for software reinstall or update.
    Hope this helps you.
    -------------------If this post helped you, click on accept as solution.------------------
    -----------------------------Appreciate by clicking on white star.----------------------------

  • Zenworks 11 Wlan Authentication

    Hi Guys,
    I recently discovered a problem of zenworks (11.2.3a) pxe trying to connect to wlan instead of Ethernet (which it does by default). I had to use old zenworks boot cd as a bypass because on the screen it didn't give me an option to select eth0 instead of wlan, all i am trying to do is find out why this particular behavior occurred now. is there anyway i configure the zenworks to only connect to Ethernet and completely ignore WLAN. I hope there is an easier solution out there.

    MEtho,
    it's down to the settings.txt - it should actually try them all, but you can direct it to use a specific interface - https://www.novell.com/documentation...a/bvej9uh.html
    Shaun Pond

  • WLC, ISE certificate authentication issue

    Hi Folks,
    This is the setup:
    Redundant pair of WLC 5508 (version 7.5.102.0)
    Redundant Pair of ISE (Version 1.2.0.899)
         The ISE servers are connected to the corporate Active Directory (the AD servers are configured as external identity sources)
         There is a rule based authentication profile which queries the AD identity source when it receives wireless 802.1x authentication requests.
    A corporate WLAN is configured on the WLC:
    L2 security WPA+WPA2 (AES Encryption), ISE server 1 and 2 configured as the AAA Authentication servers.
    This is all working correctly - I associate to the Corp WLAN (Authentication WPA2 enterprise, encryption AES CCMP, 802.1x auth MS-CHAPv2 using AD credentials) ... I can see the authentication request being processed correctly by the ISE, and I get access to the network.
    The client I am working for wants to restrict access to the WLAN to users who have been allocated a certificate from the corporate CA, and this is where I am having issues.
    I took a test laptop, and requested a new certificate (mmc, add snapin, certificates, current user, personal, request new cert).   
    The cert that was issued was signed only by a Corporate AD server with CA services (there is nothing in the certification path above the cert I was issued, apart from the issuing server itself).   I changed the security settings of my connection to the corp wlan (using TLS instead of mschapv2, and pointing to the certificate I requested)
    Initally authentication failed because the ISE did not trust the CA that provided my certificate (the ISE radius authentication troubleshooting tool had this entry: '12514 EAP-TLS failed SSL/TLS handshake because of an unknown CA in the client certificates chain').
    I exported the issuing CA's root certificate (followed this process http://support.microsoft.com/kb/555252), and imported the cert into ISE (administration, system, certificates, certificate store, import) - status of the cert is enabled, and it is trusted for client auth.
    After I did this, I could no longer associate to the Corp WLAN.  
    My laptop's wireless management software logs were filled with messages saying that the authentication server did not respond.   
    The ISE troubleshooting tool reported no new failed or successful authentication attempts.   
    Strangely though, the WLC log had a lot of entries like this: 'AAA Authentication Failure for UserName:host/laptop_asset_tag.corp.com User Type: WLAN USER'.
    It looks like the WLC is trying to locally authenticate my session when I use TLS, rather than hand off the authentication request to the ISE.    Other users who authenticate using their AD credentials only (as I described above) can still authenticate ok.
    Anyone able to shed some light on where I have gone wrong or what additional troubleshooting I can do?
    Thanks in advance,
    Darragh

    Hi,
    I had the same issue with microsoft CA and running ISE 1.1.4. The CA file was "corrupted", but you didn't see it at first glance. You can verify if the client CA matches the root CA via openssl.
    Try to export the root CA and the issuing CA in a different format (Base64), import both root and issuing into ise and check if that works. Also check if "Trust for client authentication or Secure Syslog services" in the Certificate Store -> CA -> Edit, is set.
    If this does not work, try to import the CA into another system and export it, then import into ISE.
    Regards,

  • Cisco ACS 5.2 authentication against multiple LDAP servers

    Hi Folks,
    I have a wireless network that uses ACS 5.2 to handle authentication.   The ACS is integrated with an Active Directory LDAP server (my_ldap) and is working correctly at the moment.    The authentication flow looks like this:
     - User tries to associate to WLAN
     - Authentication request is sent to ACS
     - Service selection rule chooses an access-policy (wireless_access_policy)
     - wireless_access_policy is configured to use my_ldap as identity source.
    A sister company is about to move into our offices, and will need access to the same WLAN.    Users in the sister company are members of a separate AD domain (sister_company_ldap).    I would like to modify the wireless_access_policy so that when it receives an authentication request it will query both my_ldap and sister_company_ldap, and return a passed authentication if either attempt is successful.     Is this possible?

    Assuming you're already authenticating using your AD binding and AD1 as your identity source, you can add a further LDAP server as another identity source and add this to your identity store sequence in your access policy to authenticate against both.
    You can also add multiple LDAP servers and add them both to the identity store sequence (if you're not using AD1).

  • Security for Internal WLAN

    I'm trying to figure out the best way to set up authentication on my WLAN for my internal users. I want to use certificates but I'm not exactly sure what layer 2, layer 3 and AAA settings I need to configure for certificates. If I do certificate authentication is that enough or do I also need to use something like RADIUS authentication?
    Anyone got any good docs or recommendations on how to configure my WLAN for certificate authentication? Also, I'm curious what methods other people are using to secure their internal WLANs.
    Thanks. 

    If you're looking for WLAN authentication, I would recommend PEAP.  It requires all users to use their AD credentials and synchronizes with your AD infrastructure via RADIUS.  You can use your own RADIUS server or ACS / AD for authentication.
    I've used it in the past and it is very good.
    The first link gives you some detail on PEAP.
    http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps430/prod_qas0900aecd801764fa.html
    The second link is a configuration guide.
    http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a0080665d18.shtml
    Ven

  • Ise and switch authentication and privilege level

    Hi Guys,
    I'm working on an eval on vmware. I have got everything working for wlan authentication and I’m working on shell authentication for switches. On the ACS you have the possibility to give the user privilege level on the switch. You can do this with shell profiles in ACS.
    Is there a way to get this done in ISE? I was thinking to make a result policy elements but I can't find a shell profile or privilege attributes like in ACS.
    For the record, switch authentication is working with Active Directory. I only need to know how to give the right return attribute.
    I appreciate any help!
    Sander

    @Sander,
    You were in the right area. 
    Policy->Results->Authorization->Authorization Profiles.
    Create AuthZ profile for Access-Accept and Under the Advanced Attributes Settings you can use:
    Cisco:cisco-av-pair = shell:priv-lvl=15
    or whatever privilege level you want to assign.
    On your AuthZ rule, match the conditions and apply the created profile.

  • Cisco RV120W crashed several times a day

    Hello,
    we are using the Cisco RV120W for our little network. The latest firmware (1.0.4.10) is installed!
    But the router crashes about 6-10 times a day and have to be restarted. The Web Interface is also not available then.
    It is configured as the subnet 192.168.12.0/24
    The WAN connection is a static ip to a public subnet.
    VLAN 1 is the default LAN (see above).
    DHCP is enabled in that network and DNS proxy is disabled.
    VLAN 2 is 192.168.10.12 whitout DHCP.
    Ethernet Port 1 is configured as VLAN 2 for another subnet (192.168.10.0/24 from another router).
    The other ports an WLAN are using VLAN 1 (192.168.12.0/24).
    WLAN authentication is enabled (SSID 1) with a WPA2-PSK password.
    After i reboot the router the logs are empty and i just can see the logs while the router is running.
    after about 30 minutes i copied the logs from the router:
    These are the "error" logs:
    Sat Jan  1 01:02:17 2000(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    Sat Jan  1 01:02:22 2000(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    Sat Jan  1 01:02:37 2000(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    Fri Aug 30 15:25:40 2013(CET) [rv120w][System][FIREWALL] fwPPTPGenericRules.c: inet_aton failed
    Fri Aug 30 15:25:40 2013(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    Fri Aug 30 15:25:57 2013(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    Fri Aug 30 15:26:04 2013(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    Fri Aug 30 15:26:15 2013(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    Fri Aug 30 15:26:47 2013(CET) [rv120w][System][FIREWALL] fwPPTPGenericRules.c: inet_aton failed
    Fri Aug 30 15:26:48 2013(CET) [rv120w][System][PLATFORM] [BONJOUR_ERROR]: DNSServiceProcessResult returned -65537 stopping listen to mdnsd
    Fri Aug 30 15:26:51 2013(CET) [rv120w][System][PLATFORM] [BONJOUR_ERROR]: Signal Sent to bonjourClient Failed
    Fri Aug 30 15:26:52 2013(CET) [rv120w][System][PLATFORM] [BONJOUR_ERROR]: DNSServiceProcessResult returned -65537 stopping listen to mdnsd
    Fri Aug 30 15:26:54 2013(CET) [rv120w][System][PLATFORM] [BONJOUR_ERROR]: Signal Sent to bonjourClient Failed
    Fri Aug 30 15:26:58 2013(CET) [rv120w][System][PLATFORM] [BONJOUR_ERROR]: Signal Sent to bonjourClient Failed
    Fri Aug 30 15:27:00 2013(CET) [rv120w][Local0-wireless][UDOT11] wpaAuthRecvPTKMsg2: mic check failed
    Fri Aug 30 15:27:01 2013(CET) [rv120w][Local0-wireless][UDOT11] wpaAuthRecvPTKMsg2: mic check failed
    Fri Aug 30 15:27:01 2013(CET) [rv120w][System][PLATFORM] [BONJOUR_ERROR]: Signal Sent to bonjourClient Failed
    Fri Aug 30 15:27:01 2013(CET) [rv120w][Local0-wireless][UDOT11] wpaAuthRecvPTKMsg2: mic check failed
    Fri Aug 30 15:27:02 2013(CET) [rv120w][System][EVTDSPTCH] umiIoctl (43, UMI_CMD_DB_UPDATE(4)) failed. table=FirewallRules row=101
    Fri Aug 30 15:27:27 2013(CET) [rv120w][Local0-wireless][UDOT11] wpaAuthRecvPTKMsg2: mic check failed
    Fri Aug 30 15:27:28 2013(CET) [rv120w][Local0-wireless][UDOT11] wpaAuthRecvPTKMsg2: mic check failed
    Fri Aug 30 15:27:28 2013(CET) [rv120w][Local0-wireless][UDOT11] wpaAuthRecvPTKMsg2: mic check failed
    Fri Aug 30 15:27:52 2013(CET) [rv120w][System][FIREWALL] fwPPTPGenericRules.c: inet_aton failed
    And these are the "warning" logs:
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] CVMSEG size: 2 cache lines (256 bytes)
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] CPU revision is: 000d0601
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Determined physical RAM map:
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL]  memory: 0000000003800000 @ 0000000000700000 (usable)
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Built 1 zonelists.  Total pages: 14116
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Primary instruction cache 32kB, virtually tagged, 4 way, 64 sets, linesize 128 bytes.
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Primary data cache 16kB, 64-way, 2 sets, linesize 128 bytes.
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] PID hash table entries: 256 (order: 8, 2048 bytes)
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Using 300.000 MHz high precision timer.
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Dentry cache hash table entries: 8192 (order: 4, 65536 bytes)
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Inode-cache hash table entries: 4096 (order: 3, 32768 bytes)
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Calibrating delay using timer specific routine.. 600.35 BogoMIPS (lpj=1200701)
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Mount-cache hash table entries: 256
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Checking for the multiply/shift bug... no.
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Checking for the daddi bug... no.
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Checking for the daddiu bug... no.
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Enabling Octeon big bar support
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] PCI Status: PCI 32-bit
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] IP route cache hash table entries: 512 (order: 0, 4096 bytes)
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] TCP established hash table entries: 2048 (order: 3, 32768 bytes)
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] TCP bind hash table entries: 2048 (order: 2, 16384 bytes)
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] /proc/octeon_perf: Octeon performace counter interface loaded
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Total HugeTLB memory allocated, 0
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] RAMDISK driver initialized: 1 RAM disks of 500000K size 1024 blocksize
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] GACT probability NOT on
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Mirror/redirect action on
    Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] u32 classifier
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL]     Performance counters on
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL]     Actions configured
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack version 2.4 (224 buckets, 1792 max) - 352 bytes per conntrack
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_rtsp v0.6.21 loading
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_nat_rtsp v0.6.21 loading
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_tables: (C) 2000-2006 Netfilter Core Team
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] netfilter PSD loaded - (c) astaro AG
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ipt_time loading
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Bootbus flash: Setting flash for 16MB flash at 0x1ec00000
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL]  Amd/Fujitsu Extended Query Table at 0x0040
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] phys_mapped_flash: CFI does not contain boot bank location. Assuming top.
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] cavium-ethernet: Cavium Networks Octeon SDK version 1.7.3, build 264
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Register the sysctl for hardware offload succeed
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Register the sysctl for flow cache succeed
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Register the sysctl for brcm Tag succeed
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Register the sysctl for vlan enabled succeed
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Pool 0 size 2048 No 1024
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Pool 1 size 128 No 1024
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Pool 3 size 128 No 640
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] global cache allocation start 0
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Ipforward global cache allocation sucessfull
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Registerd the sysctl for IMP port status
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Registerd the sysctl for 802.1x enabled port
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Registerd the sysctl for blocking non EAP packets status
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Interface 0 has 2 ports (GMII)
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] 996
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] 999
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] 1037
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] 1039
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] port ko 0
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] port ko 1
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] led module init...
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] umi: module license 'unspecified' taints kernel.
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] eth0: 100 Mbps Full duplex, port  0, queue  0
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] eth1: 100 Mbps Full duplex, port  1, queue  1
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] PF_key: Initialized Security Policy Database.
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] IPsec: Initialized Security Association Processing.
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] BUG: at kernel/softirq.c:138 local_bh_enable()
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Call Trace:[<ffffffff80121150>][<ffffffff80121150>][<ffffffff8014b2e0>][<ffffffff802c58ec>][<c0000000002231ac>][<c000000000229460>][<c0000000001eea80>][<c000000000229eb4>][<ffffffff802c0a00>][<ffffffff8011ae80>][<ffffffff8011ae80>][<ffffffff801
    Sat Jan  1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] HTB: quantum of class 10001 is big. Consider r2q change.
    Sat Jan  1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL]
    <4>Intializing the 8021P-DSCP Remark Module
    Sat Jan  1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Registerd the sysctl for _8021p task IMP portPCI: Enabling device 0000:00:03.0 (0000 -> 0002)
    Sat Jan  1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] vap0: Broadcom BCM432c 802.11 Wireless Controller 5.60.120.9
    Sat Jan  1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_pptp version 3.1 loaded
    Sat Jan  1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] ip_nat_pptp version 3.0 loaded
    Sat Jan  1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] COEX: downgraded chanspec 0x2e09 to 0x2b0b: channel 5 used by exiting BSSs
    Sat Jan  1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] COEX: downgraded chanspec 0x2e0b to 0x2b0d: channel 6 used by exiting BSSs
    Sat Jan  1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] COEX: downgraded chanspec 0x2d03 to 0x2b01: channel 6 used by exiting BSSs
    Sat Jan  1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] COEX: downgraded chanspec 0x2e09 to 0x2b0b: channel 6 used by exiting BSSs
    Sat Jan  1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] COEX: downgraded chanspec 0x2e0b to 0x2b0d: channel 6 used by exiting BSSs
    Sat Jan  1 01:01:51 2000(CET) [rv120w][System][PLATFORM] IPv6 not configured on the interface
    Fri Aug 30 15:27:01 2013(CET) [rv120w][Kernel][KERNEL] ERROR:endChantRecv: protocol PNAC returned !OK
    Fri Aug 30 15:27:01 2013(CET) [rv120w][Kernel][KERNEL] ERROR:endChantRecv: protocol PNAC returned !OK
    Fri Aug 30 15:27:01 2013(CET) [rv120w][Kernel][KERNEL] ERROR:endChantRecv: protocol PNAC returned !OK
    Fri Aug 30 15:27:06 2013(CET) [rv120w][Kernel][KERNEL] ERROR:endChantRecv: protocol PNAC returned !OK
    Fri Aug 30 15:27:32 2013(CET) [rv120w][Kernel][KERNEL] ERROR:endChantRecv: protocol PNAC returned !OK
    Fri Aug 30 15:27:32 2013(CET) [rv120w][Kernel][KERNEL] ERROR:endChantRecv: protocol PNAC returned !OK
    Fri Aug 30 15:27:32 2013(CET) [rv120w][Kernel][KERNEL] ERROR:endChantRecv: protocol PNAC returned !OK
    Fri Aug 30 15:27:32 2013(CET) [rv120w][Kernel][KERNEL] ERROR:endChantRecv: protocol PNAC returned !OK
    hope you can help me!
    EDIT: This is a log file from today in the morning:
    [rv120w]Sat Jan 1 01:01:41 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:system op=23 row=1
    [rv120w]Sat Jan 1 01:01:43 2000(CET) [rv120w][System][PLATFORM] [BONJOUR_DEBUG]: Getting the results of Sql Query: SELECT value FROM environment WHERE name='BONJOUR_DEFAULT_SERVICE_NAME'
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][System][PLATFORM] [BONJOUR_DEBUG]: Performing SqlQry : UPDATE bonjourDefaultServices SET textRecord = 'model=RV120W;deviceType=Router;deviceDescr=Wireless-N-VPN-Router;slaves=0;fmVersion=1.0.4.10;PIDVID=RV12
    W-E V01;MACAddress=00077D150BCA;serialNo=SER15320A9Q
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Linux version 2.6.21.7-Cavium-Octeon ([email protected]) (gcc version 4.1.2 (Cavium Networks Version: 1_6_0, build 34)) #1 Mon Jun 18 13:30:50 IST 2012
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] CVMSEG size: 2 cache lines (256 bytes)
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] CPU revision is: 000d0601
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Determined physical RAM map:
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] memory: 0000000003800000 @ 0000000000700000 (usable)
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Wasting 100352 bytes for tracking 1792 unused pages
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Initrd not found or empty - disabling initrd
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] On node 0 totalpages: 14336
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL]   DMA zone: 220 pages used for memmap
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL]   DMA zone: 0 pages reserved
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL]   DMA zone: 14116 pages, LIFO batch:3
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL]   Normal zone: 0 pages used for memmap
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Built 1 zonelists. Total pages: 14116
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Kernel command line: bootoctlinux 0x3000200 mtdparts=phys_mapped_flash:512k(bootloader)ro,5632k(kernel),8704k(rootfs),1024k(data),128k(bootload-env) console=ttyS0,115200
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Primary instruction cache 32kB, virtually tagged, 4 way, 64 sets, linesize 128 bytes.
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Primary data cache 16kB, 64-way, 2 sets, linesize 128 bytes.
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Synthesized TLB refill handler (49 instructions).
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Synthesized TLB load handler fastpath (64 instructions).
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Synthesized TLB store handler fastpath (67 instructions).
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Synthesized TLB modify handler fastpath (64 instructions).
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] PID hash table entries: 256 (order: 8, 2048 bytes)
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Using 300.000 MHz high precision timer.
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Dentry cache hash table entries: 8192 (order: 4, 65536 bytes)
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Inode-cache hash table entries: 4096 (order: 3, 32768 bytes)
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Memory: 53600k/57344k available (3099k kernel code, 3688k reserved, 669k data, 1788k init, 0k highmem)
    [rv120w]Sat Jan  1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Calibrating delay using timer specific routine.. 600.35 BogoMIPS (lpj=1200702)
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Mount-cache hash table entries: 256
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Checking for the multiply/shift bug... no.
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Checking for the daddi bug... no.
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Checking for the daddiu bug... no.
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] NET: Registered protocol family 16
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Enabling Octeon big bar support
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] PCI Status: PCI 32-bit
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] NET: Registered protocol family 2
    [rv120w]Sat Jan 1 01:01:44 2000(CET) [rv120w][Kernel][KERNEL] Time: MIPS clocksource has been installed.
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] IP route cache hash table entries: 512 (order: 0, 4096 bytes)
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] TCP established hash table entries: 2048 (order: 3, 32768 bytes)
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] TCP bind hash table entries: 2048 (order: 2, 16384 bytes)
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] TCP: Hash tables configured (established 2048 bind 2048)
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] TCP reno registered
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] /proc/octeon_perf: Octeon performace counter interface loaded
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Total HugeTLB memory allocated, 0
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] squashfs: version 3.0 (2006/03/15) Phillip Lougher
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] JFFS2 version 2.2. (NAND) (C) 2001-2006 Red Hat, Inc.
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] io scheduler noop registered
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] io scheduler cfq registered (default)
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Serial: 8250/16550 driver $Revision: 1.90 $ 4 ports, IRQ sharing enabled
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] RAMDISK driver initialized: 1 RAM disks of 500000K size 1024 blocksize
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] loop: loaded (max 8 devices)
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] PPP generic driver version 2.4.2
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] PPP BSD Compression module registered
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] MPPE/MPPC encryption/compression module registered
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] NET: Registered protocol family 24
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] slram: not enough parameters.
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] i2c /dev entries driver
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] GACT probability NOT on
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Mirror/redirect action on
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] u32 classifier
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL]     Performance counters on
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL]     Actions configured
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack version 2.4 (224 buckets, 1792 max) - 352 bytes per conntrack
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_rsh: registering helper for port #0: 514/TCP
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_rsh: helper match ip   0.0.0.0:514-0.0.0.0:0
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_rsh: helper match mask 0.0.0.0:64512-0.0.0.0:64512
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_rtsp v0.6.21 loading
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] net/ipv4/netfilter/ip_conntrack_rtsp.c: ip_conntrack_rtsp_init: port #0: 554
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_nat_rtsp v0.6.21 loading
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_tables: (C) 2000-2006 Netfilter Core Team
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ipt_account 0.1.7 : Piotr Gasid³o <[email protected]>, http://www.barbara.eu.org/~quaker/ipt_account/
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] netfilter PSD loaded - (c) astaro AG
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ipt_time loading
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_rpc_tcp: registering helper for port #0: 111/TCP
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_rpc_tcp: helper match ip   0.0.0.0:0->0.0.0.0:111
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_rpc_tcp: helper match mask 0.0.0.0:0->0.0.0.0:65535
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_rpc_tcp: disabling Legato NetWorker support for port 0/TCP
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ipt_rpc: registering match [rpc] for;
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ipt_rpc:   port 111 (UDP|TCP);
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_rpc_udp: registering helper for port #0: 111/UDP
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_rpc_udp: helper match ip   0.0.0.0:0->0.0.0.0:111
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_rpc_udp: helper match mask 0.0.0.0:0->0.0.0.0:65535
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] TCP cubic registered
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] NET: Registered protocol family 1
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] NET: Registered protocol family 10
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] IPv6 over IPv4 tunneling driver
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] NET: Registered protocol family 17
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] 802.1Q VLAN Support v1.8 Ben Greear <[email protected]>
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] All bugs added by David S. Miller <[email protected]>
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] serial8250: ttyS0 at MMIO 0x1180000000800 (irq = 42) is a 16550A
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Bootbus flash: Setting flash for 16MB flash at 0x1ec00000
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] phys_mapped_flash: Found 1 x16 devices at 0x0 in 8-bit bank
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Amd/Fujitsu Extended Query Table at 0x0040
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] phys_mapped_flash: CFI does not contain boot bank location. Assuming top.
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] number of CFI chips: 1
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] cfi_cmdset_0002: Disabling erase-suspend-program due to code brokenness.
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] 5 cmdlinepart partitions found on MTD device phys_mapped_flash
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] Creating 5 MTD partitions on "phys_mapped_flash":
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] 0x00000000-0x00080000 : "bootloader"
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] 0x00080000-0x00600000 : "kernel"
    [rv120w]Sat Jan 1 01:01:45 2000(CET) [rv120w][Kernel][KERNEL] 0x00600000-0x00e80000 : "rootfs"
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] 0x00e80000-0x00f80000 : "data"
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] 0x00f80000-0x00fa0000 : "bootload-env"
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Freeing unused kernel memory: 1788k freed
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] cavium-ethernet: Cavium Networks Octeon SDK version 1.7.3, build 264
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Register the sysctl for hardware offload succeed
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Register the sysctl for flow cache succeed
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Register the sysctl for brcm Tag succeed
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Register the sysctl for vlan enabled succeed
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Pool 0 size 2048 No 1024
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Pool 1 size 128 No 1024
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Pool 3 size 128 No 640
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] global cache allocation start 0
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Ipforward global cache allocation sucessfull
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Registerd the sysctl for IMP port status
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Registerd the sysctl for 802.1x enabled port
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Registerd the sysctl for blocking non EAP packets status
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Interface 0 has 2 ports (GMII)
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] 996
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] 999
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] 1037
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] 1039
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] port ko 0
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] port ko 1
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] led module init...
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] umi: module license 'unspecified' taints kernel.
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] NET: Registered protocol family 32
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] kernel UMI module loaded
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] eth0: 100 Mbps Full duplex, port 0, queue 0
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] eth1: 100 Mbps Full duplex, port 1, queue 1
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Initializing PF_KEY V2 Key Management socket interface.
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] NET: Registered protocol family 15
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] PF_key: Started key_timehandler
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] PF_key: Initialized Security Policy Database.
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] IPsec: Initialized Security Association Processing.
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] XLR8 IPSec Framework Initialized
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Software Backend Registered with XLR8 IPSec Framework
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Adding AH4 protocol processing.
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Adding ESP4 protocol processing.
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Adding IPCOMP4 protocol processing.
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Adding packet sink.
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] BUG: at kernel/softirq.c:138 local_bh_enable()
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Call Trace:[<ffffffff80121150>][<ffffffff80121150>][<ffffffff8014b2e0>][<ffffffff802c58ec>][<c0000000002231ac>][<c000000000229460>][<c0000000001eea80>][<c000000000229eb4>][<ffffffff802c0a00>]
    <ffffffff8011ae80>][<ffffffff8011ae80>][<ffffffff801
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] HTB: quantum of class 10001 is big. Consider r2q change.
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL]
    <4>Intializing the 8021P-DSCP Remark Module
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Registerd the sysctl for _8021p task IMP portPCI: Enabling device 0000:00:03.0 (0000 -> 0002)
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] vap0: Broadcom BCM432c 802.11 Wireless Controller 5.60.120.9
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] HDLC line discipline: version $Revision: 4.8 $, maxframe=4096
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] N_HDLC line discipline registered.
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] Loading mii
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] using bcm switch bcm5395
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] privlegedID 4094 wanporttNo: 5
    [rv120w]Sat Jan 1 01:01:46 2000(CET) [rv120w][Kernel][KERNEL] eth1: no IPv6 routers present
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0: no IPv6 routers present
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] Loading ifDev module
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack_pptp version 3.1 loaded
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] ip_nat_pptp version 3.0 loaded
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] COEX: downgraded chanspec 0x2e09 to 0x2b0b: channel 6 used by exiting BSSs
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] COEX: downgraded chanspec 0x2e0b to 0x2b0d: channel 6 used by exiting BSSs
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] COEX: downgraded chanspec 0x2e09 to 0x2b0b: channel 6 used by exiting BSSs
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] COEX: downgraded chanspec 0x2e0b to 0x2b0d: channel 6 used by exiting BSSs
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] vap0: no IPv6 routers present
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] IPsec: device down: eth0
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] device eth0 entered promiscuous mode
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] bdg1: port 1(eth0) entering learning state
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] device eth0 left promiscuous mode
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] bdg1: port 1(eth0) entering disabled state
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: add 33:33:00:00:00:01 mcast address to master interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: add 01:00:5e:00:00:01 mcast address to master interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: add 33:33:ff:15:0b:ca mcast address to master interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: del 33:33:ff:15:0b:ca mcast address from vlan interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: del 33:33:ff:15:0b:ca mcast address from master interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: del 01:00:5e:00:00:01 mcast address from vlan interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: del 01:00:5e:00:00:01 mcast address from master interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: del 33:33:00:00:00:01 mcast address from vlan interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: del 33:33:00:00:00:01 mcast address from master interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] IPsec: device down: eth0.1
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] device eth0.1 entered promiscuous mode
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: dev_set_promiscuity(master, 1)
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] device eth0 entered promiscuous mode
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: add 01:00:5e:00:00:01 mcast address to master interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: add 33:33:00:00:00:01 mcast address to master interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: add 33:33:ff:15:0b:ca mcast address to master interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] bdg1: port 1(eth0.1) entering learning state
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] IPsec: device down: vap0
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] device vap0 entered promiscuous mode
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] bdg1: port 2(vap0) entering learning state
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: add 33:33:00:00:00:01 mcast address to master interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: add 01:00:5e:00:00:01 mcast address to master interface
    [rv120w]Sat Jan 1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: add 33:33:ff:15:0b:ca mcast address to master interface
    [rv120w]Sat Jan  1 01:01:47 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: del 33:33:ff:15:0b:ca mcast address from vlan interface
    [rv120w]Sat Jan 1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: del 33:33:ff:15:0b:ca mcast address from master interface
    [rv120w]Sat Jan  1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: del 01:00:5e:00:00:01 mcast address from vlan interface
    [rv120w]Sat Jan 1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: del 01:00:5e:00:00:01 mcast address from master interface
    [rv120w]Sat Jan  1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: del 33:33:00:00:00:01 mcast address from vlan interface
    [rv120w]Sat Jan 1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: del 33:33:00:00:00:01 mcast address from master interface
    [rv120w]Sat Jan  1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] IPsec: device down: eth0.2
    [rv120w]Sat Jan 1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: dev_set_promiscuity(master, 1)
    [rv120w]Sat Jan 1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: add 01:00:5e:00:00:01 mcast address to master interface
    [rv120w]Sat Jan 1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: add 33:33:00:00:00:01 mcast address to master interface
    [rv120w]Sat Jan 1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: add 33:33:ff:15:0b:ca mcast address to master interface
    [rv120w]Sat Jan 1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] bdg2: port 1(eth0.2) entering learning state
    [rv120w]Sat Jan 1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] bdg1: no IPv6 routers present
    [rv120w]Sat Jan 1 01:01:48 2000(CET) [rv120w][Kernel][KERNEL] bdg2: no IPv6 routers present
    [rv120w]Sat Jan 1 01:01:49 2000(CET) [rv120w][Kernel][KERNEL] eth0: no IPv6 routers present
    [rv120w]Sat Jan 1 01:01:49 2000(CET) [rv120w][Kernel][KERNEL] vap0: no IPv6 routers present
    [rv120w]Sat Jan 1 01:01:49 2000(CET) [rv120w][Kernel][KERNEL] eth0.2: no IPv6 routers present
    [rv120w]Sat Jan 1 01:01:49 2000(CET) [rv120w][Kernel][KERNEL] eth0.1: no IPv6 routers present
    [rv120w]Sat Jan 1 01:01:49 2000(CET) [rv120w][Kernel][KERNEL] bdg1: topology change detected, propagating
    [rv120w]Sat Jan 1 01:01:49 2000(CET) [rv120w][Kernel][KERNEL] bdg1: port 1(eth0.1) entering forwarding state
    [rv120w]Sat Jan 1 01:01:49 2000(CET) [rv120w][Kernel][KERNEL] bdg1: topology change detected, propagating
    [rv120w]Sat Jan 1 01:01:49 2000(CET) [rv120w][Kernel][KERNEL] bdg1: port 2(vap0) entering forwarding state
    [rv120w]Sat Jan 1 01:01:49 2000(CET) [rv120w][Kernel][KERNEL] bdg2: topology change detected, propagating
    [rv120w]Sat Jan 1 01:01:49 2000(CET) [rv120w][Kernel][KERNEL] bdg2: port 1(eth0.2) entering forwarding state
    [rv120w]Sat Jan 1 01:01:49 2000(CET) [rv120w][System][FIREWALL] ____/pfrm2.0/bin/ipset -A webFltr 192.168.10.12___
    [rv120w]Sat Jan 1 01:01:49 2000(CET) [rv120w][System][FIREWALL] restartStatus = 0 for LogicalIfName = LAN2
    [rv120w]Sat Jan 1 01:01:52 2000(CET) [rv120w][System][PLATFORM] IPv6 not configured on the interface
    [rv120w]Sat Jan 1 01:01:53 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:ipAddressTable op=18 row=5
    [rv120w]Sat Jan 1 01:01:53 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:18 rowId:5
    [rv120w]Sat Jan 1 01:01:53 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:01:54 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:18 rowId:5
    [rv120w]Sat Jan 1 01:01:54 2000(CET) [rv120w][Kernel][KERNEL] manufacturingCo uses obsolete (PF_INET,SOCK_PACKET)
    [rv120w]Sat Jan 1 01:01:54 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:01:54 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:01:54 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:01:54 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:01:54 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:01:54 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:01:54 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:01:54 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:01:54 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:01:54 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:01:55 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:networkInterface op=18 row=9
    [rv120w]Sat Jan 1 01:01:55 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:18 rowId:9
    [rv120w]Sat Jan 1 01:01:55 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:01:56 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:18 rowId:9
    [rv120w]Sat Jan 1 01:01:56 2000(CET) [rv120w][System][PLATFORM] igmpMgmtDBUpdateHandler: update received: Table: networkInterface opCode: 18 rowId: 9
    [rv120w]Sat Jan 1 01:01:56 2000(CET) [rv120w][System][PLATFORM] igmpDisable: failed to disable IGMP proxy. IGMP proxy may not be running at all!
    [rv120w]Sat Jan 1 01:01:57 2000(CET) [rv120w][System][PLATFORM] Disabling Firewall Rule for DHCP Relay Protocol
    [rv120w]Sat Jan 1 01:01:57 2000(CET) [rv120w][System][PLATFORM] ddnsMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:18 rowId:9
    [rv120w]Sat Jan 1 01:01:58 2000(CET) [rv120w][System][FIREWALL] ____/pfrm2.0/bin/ipset -D webFltr 0.0.0.0___
    [rv120w]Sat Jan 1 01:01:58 2000(CET) [rv120w][System][FIREWALL] ____/pfrm2.0/bin/ipset -A webFltr 192.168.12.1___
    [rv120w]Sat Jan 1 01:01:58 2000(CET) [rv120w][System][FIREWALL] restartStatus = 1 for LogicalIfName = LAN
    [rv120w]Sat Jan 1 01:01:58 2000(CET) [rv120w][System][FIREWALL] Restarting Firewall For LAN Address Update from 0.0.0.0:192.168.12.1
    [rv120w]Sat Jan 1 01:01:59 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:ipAddressTable op=23 row=1
    [rv120w]Sat Jan 1 01:01:59 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:1
    [rv120w]Sat Jan 1 01:01:59 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:01:59 2000(CET) [rv120w][Kernel][KERNEL] printk: 30 messages suppressed.
    [rv120w]Sat Jan 1 01:01:59 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:01:59 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:1
    [rv120w]Sat Jan 1 01:02:01 2000(CET) [rv120w][System][FIREWALL] ____/pfrm2.0/bin/ipset -D webFltr 192.168.12.1___
    [rv120w]Sat Jan 1 01:02:01 2000(CET) [rv120w][System][FIREWALL] ____/pfrm2.0/bin/ipset -A webFltr 192.168.12.1___
    [rv120w]Sat Jan 1 01:02:01 2000(CET) [rv120w][System][FIREWALL] restartStatus = 1 for LogicalIfName = LAN
    [rv120w]Sat Jan 1 01:02:01 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:ipAddressTable op=23 row=1
    [rv120w]Sat Jan 1 01:02:01 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:1
    [rv120w]Sat Jan 1 01:02:01 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:02:01 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:1
    [rv120w]Sat Jan 1 01:02:03 2000(CET) [rv120w][System][FIREWALL] restartStatus = 1 for LogicalIfName = WAN1
    [rv120w]Sat Jan 1 01:02:03 2000(CET) [rv120w][System][FIREWALL] Restarting Firewall For WAN1 Address Update from 0.0.0.0:193.158.228.75
    [rv120w]Sat Jan 1 01:02:03 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:ipAddressTable op=23 row=2
    [rv120w]Sat Jan 1 01:02:03 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:2
    [rv120w]Sat Jan 1 01:02:04 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:02:04 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:2
    [rv120w]Sat Jan 1 01:02:04 2000(CET) [rv120w][Kernel][KERNEL] printk: 29 messages suppressed.
    [rv120w]Sat Jan 1 01:02:04 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:02:05 2000(CET) [rv120w][System][FIREWALL] ____/pfrm2.0/bin/ipset -D webFltr 192.168.2.1___
    [rv120w]Sat Jan 1 01:02:05 2000(CET) [rv120w][System][FIREWALL] ____/pfrm2.0/bin/ipset -A webFltr 192.168.10.12___
    [rv120w]Sat Jan 1 01:02:06 2000(CET) [rv120w][System][FIREWALL] restartStatus = 0 for LogicalIfName = LAN2
    [rv120w]Sat Jan 1 01:02:06 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:ipAddressTable op=23 row=5
    [rv120w]Sat Jan 1 01:02:06 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:5
    [rv120w]Sat Jan 1 01:02:06 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:02:06 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:5
    [rv120w]Sat Jan 1 01:02:08 2000(CET) [rv120w][System][FIREWALL] ____/pfrm2.0/bin/ipset -D webFltr 192.168.10.12___
    [rv120w]Sat Jan 1 01:02:08 2000(CET) [rv120w][System][FIREWALL] ____/pfrm2.0/bin/ipset -A webFltr 192.168.10.12___
    [rv120w]Sat Jan 1 01:02:08 2000(CET) [rv120w][System][FIREWALL] restartStatus = 0 for LogicalIfName = LAN2
    [rv120w]Sat Jan 1 01:02:08 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:ipAddressTable op=23 row=5
    [rv120w]Sat Jan 1 01:02:08 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:5
    [rv120w]Sat Jan 1 01:02:08 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:02:08 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:5
    [rv120w]Sat Jan 1 01:02:09 2000(CET) [rv120w][Kernel][KERNEL] printk: 56 messages suppressed.
    [rv120w]Sat Jan 1 01:02:09 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:02:10 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:dhcpCfgLoad op=23 row=1
    [rv120w]Sat Jan 1 01:02:10 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:resolverConfig op=23 row=2
    [rv120w]Sat Jan 1 01:02:13 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:resolverConfig op=23 row=2
    [rv120w]Sat Jan 1 01:02:14 2000(CET) [rv120w][Kernel][KERNEL] printk: 66 messages suppressed.
    [rv120w]Sat Jan 1 01:02:14 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:02:16 2000(CET) [rv120w][System][FIREWALL] restartStatus = 1 for LogicalIfName = WAN1
    [rv120w]Sat Jan 1 01:02:16 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:ipAddressTable op=23 row=2
    [rv120w]Sat Jan 1 01:02:16 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:2
    [rv120w]Sat Jan 1 01:02:17 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:02:17 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:2
    [rv120w]Sat Jan 1 01:02:18 2000(CET) [rv120w][System][NIMF] Setting LED [0]:[1] For WAN1
    [rv120w]Sat Jan 1 01:02:18 2000(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    [rv120w]Sat Jan 1 01:02:18 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:networkInterface op=23 row=3
    [rv120w]Sat Jan 1 01:02:19 2000(CET) [rv120w][Kernel][KERNEL] printk: 50 messages suppressed.
    [rv120w]Sat Jan 1 01:02:19 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:02:20 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:02:20 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:02:21 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:02:21 2000(CET) [rv120w][System][PLATFORM] igmpMgmtDBUpdateHandler: update received: Table: networkInterface opCode: 23 rowId: 3
    [rv120w]Sat Jan 1 01:02:22 2000(CET) [rv120w][System][PLATFORM] igmpDisable: failed to disable IGMP proxy. IGMP proxy may not be running at all!
    [rv120w]Sat Jan 1 01:02:22 2000(CET) [rv120w][System][PLATFORM] Disabling Firewall Rule for DHCP Relay Protocol
    [rv120w]Sat Jan 1 01:02:22 2000(CET) [rv120w][System][PLATFORM] ddnsMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:02:23 2000(CET) [rv120w][System][FIREWALL] Restarting Firewall [0]:[1] For WAN1
    [rv120w]Sat Jan 1 01:02:23 2000(CET) [rv120w][System][NIMF] Setting LED [0]:[1] For WAN1
    [rv120w]Sat Jan 1 01:02:23 2000(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    [rv120w]Sat Jan 1 01:02:23 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:networkInterface op=23 row=3
    [rv120w]Sat Jan 1 01:02:24 2000(CET) [rv120w][Kernel][KERNEL] printk: 85 messages suppressed.
    [rv120w]Sat Jan 1 01:02:24 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:02:25 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:02:25 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:02:26 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:02:26 2000(CET) [rv120w][System][PLATFORM] igmpMgmtDBUpdateHandler: update received: Table: networkInterface opCode: 23 rowId: 3
    [rv120w]Sat Jan 1 01:02:26 2000(CET) [rv120w][System][PLATFORM] igmpDisable: failed to disable IGMP proxy. IGMP proxy may not be running at all!
    [rv120w]Sat Jan 1 01:02:27 2000(CET) [rv120w][System][PLATFORM] Disabling Firewall Rule for DHCP Relay Protocol
    [rv120w]Sat Jan 1 01:02:27 2000(CET) [rv120w][System][PLATFORM] ddnsMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:02:28 2000(CET) [rv120w][System][FIREWALL] Restarting Firewall [0]:[1] For WAN1
    [rv120w]Sat Jan 1 01:02:28 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:NimfAFStatus op=23 row=1
    [rv120w]Sat Jan 1 01:02:28 2000(CET) [rv120w][System][PLATFORM] ddnsMgmtDBUpdateHandler:DBUpdate event: Table: NimfAFStatus opCode:23 rowId:1
    [rv120w]Sat Jan 1 01:02:28 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:resolverConfig op=23 row=2
    [rv120w]Sat Jan 1 01:02:29 2000(CET) [rv120w][Kernel][KERNEL] printk: 115 messages suppressed.
    [rv120w]Sat Jan 1 01:02:29 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:02:31 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:resolverConfig op=23 row=2
    [rv120w]Sat Jan 1 01:02:34 2000(CET) [rv120w][Kernel][KERNEL] printk: 133 messages suppressed.
    [rv120w]Sat Jan 1 01:02:34 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:02:35 2000(CET) [rv120w][System][FIREWALL] restartStatus = 1 for LogicalIfName = WAN1
    [rv120w]Sat Jan 1 01:02:35 2000(CET) [rv120w][System][FIREWALL] Restarting Firewall For WAN1 Address Update from 0.0.0.0:193.158.228.75
    [rv120w]Sat Jan 1 01:02:35 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:ipAddressTable op=23 row=2
    [rv120w]Sat Jan 1 01:02:35 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:2
    [rv120w]Sat Jan 1 01:02:35 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:02:35 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:2
    [rv120w]Sat Jan 1 01:02:37 2000(CET) [rv120w][System][NIMF] Setting LED [0]:[1] For WAN1
    [rv120w]Sat Jan 1 01:02:37 2000(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    [rv120w]Sat Jan 1 01:02:37 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:networkInterface op=23 row=3
    [rv120w]Sat Jan 1 01:02:39 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:02:39 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:02:39 2000(CET) [rv120w][Kernel][KERNEL] printk: 133 messages suppressed.
    [rv120w]Sat Jan 1 01:02:39 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:02:40 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:02:41 2000(CET) [rv120w][System][PLATFORM] igmpMgmtDBUpdateHandler: update received: Table: networkInterface opCode: 23 rowId: 3
    [rv120w]Sat Jan 1 01:02:41 2000(CET) [rv120w][System][PLATFORM] igmpDisable: failed to disable IGMP proxy. IGMP proxy may not be running at all!
    [rv120w]Sat Jan 1 01:02:41 2000(CET) [rv120w][System][PLATFORM] Disabling Firewall Rule for DHCP Relay Protocol
    [rv120w]Sat Jan 1 01:02:42 2000(CET) [rv120w][System][PLATFORM] ddnsMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:02:49 2000(CET) [rv120w][Kernel][KERNEL] printk: 96 messages suppressed.
    [rv120w]Sat Jan 1 01:02:49 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:02:49 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:02:54 2000(CET) [rv120w][Kernel][KERNEL] printk: 30 messages suppressed.
    [rv120w]Sat Jan 1 01:02:54 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][Kernel][KERNEL] printk: 33 messages suppressed.
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Enabling Attack Check for 0
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Enabling Attack Check for 1
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Enabling Attack Check for 2
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Enabling Attack Check for 3
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Enabling Attack Check for 4
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Enabling Attack Check for 5
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Enabling Attack Check for 6
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Enabling ICSA Notification Item 0
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Enabling Management Access from Internet to port 8200
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Disabling Source MAC Filtering
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Adding MAC Filter Policy for Block & Permit Rest
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Restarting Source MAC Address Policy
    [rv120w]Sat Jan 1 01:03:00 2000(CET) [rv120w][System][FIREWALL] Enabling DOS Attacks
    [rv120w]Sat Jan 1 01:03:03 2000(CET) [rv120w][System][FIREWALL] fwPPTPGenericRules.c: inet_aton failed
    [rv120w]Sat Jan 1 01:03:03 2000(CET) [rv120w][System][FIREWALL] Restarting Firewall [0]:[1] For WAN1
    [rv120w]Sat Jan 1 01:03:03 2000(CET) [rv120w][System][NIMF] Setting LED [0]:[1] For WAN1
    [rv120w]Sat Jan 1 01:03:03 2000(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    [rv120w]Sat Jan 1 01:03:03 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:networkInterface op=23 row=3
    [rv120w]Sat Jan 1 01:03:05 2000(CET) [rv120w][Kernel][KERNEL] printk: 102 messages suppressed.
    [rv120w]Sat Jan 1 01:03:05 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:03:05 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:03:06 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:03:06 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:03:07 2000(CET) [rv120w][System][PLATFORM] igmpMgmtDBUpdateHandler: update received: Table: networkInterface opCode: 23 rowId: 3
    [rv120w]Sat Jan 1 01:03:07 2000(CET) [rv120w][System][PLATFORM] igmpDisable: failed to disable IGMP proxy. IGMP proxy may not be running at all!
    [rv120w]Sat Jan 1 01:03:07 2000(CET) [rv120w][System][PLATFORM] Disabling Firewall Rule for DHCP Relay Protocol
    [rv120w]Sat Jan 1 01:03:07 2000(CET) [rv120w][System][PLATFORM] ddnsMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:03:08 2000(CET) [rv120w][System][FIREWALL] Restarting Firewall [0]:[1] For WAN1
    [rv120w]Sat Jan 1 01:03:08 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:NimfAFStatus op=23 row=1
    [rv120w]Sat Jan 1 01:03:08 2000(CET) [rv120w][System][PLATFORM] ddnsMgmtDBUpdateHandler:DBUpdate event: Table: NimfAFStatus opCode:23 rowId:1
    [rv120w]Sat Jan 1 01:03:08 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:resolverConfig op=23 row=2
    [rv120w]Sat Jan 1 01:03:10 2000(CET) [rv120w][Kernel][KERNEL] printk: 129 messages suppressed.
    [rv120w]Sat Jan 1 01:03:10 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:03:12 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:resolverConfig op=23 row=2
    [rv120w]Sat Jan 1 01:03:15 2000(CET) [rv120w][Kernel][KERNEL] printk: 99 messages suppressed.
    [rv120w]Sat Jan 1 01:03:15 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:03:15 2000(CET) [rv120w][System][FIREWALL] restartStatus = 1 for LogicalIfName = WAN1
    [rv120w]Sat Jan 1 01:03:15 2000(CET) [rv120w][System][FIREWALL] Restarting Firewall For WAN1 Address Update from 0.0.0.0:193.158.228.75
    [rv120w]Sat Jan 1 01:03:15 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:ipAddressTable op=23 row=2
    [rv120w]Sat Jan 1 01:03:15 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:2
    [rv120w]Sat Jan 1 01:03:16 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:03:16 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: ipAddressTable opCode:23 rowId:2
    [rv120w]Sat Jan 1 01:03:17 2000(CET) [rv120w][System][NIMF] Setting LED [0]:[1] For WAN1
    [rv120w]Sat Jan 1 01:03:17 2000(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    [rv120w]Sat Jan 1 01:03:17 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:networkInterface op=23 row=3
    [rv120w]Sat Jan 1 01:03:19 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:03:19 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:03:20 2000(CET) [rv120w][Kernel][KERNEL] printk: 132 messages suppressed.
    [rv120w]Sat Jan 1 01:03:20 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:03:20 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:03:20 2000(CET) [rv120w][System][PLATFORM] igmpMgmtDBUpdateHandler: update received: Table: networkInterface opCode: 23 rowId: 3
    [rv120w]Sat Jan 1 01:03:21 2000(CET) [rv120w][System][PLATFORM] igmpDisable: failed to disable IGMP proxy. IGMP proxy may not be running at all!
    [rv120w]Sat Jan 1 01:03:21 2000(CET) [rv120w][System][PLATFORM] Disabling Firewall Rule for DHCP Relay Protocol
    [rv120w]Sat Jan 1 01:03:21 2000(CET) [rv120w][System][PLATFORM] ddnsMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:03:22 2000(CET) [rv120w][System][FIREWALL] Restarting Firewall [0]:[1] For WAN1
    [rv120w]Sat Jan 1 01:03:22 2000(CET) [rv120w][System][NIMF] Setting LED [0]:[1] For WAN1
    [rv120w]Sat Jan 1 01:03:22 2000(CET) [rv120w][System][NIMF] nimfNetIfaceTblHandler: unable to get LedPinId
    [rv120w]Sat Jan 1 01:03:22 2000(CET) [rv120w][System][PLATFORM] platformHandleDBUpdate:networkInterface op=23 row=3
    [rv120w]Sat Jan 1 01:03:24 2000(CET) [rv120w][System][PLATFORM] pptpdMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:03:24 2000(CET) [rv120w][System][PLATFORM] options.pptpd file found
    [rv120w]Sat Jan 1 01:03:25 2000(CET) [rv120w][System][PLATFORM] upnpMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:03:25 2000(CET) [rv120w][Kernel][KERNEL] printk: 186 messages suppressed.
    [rv120w]Sat Jan 1 01:03:25 2000(CET) [rv120w][Kernel][KERNEL] ip_conntrack: table full, dropping packet.
    [rv120w]Sat Jan 1 01:03:25 2000(CET) [rv120w][System][PLATFORM] igmpMgmtDBUpdateHandler: update received: Table: networkInterface opCode: 23 rowId: 3
    [rv120w]Sat Jan 1 01:03:25 2000(CET) [rv120w][System][PLATFORM] igmpDisable: failed to disable IGMP proxy. IGMP proxy may not be running at all!
    [rv120w]Sat Jan 1 01:03:26 2000(CET) [rv120w][System][PLATFORM] Disabling Firewall Rule for DHCP Relay Protocol
    [rv120w]Sat Jan 1 01:03:26 2000(CET) [rv120w][System][PLATFORM] ddnsMgmtDBUpdateHandler:DBUpdate event: Table: networkInterface opCode:23 rowId:3
    [rv120w]Sat Jan 1 01:03:27 2000(CET) [rv120w][System][FIREWALL] Restart

    This sounds like you may have a faulty unit.  I'd recommend opening a case with STAC to troubleshoot or RMA the device.  Let me know if you have any questions.  Have a wonderful day!
    -Trent Good
    ** Please rate useful posts! **

  • AP12000 can not assign IP address to client

    upgrade to the latest firmware.
    want to setup ap1200 as a dhcp server for wireless client. but it seems there something wrong with setup. client cannot get IP address from AP. please take a look my configuration
    version 12.2
    no service pad
    service timestamps debug datetime msec
    service timestamps log datetime msec
    service password-encryption
    hostname xxx03
    enable secret xxx.
    username admin password xxx
    ip subnet-zero
    ip dhcp pool xxxpool3
    network 192.168.105.72 255.255.255.248
    default-router 192.168.105.65
    domain-name xxxx.com
    bridge irb
    interface Dot11Radio0
    no ip address
    no ip route-cache
    ssid XXX WLAN
    authentication open
    guest-mode
    speed basic-1.0 basic-2.0 basic-5.5 basic-11.0
    rts threshold 2312
    station-role root
    bridge-group 1
    bridge-group 1 subscriber-loop-control
    bridge-group 1 block-unknown-source
    no bridge-group 1 source-learning
    no bridge-group 1 unicast-flooding
    bridge-group 1 spanning-disabled
    interface FastEthernet0
    no ip address
    no ip route-cache
    duplex auto
    speed auto
    bridge-group 1
    no bridge-group 1 source-learning
    bridge-group 1 spanning-disabled
    interface BVI1
    ip address 192.168.105.69 255.255.255.192
    no ip route-cache
    ip default-gateway 192.168.105.65
    ip http server
    ip http help-path http://www.cisco.com/warp/public/779/smbiz/prodconfig/help/eag/ivory/1100
    bridge 1 route ip
    line con 0
    line vty 0 4
    login local
    line vty 5 15
    login
    end

    You will need to provide some additional detail about your setup.
    Version of CRM?
    Is IDF and/or ADFS setup?
    Some basic things to check:
    From the client computer, does a nslookup of the CRM server name resolve?  If not, it may be a DNS issue.
    Is the CRM site in IIS listening to all IP addresses?  Or set to listen to only one?
    Was a host header set up in IIS for the CRM site?
    What error do you get when you use the CRM server name from the client machine?  Only IP addresses working is a sign of a kerberos issue.  Check that you have the correct SPN's created for a non machine account running the CRM app pool in IIS.
    Jason Peterson

  • Problem using a NETGEAR wg111v2 USB wireless adapter

    The adapter wad recognized by the system. It was using the rtl8187 module. When I type iwconfig, there is an entry of wlan0. The result of "iwlist scan" looks to be just right. But when I type "iwconfig wlan0 essid ...", the link quality, signal level are all 0. However, in the result of "iwlist scan", these values are non-zero.
    Then I started to wonder maybe rtl8187 is not totally compatible with this card. Therefore I installed ndiswrapper, and downloaded the inf files for nearly every version NETGEAR has supplied. I followed the instructions in http://wiki.archlinux.org/index.php/Wir … diswrapper . After I disabled rtl8187 and enabled ndiswrapper in rc.conf, "iwlist scan" begins to show no meaningful results at all. Sometimes it finds a "managed" source with essid "", sometimes it just finds nothing. no other results have been found.
    I am confused...
    How should I handle this? Any other one has similar experiences?

    Yes, "Access Point: Not-Associated".
    In dmesg's result:
    wlan: authenticated
    wlan0: associate with AP 00:18:3a:ae:d0:74
    wlan0: associate with AP 00:18:3a:ae:d0:74
    wlan0: associate with AP 00:18:3a:ae:d0:74
    wlan0: association with AP 00:18:3a:ae:d0:74 timed out
    Where else should I look at to find interesting logs?
    It's now the rtl8187 module. So how, normally, should I handle this?
    Thank you for your reply
    Last edited by xuehuichao (2009-01-12 00:20:17)

  • WLC "radius server overwrite interface" setting

    Hello
    I'm looking at using "radius server overwrite interface" on a WLAN as a replacement for Called-Station-ID for Radius to match on SSID.
    When I enable "radius server overwrite interface" on a WLAN and join a client to the SSID I can see (via packet capture) that the WLC is correctly sourcing the Radius packets with the WLAN's "dynamic" interface IP Address. The problem is that the Radius server doesn't repond to these requests. Radius is configured with rules to match the new IP address but I see nothing (pass or fail) in the logs.
    Interestingly, the packet captures shows the correct NAS IP address (the WLAN interface IP Address) but always shows the WLC hostname as NAS-ID (regardless of NAS-ID settings on the WLAN or WLAN interface)
    I've tried WLC software 7.4.110.0, 7.4.121.0 and 7.6.100.0 with the same results but Radius never responds. Radius is Cisco ACS 5.5.0.46. Any ideas as to why this is happening?
    Thanks
    Andy

    Hi Scott
    installed ACS 5.4 0.46.6 and I still have the same problem - ACS doesn't respond to request from WLC when  "radius server overwrite interface" is enabled on WLAN and nothing appears in the logs. With  "radius server overwrite interface" disabled on the WLAN, authentication is a success and I can see this in the logs.
    I had a look a the packet captures I took earlier and the attributes in the Access-Request look ok - the only attribute I wasn't sure about was Message-Authenticator. Found this ietf document http://www.ietf.org/rfc/rfc2869.txt which mentions "silent discards" of Radius packets with non existent or incorrect Message-Authenticator attributes. I'm not sure if this is what I'm seeing on ACS when it receives the  "radius server overwrite interface" Access-Request packets. ACS is under contract so I will contact TAC about this.
    Mt production ACS cluster was upgraded from latest version of 5.3 to 5.5 with no loss of historic logs (logging after upgrade worked fine also). The upgrade did take a while with the log-collector. When it had completed I checked the Data Upgrade Status under Monitoring configuration and it showed that the upgrade was successful.
    Thanks for your help with this.
    Cheers
    Andy

Maybe you are looking for