User manual ALCATEL-LUCENT SPEEDTOUCH 620 1
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual ALCATEL-LUCENT SPEEDTOUCH 620. We hope that this ALCATEL-LUCENT SPEEDTOUCH 620 user guide will be useful to you.
Lastmanuals help download the user guide ALCATEL-LUCENT SPEEDTOUCH 620.
Manual abstract: user guide ALCATEL-LUCENT SPEEDTOUCH 6201
Detailed instructions for use are in the User's Guide.
[. . . ] SpeedTouchTM620
Wireless Business DSL Routers
CLI Reference Guide
Release R5. 3. 1
SpeedTouchTM 620
CLI Reference Guide R5. 3. 1
Copyright
Copyright ©1999-2005 THOMSON. Passing on, and copying of this document, use and communication of its contents is not permitted without written authorization from THOMSON. The content of this document is furnished for informational use only, may be subject to change without notice, and should not be construed as a commitment by THOMSON. THOMSON assumes no responsibility or liability for any errors or inaccuracies that may appear in this document. [. . . ] 7 Test loose disabled yes Another level in the firewall =>
E-DOC-CTC-20050531-0063 v1. 0
345
Firewall Commands
firewall level set
Set the security level or display the current security level.
SYNTAX: firewall level set
where: name The name of the security level to be set. OPTIONAL
[name = <string>]
Note
If no security level is specified, the current security level will be shown.
EXAMPLE:
=>firewall level list Level Config ============ Active level: Medium nr name udptrack service readonly description
-------------------------------------------------------------------------------------------------1 High strict disabled yes Use this Security Level to block all outgoing connections except well kno wn applications (DNS, HTTP, HTTPS, FTP, TELNET, IMAP, POP) and block all incoming connections. Services and Application Sharing are not allowed to open pinholes in the firewall. 6 BlockAll 7 Test strict loose disabled yes disabled yes Use this Security Level to block all traffic from and to the Internet. Another level in the firewall
=>firewall level set :firewall level set name=Disabled => =>firewall level set name=BlockAll =>firewall level set :firewall level set name=BlockAll =>
346
E-DOC-CTC-20050531-0063 v1. 0
Firewall Commands
firewall rule add
Add a firewall rule.
SYNTAX: firewall rule add chain = <string> [index = <number>] [name = <string>] [clink = <chain name>] [srcintf [!]= <{DHCP-S_if_0|DHCP-R_if_0|wan|local|lan| tunnel|dmz|guest|HTTPI_if_0|HTTP_if_0|HTTPs_if_0|FTP_if_0| TELNET_if_0|DNS-S_if_0|SNMP_AGENT_if_0|PING_RESPONDER_if_0| _Internet| _lan1|_wan1|_dmz1|_guest1}>] [srcip [!]= <{private|ssdp_ip|mdap_ip|_10. 0. 0. 138| _192. 168. 1. 254|_192. 168. 2. 254|_192. 168. 3. 254}>] [dstintf [!]= <{DHCP-S_if_0|DHCP-R_if_0|wan|local|lan |tunnel|dmz|guest|HTTPI_if_0|HTTP_if_0|HTTPs_if_0|FTP_if_0| TELNET_if_0|DNS-S_if_0|SNMP_AGENT_if_0| PING_RESPONDER_if_0|_Internet|_lan1|_wan1|_dmz1|_guest1}>] [dstip [!]= <{private|ssdp_ip|mdap_ip|_10. 0. 0. 138| _192. 168. 1. 254|_192. 168. 2. 254|_192. 168. 3. 254}>] [serv [!]= <{PPTPD_sv_0|PPTPGRE_sv_0|HTTP_sv_0|HTTPs_sv_0| RIP_sv_0|RIP-Query_sv_0|DNS-S_sv_0|DHCP-R_sv_0|DHCP-S_sv_0| SNMP_AGENT_sv_0|SSDP_sv_0|MDAP_sv_0|RAS_sv_0|SRAS_sv_0| ICMP_LISTEN_sv_0|SENDTO_LISTEN_sv_0|PING_RESPONDER_sv_0| FTP_sv_0|TELNET_sv_0|CWMP_server_sv_0|icmp|igmp|ftp|telnet| http|httpproxy|https|RPC|NBT|SMB|imap|imap3|imap4-ssl| imaps|pop2|pop3|pop3s|smtp|ssh|dns|nntp|ipsec|esp|ah|ike| DiffServ|sip|h323|dhcp|rtsp|ssdp_serv|mdap_serv|syslog| Quake3|Doom3|Steam Games|Unreal Tournament 2004}>] [state = <{disabled | enabled}>] action = <action>
If a value is preceded by a "!", it means NOT. For example "srcintf=!wan" means "if the source interface is different from WAN".
E-DOC-CTC-20050531-0063 v1. 0
347
Firewall Commands
where: chain index name clink srcintf srcip dstintf dstip serv log state action The name of the chain which contains the rule. The name of the chain to be parsed when this rule applies. The name of the source interface expression. The name of the destination interface expression. The name of the destination IP expression. Disable or enable logging is done when this rule applies. The action to be taken when this rule applies ('link' when clink is used). REQUIRED OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL REQUIRED
RELATED COMMANDS:
firewall rule delete Delete a firewall rule.
348
E-DOC-CTC-20050531-0063 v1. 0
Firewall Commands
firewall rule delete
Delete a firewall rule.
SYNTAX: firewall rule delete chain = <string> index = <number>
where: chain index The name of the chain in which a rule must be deleted. REQUIRED REQUIRED
RELATED COMMANDS:
firewall rule add Add a firewall rule.
E-DOC-CTC-20050531-0063 v1. 0
349
Firewall Commands
firewall rule flush
Flush all firewall rules.
SYNTAX: firewall rule flush
where: chain The name of the chain for which the rules must be flushed. OPTIONAL
[chain = <string>]
Note
If not specified, the rules of all the chains will be flushed.
350
E-DOC-CTC-20050531-0063 v1. 0
Firewall Commands
firewall rule list
Show a list of the firewall rules in a chain.
SYNTAX: firewall rule list [chain = <string>] [format = <{pretty | cli}>]
where: chain The name of the chain for which the rules must be listed. OPTIONAL
Note
format
If not specified, the rules of all the chains are shown. OPTIONAL
Select the output format in which the list must be shown. Choose between: pretty: the list is shown as intuitive output in clear text. cli: the list is shown via the CLI commands configuration. The default is pretty.
E-DOC-CTC-20050531-0063 v1. 0
351
Firewall Commands
EXAMPLE:
=>firewall rule list Rules (flags: C=Constant, D=Dynamic, E=Enable, L=Log) ===== Chain Nr. Flags Rule --------------------------------------------------------------------------------------sink 1 CDE : link sink_fire 2 CDE : link sink_system_service sink_fire 1 CE SSDP : accept ssdp_serv lan. * > *. ssdp_ip sink_system_service 1 CDE HTTPI : accept HTTPI_sv_0 HTTPI_if_0. * > *. * 2 DE PING_RESPONDER : accept PING_RESPONDER_sv_0 PING_RESPONDER_ if_0. * > *. * 3 CD SENDTO_LISTEN : accept SENDTO_LISTEN_sv_0 *. * > *. * 4 D ICMP_LISTEN : accept ICMP_LISTEN_sv_0 *. * > *. * 5 CD SRAS : accept SRAS_sv_0 *. * > *. * 6 CD RAS : accept RAS_sv_0 *. * > *. * 7 CDE MDAP : accept MDAP_sv_0 *. * > *. * 8 CDE SNMP_AGENT : accept SNMP_AGENT_sv_0 SNMP_AGENT_ if_0. * > *. * 9 CD DHCP-S : accept DHCP-S_sv_0 *. * > *. * 10 CDE DHCP-R : accept DHCP-R_sv_0 DHCP-R_if_0. * > *. * 11 CDE DNS-S : accept DNS-S_sv_0 DNS-S_if_0. * > *. * 12 CD RIP-Query : accept RIP-Query_sv_0 *. * > *. * 13 CDE RIP : accept RIP_sv_0 *. * > *. * 14 CDE TELNET : accept TELNET_sv_0 TELNET_if_0. * > *. * 15 CDE FTP : accept FTP_sv_0 FTP_if_0. * > *. * 16 CDE HTTPs : accept HTTPs_sv_0 HTTPs_if_0. * > *. * 17 CDE HTTP : accept HTTP_sv_0 HTTP_if_0. * > *. * forward 1 CDE : link forward_fire 2 CDE : link forward_host_service 3 CDE : link forward_level forward_level 1 CDE : link forward_level_Disabled forward_level_Disabled 1 CE AnyTraffic : accept *. * > *. * source 1 CDE : link source_fire source_fire 1 CE AnyTraffic : accept *. * > *. * => =>firewall rule list format=cli :firewall rule add chain=sink_fire index=1 name=SSDP srcintf=lan dstip=ssdp_ip serv=ssdp_serv | log=disabled state=enabled action=accept :firewall rule add chain=source_fire index=1 name=AnyTraffic log=disabled state=enabled | action=accept :firewall rule add chain=forward_level_BlockAll index=1 name=AnyTraffic log=disabled state=enabled | action=drop :firewall rule add chain=forward_level_Standard index=1 name=FromLAN srcintf=lan log=disabled | state=enabled action=accept :firewall rule add chain=forward_level_Disabled index=1 name=AnyTraffic log=disabled state=enabled | action=accept =>
352
E-DOC-CTC-20050531-0063 v1. 0
Firewall Commands
firewall rule modify
Modify a firewall rule.
SYNTAX: firewall rule modify chain = <string> index = <number> [newindex = <number>] [name = <string>] [clink = <chain name>] [srcintf [!]= <string>] [srcip [!]= <{_10. 0. 0. 138 | _192. 168. 1. 254| private | ssdp_ip | mdap_ip}>] [dstintf [!]= <string>] [dstip [!]= <{_10. 0. 0. 138 | _192. 168. 1. 254| private | ssdp_ip | mdap_ip}>] [serv [!]= <service expressions>] [log = <{disabled | enabled}>] [state = <{disabled | enabled}>] [action = <action>]
If a value is preceded by a "!", it means NOT. For example "srcintf=!wan" means "if the source interface is different from WAN". [. . . ] REQUIRED
bssid = <hardware-address>
EXAMPLE:
=>wireless wds list SpeedTouch180 00:90:96:4F:38:E4 SpeedTouch Sascha 00:90:96:62:5D:69 =>wireless wds delete bssid=00:90:96:62:5d:69 =>wireless wds list SpeedTouch180 00:90:96:4F:38:E4 =>
E-DOC-CTC-20050531-0063 v1. 0
869
Wireless Commands
wireless wds flush
Flush all WDS stations.
SYNTAX: wireless wds flush
870
E-DOC-CTC-20050531-0063 v1. 0
Wireless Commands
wireless wds list
List the WDS stations.
SYNTAX: wireless wds list
EXAMPLE:
=>wireless wds list SpeedTouch180 SpeedTouch Sascha =>
00:90:96:4F:38:E4 00:90:96:62:5D:69
E-DOC-CTC-20050531-0063 v1. 0
871
Wireless Commands
wireless wds scanresults
Scan all networks.
SYNTAX: wireless wds scanresults
where: rescan Perform a new scan (enabled) or not (disabled). OPTIONAL
[rescan = <{disabled | enabled}>]
EXAMPLE:
=>wireless wds scanresults rescan=yes All associations with the AP will be lost, due to the wireless network scan!SSID channel bssid noise SpeedTouchB39DEB <Protected Network> <Protected Network> SpeedTouchDE0566 => 9 11 11 1 00:90:96:af:48:5a 00:02:8a:37:01:c3 00:02:2d:2d:f9:e2 00:30:f1:9f:06:0c -89 -76 -76 -80 dBm dBm dBm dBm
rssi -76 -52 -48 -56 dBm dBm dBm dBm
872
E-DOC-CTC-20050531-0063 v1. 0
Abbreviations
Abbreviations
The table below lists all the abbreviations used in the CLI Reference Guide.
Abbreviation
AAL5 ACL ADSL AES AF AP ARP ATM BSSID CA CAPI CC CEP CHAP CIDR CLI CLP CO CPE CRL CTD CWMP DHCP DN DNS DPD DSCP DSD DSL ECN EF FCS FTP GRE GRP
Description
ATM Adaption Layer 5 Access Control List Asymmetric Digital Subscriber Line Advanced Encryption System Assured Forwarding Access Point Address Resolution Protocol Asynchronous Transfer Mode Base Service Set IDentifier Certificate Authority Common ISDN Application Interface Continuity Check Certificate Enrollment Protocol Challenge Handshake Authentication Protocol Classless Inter Domain Routing Command Line Interface Cell Loss Priority Central Office Customer Premises Equipment Certificate Revocation List Conformance Traffic Descriptor CPE WAN Management Protocol Dynamic Host Configuration Protocol Distinguished Name Domain Name System Dead Peer Detection Differentiated Services Code Point Differentiated Service Delivery Digital Subscriber Line Explicit Congestion Notification Expedited Forwarding Frame Check Sequence File Transfer Protocol General Routing Encapsulation Gateway Routing Protocol
E-DOC-CTC-20050531-0063 v1. 0
873
Abbreviations
Abbreviation
HDLC HTTP ICMP IDS IGD IGMP IKE IP IP oA IPCP IPSec ISDN ISI KB Kbps LAN LCP LDAP LLC MAC MC MD5 MGCP MLP MPLS MTU NAPT NAT NLPID NTP OAM OBC OID PAP PBX PFS PKCS PKI POTS
Description
High-level Data Link Control HyperText Transfer Protocol Internet Control Message Protocol Intrusion Detection System Internet Gateway Device Internet Group Management Protocol Internet Key Exchange Internet Protocol IP over ATM Internet Protocol Control Protocol IP Security Integrated Services Digital Network Independent Set ID Kilobytes Kilobits per second Local Area Network Link Control Protocol Light-weight Directory Access Protocol Logical Link Control Medium Access Control MultiCast Message Digest 5 Media Gateway Control Protocol Multi-Level access Policy Multiprotocol Label Switching Maximum Transmission Unit Network Address and Port Translation Network Address Translation Network Layer Protocol IDentifiers Network Time Protocol Operation and Maintenance On Board Controller Object IDentifier Password Authentication Protocol Private Branch Exchange Perfect Forward Secrecy Public Key Cryptography Standard Public Key Infrastructure Plain Old Telephone Service
874
E-DOC-CTC-20050531-0063 v1. 0
Abbreviations
Abbreviation
PPP PPPoA PPPoE PPTP PSD PSK PVC QoS RIP RTC RTT SAs SFTP SHDSL SIP SLA SMTP SNAP SNMP SNR SNTP SSH SSID TCP TFTP TKIP ToS TTL UA UDP ULP UPnP URI URL USB VC VCI VCMUX VDSL
Description
Point-to-Point Protocol PPP over ATM PPP over Ethernet Point-to-Point Tunneling Protocol Power Spectral Density Pre-Shared Key Permanent Virtual Channel Quality of Service Routing Information Protocol Real Time Clock Round Trip Time Security Associations Secure File Transfer Protocol Single Pair High-speed Digital Subscriber Line Session Initiation Protocol Service Level Agreement Simple Mail Transfer Protocol Sub Network Access Protocol Simple Network Management Protocol Signal-to-Noise Ratio Simple Network Time Protocol Secure SHell Service Set IDentifier Transmission Control Protocol Trivial File Transfer Protocol Temporal Key Integrity Protocol Type of Service Time To Live User Agent User Datagram Protocol Upper Layer Protocol Universal Plug and Play Uniform Resource Identifier Uniform Resource Locator Universal Serial Bus Virtual Channel Virtual Channel Identifier Virtual Channel MUltipleXing Very high speed Digital Subscriber Line
E-DOC-CTC-20050531-0063 v1. 0
875
Abbreviations
Abbreviation
VLAN VLSM VP VPI VPN WAN WDS WEP WFQ WINS WLAN WPA WRR
Description
Virtual Local Area Network Variable Length Subnet Masking Virtual Path Virtual Path Identifier Virtual Private Networking Wide Area Network Wireless Distribution System Wired Equivalent Privacy Weighted Fair Queueing Windows Internet Naming Service Wireless LAN Wi-Fi Protected Access Weighted Round Robin
876
E-DOC-CTC-20050531-0063 v1. 0
Syslog Messages
Syslog Messages
Introduction
This chapter lists the different Syslog messages.
Contents
This chapter lists the different Syslog messages of the following modules: Auto-PVC Module Configuration Module DHCP Client Module DHCP Relay Module DHCP Server Module Dyndns Module Firewall Module LOGIN Module IPSec Module ISDN Module Kernel Module Linestate Module NAPT Module PPP Module PPTP Module RIP Module Routing Module Session Module SIP Multi-media PBX Module SNTP Module Software Module UPnP Module Wireless Module 878 878 878 879 879 880 880 881 882 883 883 883 883 884 884 885 886 886 886 886 888 888 888
E-DOC-CTC-20050531-0063 v1. 0
877
Syslog Messages
Auto-PVC Module
Facility
LOCAL5 LOCAL5 LOCAL5 LOCAL5 LOCAL5 LOCAL5
Severity
WARNING WARNING WARNING WARNING WARNING WARNING
Contents
AUTOPVC script <script_name> failed AUTOPVC script <script_name> failed AUTOPVC script <script_name> (name1, qosb_name) failed AUTOPVC script <script_name> (name1, qosb_name, name2) failed AUTOPVC script 'autopvc_change_qos (itable[i]. intf, name1, qosb_name) failed AUTOPVC script <script_name> (name1, name2) failed
Configuration Module
Facility
USER USER USER USER KERN
Severity
INFO INFO INFO INFO INFO
Contents
CONFIGURATION saved after running Embedded Setup Wizard CONFIGURATION saved by user <user_id> CONFIGURATION backup by user to file <filename> CONFIGURATION <conf_version> upgraded to version <version>) SYSTEM reset by user <user_id> to factory defaults: user settings deleted
DHCP Client Module
Facility
LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2
Severity
WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
Contents
DHCC lease ip-address <ip-address> bound to intf <intf_id> DHCC intf <intf_id> renews lease ip-address <ip-address> DHCC intf <intf_id> rebinds lease ip-address <ip-address> from server<$paratext><Default ¶ Font>(<ip-address>) DHCC offer received from <ip-address> (can be relay agent) for intf <intf_id> DHCC server (<ip-address>) offers <ip-address> to intf <intf_id> DHCC unable to configure ip address: <ip-address> (bootp-reply) DHCC bootp lease ip-address <ip-address> bound to intf <intf_id> from server (<ip-address>) DHCC <ip-address> already configured on intf <intf_id>: failure DHCC <ip-address> (<ip-address>) set on intf <intf_id>: {faillure||ok} DHCC <ip-address> deleted: {faillure||ok}
878
E-DOC-CTC-20050531-0063 v1. 0
Syslog Messages
DHCP Relay Module
Facility
LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2
Severity
WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING
Contents
DHCR relay: Dropping boot rqs on interface <intf_id> due to invalid giaddr for server (<ip-address>) DHCR relay: Dropping boot reply with invalid relay agent option from <intf_id> DHCR relay: Dropping boot request containing the relay agent option from <intf_id> DHCR relay: Dropping boot reply to unknown interface from <intf_id> DHCR relay: Dropping boot reply to inactive interface <intf_id> DHCR relay: Dropping boot reply to inactive interface <intf_id> DHCR relay: Dropping boot request packet with spoofed giaddr field from <intf_id> DHCR relay: Dropping boot request received on unknown interface from <intf_id> DHCR relay: Dropping boot request on inactive interface <intf_id> DHCR relay: Dropping boot request with invalid hops field on interface <intf_id> DHCR relay: Dropping boot request with invalid giaddr on interface <intf_id>
DHCP Server Module
Facility
LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2
Severity
WARNING WARNING WARNING WARNING WARNING
Contents
DHCS server: <DHCP Offer | DHCP ACK> cannot be send due to invalid server identifier DHCS server: DHCPACK cannot be send due to invalid server identifier DHCS server: DHCPNAK cannot be send due to invalid server identifier DHCS server up DHCS server went down
E-DOC-CTC-20050531-0063 v1. 0
879
Syslog Messages
Dyndns Module
Facility
DYNDNS DYNDNS DYNDNS DYNDNS DYNDNS DYNDNS DYNDNS DYNDNS DYNDNS DYNDNS
Severity
WARNING WARNING WARNING WARNING NOTICE WARNING WARNING WARNING NOTICE WARNING
Contents
<DYNDNS_ STR_ID> Connection failed to <dyndns_service> for client <dyndns_client> <DYNDNS_ STR_ID> Failed to resolve host name <dyndns_service> for client <dyndns_client> <DYNDNS_ STR_ID> Server Timeout(<dyndns_service>) for client <dyndns_client> <DYNDNS_ STR_ID> Update failed to server <dyndns_service> for client <dyndns_client> <DYNDNS_ STR_ID> client <dyndns_client> <"started"||"stopped"> <DYNDNS_ STR_ID> Update failed for client <dyndns_client>, incomplete configuration <DYNDNS_ STR_ID> Update failed for client <dyndns_client> (<message>), host <hostname> has not been updated <DYNDNS_ STR_ID> Update failed for client <dyndns_client> <DYNDNS_ STR_ID> Host <hostname> has been updated successfully by <dyndns_service> <DYNDNS_ STR_ID> Authentication failed to server <dyndns_service>
Firewall Module
Facility
AUTH
Severity
WARNING
Contents
FIREWALL Hook: <hookname> Rule ID:<rule_id> Protocol: ICMP Src_ip: <ip_address> Dst_ip: <ip_address> ICMP message type: <message_type_name || message_type_id > Action: <action> FIREWALL Hook: <hookname> Rule ID:<rule_id> Protocol: <protocol_name> Src_ip_port: <ip-address:ip_port> Dst_ip_port: <ip-address:ip_port> Action: <action>
AUTH
WARNING
880
E-DOC-CTC-20050531-0063 v1. 0
Syslog Messages
LOGIN Module
Facility
AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH
Severity
NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE
Contents
LOGOUT User <user_id> logged out on <connection_type> (<ip-address>) LOGOUT User <user_id> logged out on <connection_type> LOGOUT <session_name> session of user <user_id> killed (<ip-address>) LOGOUT <session_name> session of user <user_id> killed LOGIN User <user_id> tried to login on <connection_type> (from <ip-address>) LOGIN User <user_id> logged in on <connection_type> (from <ip-address>) LOGIN User logged in on <connection_type> (<ip-address>) LOGIN User <user_id> tried to log in on <connection_type>
E-DOC-CTC-20050531-0063 v1. 0
881
Syslog Messages
IPSec Module
Facility
KERNEL
Severity
ERROR
Contents
ESP packet dropped: Replay check failure
USER
INFO
AddSa: SPIs:<spi/otherspi> Loc:<myid> Rem:<hisid> (<ip-address>) Prot:<prot>-<alg><keysize> Exp:<expiry> AddSuite: SPIs:<spi/otherspi> Loc:<myid> Rem:<hisid> (<ip-address>) Prot:<prot>-<alg><keysize> Exp:<expiry> Cert/map id mismatch: <hisid> using <dn> Cert: <hisid> using <dn> to establish to <myid> "Cert status unknown; no ISAKMP <to/from> <ip-address>" "Cert not usable; no ISAKMP <to/from> <ip-address>" DelSa: SPIs:<spi/otherspi> DelSuite: SPIs:<spi/otherspi> DelPhase1: Rem:<ip-address> ID: <hisid> Cookies: <cookies> <cause> Establish Request: <ip-address> to <ip-address> Secure map contains target <ip-address> for this gate but no red security policy entry for these nodes AddPhase1: Rem:<ip-address>, ID: <hisid>, Cookies: <cookies> Prot:<alg[keysize]>, Exp:<expiry> No local policy matches <myid> Notify from <ip-address>: <notify-string> Notify to <ip-address>: <notify-string> Rekey Phase 2: Loc:<myid>, Rem:<hisid> (<ip-address>) Got policy for peer:<ip-address>, I am <initiator/responder>, authentication: certificate Got policy for peer:<ip-address>, I am <initiator/responder>, authentication: certificate or shared Got policy for peer:<ip-address>, I am <initiator/responder>, authentication: shared Shared secret lookup failed for <id><to/from><ip-address>
USER
INFO
USER USER USER USER USER USER USER USER USER
INFO INFO INFO NOTICE INFO INFO INFO INFO INFO
USER
INFO
USER USER USER USER USER
INFO INFO INFO INFO INFO
USER
INFO
USER
INFO
USER
NOTICE
882
E-DOC-CTC-20050531-0063 v1. 0
Syslog Messages
ISDN Module
Facility
KERN
Severity
USER
Contents
ISDN software key not installed : closing connection
Kernel Module
Facility
KERN KERN KERN
Severity
WARNING WARNING EMERG
Contents
KERNEL cold reset KERNEL warm reset KERNEL Controlled restart (after internal error or explicit system reboot)
Linestate Module
Facility
LOCAL5 LOCAL5
Severity
NOTICE NOTICE
Contents
xDSL linestate up (downstream: <bitrate_in> kbit/s, upstream: <bitrate_out> kbit/ s) xDSL linestate up (downstream: <bitrate_in> kbit/s, upstream: <bitrate_out> kbit/s; output Power Down: <outputPowerDn> dBm, Up: <outputPowerUp> dBm; line Attenuation Down: <lineAttenuationDn> dB, Up: <lineAttenuationUp> dB; snr Margin Down: <snrMarginDn> dB, Up: <snrMarginUp> dB)"
NAPT Module
Facility
LOCAL4
Severity
INFO
Contents
NAPT Protocol: <TCP | UDP | ICMP> Open port: <port> Helper: <app_name> => <"failed" | "ok">
E-DOC-CTC-20050531-0063 v1. 0
883
Syslog Messages
PPP Module
Facility
LOCAL0 LOCAL0 AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH LOCAL0 LOCAL0
Severity
WARNING WARNING ERROR INFO NOTICE ERROR INFO INFO INFO ERROR ERROR INFO INFO DEBUG INFO DEBUG DEBUG ERROR ERROR
Contents
PPP Link up (<intf name>) PPP Link down (<intf name>) PPP PAP authentication failed (<intf name>) [protocol reject] PPP PAP on intf <intf_id> no response to authenticate-request PPP PAP remote user <remote_user_name> successful authenticated PPP PAP authentication for remote user <remote_user> failed PPP PAP Authenticate Ack received PPP PAP Authenticate Nack received PPP PAP Authenticate Request sent PPP PAP authentication failed (<intf name>) PPP CHAP authentication failed (<intf name>) PPP CHAP authentication failed [protocol reject(server)] PPP CHAP authentication failed [protocol reject(client)] PPP CHAP Receive challenge (rhost = <hostname>) PPP CHAP Chap receive success : authentication ok PPP CHAP Challenge Send (Id = <challenge_id>) PPP CHAP Send status response: {ack || nack} PPP IPCP cannot determine remote IP address (<intf name>) PPP IPCP cannot determine locale IP address (<intf name>)
PPTP Module
Facility
LOCAL0 LOCAL0
Severity
WARNING WARNING
Contents
PPTP tunnel (<Pbname>) up:(<ip addr>) PPTP tunnel (<Pbname>) down:(<ip addr>)
884
E-DOC-CTC-20050531-0063 v1. 0
Syslog Messages
RIP Module
Facility
LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1
Severity
INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO
Contents
RIP Packet received from unknown interface RIP Packet size is smaller than minimum size RIP Packet size is greater than maximum size RIP Wrong RIP packet alignment RIP RIP version 0 with command <command-name> received RIP Reserved field not zero in RIP header RIP RIP is not enabled for network address <ip-address> RIP Packet's v<version_nr> does not match to RIP v<version_nr> RIP Packet's v<version_nr> does not match to RIP v<version_nr> on interface <intfname> RIP Packet v<version_nr> is dropped because authentication is disabled on interface <intf-name> RIP Simple password authentication failed on interface<intf-name> RIP No authentication in RIP packet RIP Obsolete command <command-name> received RIP Unknown RIP command received RIP Response does not come from default RIP port RIP Datagram doesn't come from a valid neighbor: <ip-address> RIP Unsupported family from <ip-address> RIP Network is net 127, class D or class E network RIP Address <ip-address> is my own address, net 0 or not unicast RIP RIPv1 packet with incorrect must be zero fields RIP Route metric is not in the 1-16 range RIP Nexthop address is not directly reachable <ip-address> RIP RIPv2 address <ip-address> is not correct mask /<mask> applied RIP Not configured for sending RIPv1 packet on interface <intf-name> RIP RIP routing table is full RIP Neighbor <ip-address> is not connected to direct network RIP Interface <intf-name> has not any valid local IP address for sending RIPv2 packets RIP Interface <intf-name> has not any valid %s address for sending RIPv<version_nr> packets RIP IP Address <ip-address> not found in RIP table
E-DOC-CTC-20050531-0063 v1. 0
885
Syslog Messages
Routing Module
Facility
LOCAL1 LOCAL1 SECURITY
Severity
INFO INFO INFO
Contents
GRP Default destination is routed via gateway <ip_address> GRP Default destination is not routed anymore via gateway <ip_address> LABEL Rule Id:<rule_id> Protocol: ICMP Src_ip: <ip_address> Dst_ip: <ip_address> ICMP message type: <message_type_name || message_type_id > Label: <label_name> LABEL Rule Id:<rule_id> Protocol: <protocol_name> Src_ip: <ip_address> Dst_ip: <ip_address> Label: <label_name>
SECURITY
INFO
Session Module
Facility
AUTH
Severity
NOTICE
Contents
SESSION TIMEOUT Timeout!(after <seconds> sec)
SIP Multi-media PBX Module
Facility
AUTH AUTH AUTH AUTH AUTH
Severity
NOTICE NOTICE NOTICE NOTICE NOTICE
Contents
SIPPBX Pass: from <caller> to <callee> : time=<start time>, duration=<duration> SIPPBX Fail: from <caller> to <callee> : reason = <reason> SIPPBX Fail: Outbound registration failed : reason = <reason> SIPPBX Fail: Outbound de-registration timed out SIPPBX Fail: Outbound registration timed out
SNTP Module
Facility
NTP NTP NTP NTP NTP NTP NTP
Severity
WARNING WARNING WARNING INFO INFO WARNING ERROR
Contents
SNTP Unable to contact server: <SNTP server ip> SNTP Server not synchronized: <SNTP server ip> SNTP Invalid response from server: <SNTP server ip> SNTP Synchronized to server: <SNTP server ip> SNTP Synchronized again to server: <SNTP server ip> SNTP Roundtrip exceeds limits SNTP No server(s) configured, check configuration
886
E-DOC-CTC-20050531-0063 v1. 0
Syslog Messages
Facility
NTP
Severity
ERROR
Contents
SNTP Systemtime update: time setting <systemtime> > new time setting: <new time>
E-DOC-CTC-20050531-0063 v1. 0
887
Syslog Messages
Software Module
Facility
KERN KERN KERN KERN KERN KERN
Severity
INFO INFO INFO INFO INFO INFO
Contents
SOFTWARE Copying all data files from <file_location> to <file_location> SOFTWARE Switchover going down in <number> seconds SOFTWARE No passive software found, duplicating active software SOFTWARE Duplication of active software failed SOFTWARE File <Filename> <receive || transmit> initiated SOFTWARE File <Filename> <receive || transmit><"" || not> successful terminated"
UPnP Module
Facility
WARNING NOTICE NOTICE
Severity
SECURITY SECURITY SECURITY
Contents
UPnP<ActionName> refused for ip=<ip_address> UPnP <ActionName> (<Error_string>) for ip=<ip_address> UPnP action <ActionName> from ip=<ip_address> (<Error_string>)
Wireless Module
Facility
KERN KERN KERN KERN KERN KERN KERN KERN KERN KERN
Severity
INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO
Contents
WIRELESS interface turned off WIRELESS interface turned on WIRELESS automatic channel selection done (channel = <channel_number>) chosen WIRELESS automatic channel selection: scan failed! [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE ALCATEL-LUCENT SPEEDTOUCH 620 Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service. Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual ALCATEL-LUCENT SPEEDTOUCH 620 will begin.