User manual ALCATEL-LUCENT SPEEDTOUCH 620 1

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual ALCATEL-LUCENT SPEEDTOUCH 620. We hope that this ALCATEL-LUCENT SPEEDTOUCH 620 user guide will be useful to you.

Lastmanuals help download the user guide ALCATEL-LUCENT SPEEDTOUCH 620.


Mode d'emploi ALCATEL-LUCENT SPEEDTOUCH 620
Download
Manual abstract: user guide ALCATEL-LUCENT SPEEDTOUCH 6201

Detailed instructions for use are in the User's Guide.

[. . . ] SpeedTouchTM620 Wireless Business DSL Routers CLI Reference Guide Release R5. 3. 1 SpeedTouchTM 620 CLI Reference Guide R5. 3. 1 Copyright Copyright ©1999-2005 THOMSON. Passing on, and copying of this document, use and communication of its contents is not permitted without written authorization from THOMSON. The content of this document is furnished for informational use only, may be subject to change without notice, and should not be construed as a commitment by THOMSON. THOMSON assumes no responsibility or liability for any errors or inaccuracies that may appear in this document. [. . . ] 7 Test loose disabled yes Another level in the firewall => E-DOC-CTC-20050531-0063 v1. 0 345 Firewall Commands firewall level set Set the security level or display the current security level. SYNTAX: firewall level set where: name The name of the security level to be set. OPTIONAL [name = <string>] Note If no security level is specified, the current security level will be shown. EXAMPLE: =>firewall level list Level Config ============ Active level: Medium nr name udptrack service readonly description -------------------------------------------------------------------------------------------------1 High strict disabled yes Use this Security Level to block all outgoing connections except well kno wn applications (DNS, HTTP, HTTPS, FTP, TELNET, IMAP, POP) and block all incoming connections. Services and Application Sharing are not allowed to open pinholes in the firewall. 6 BlockAll 7 Test strict loose disabled yes disabled yes Use this Security Level to block all traffic from and to the Internet. Another level in the firewall =>firewall level set :firewall level set name=Disabled => =>firewall level set name=BlockAll =>firewall level set :firewall level set name=BlockAll => 346 E-DOC-CTC-20050531-0063 v1. 0 Firewall Commands firewall rule add Add a firewall rule. SYNTAX: firewall rule add chain = <string> [index = <number>] [name = <string>] [clink = <chain name>] [srcintf [!]= <{DHCP-S_if_0|DHCP-R_if_0|wan|local|lan| tunnel|dmz|guest|HTTPI_if_0|HTTP_if_0|HTTPs_if_0|FTP_if_0| TELNET_if_0|DNS-S_if_0|SNMP_AGENT_if_0|PING_RESPONDER_if_0| _Internet| _lan1|_wan1|_dmz1|_guest1}>] [srcip [!]= <{private|ssdp_ip|mdap_ip|_10. 0. 0. 138| _192. 168. 1. 254|_192. 168. 2. 254|_192. 168. 3. 254}>] [dstintf [!]= <{DHCP-S_if_0|DHCP-R_if_0|wan|local|lan |tunnel|dmz|guest|HTTPI_if_0|HTTP_if_0|HTTPs_if_0|FTP_if_0| TELNET_if_0|DNS-S_if_0|SNMP_AGENT_if_0| PING_RESPONDER_if_0|_Internet|_lan1|_wan1|_dmz1|_guest1}>] [dstip [!]= <{private|ssdp_ip|mdap_ip|_10. 0. 0. 138| _192. 168. 1. 254|_192. 168. 2. 254|_192. 168. 3. 254}>] [serv [!]= <{PPTPD_sv_0|PPTPGRE_sv_0|HTTP_sv_0|HTTPs_sv_0| RIP_sv_0|RIP-Query_sv_0|DNS-S_sv_0|DHCP-R_sv_0|DHCP-S_sv_0| SNMP_AGENT_sv_0|SSDP_sv_0|MDAP_sv_0|RAS_sv_0|SRAS_sv_0| ICMP_LISTEN_sv_0|SENDTO_LISTEN_sv_0|PING_RESPONDER_sv_0| FTP_sv_0|TELNET_sv_0|CWMP_server_sv_0|icmp|igmp|ftp|telnet| http|httpproxy|https|RPC|NBT|SMB|imap|imap3|imap4-ssl| imaps|pop2|pop3|pop3s|smtp|ssh|dns|nntp|ipsec|esp|ah|ike| DiffServ|sip|h323|dhcp|rtsp|ssdp_serv|mdap_serv|syslog| Quake3|Doom3|Steam Games|Unreal Tournament 2004}>] [state = <{disabled | enabled}>] action = <action> If a value is preceded by a "!", it means NOT. For example "srcintf=!wan" means "if the source interface is different from WAN". E-DOC-CTC-20050531-0063 v1. 0 347 Firewall Commands where: chain index name clink srcintf srcip dstintf dstip serv log state action The name of the chain which contains the rule. The name of the chain to be parsed when this rule applies. The name of the source interface expression. The name of the destination interface expression. The name of the destination IP expression. Disable or enable logging is done when this rule applies. The action to be taken when this rule applies ('link' when clink is used). REQUIRED OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL OPTIONAL REQUIRED RELATED COMMANDS: firewall rule delete Delete a firewall rule. 348 E-DOC-CTC-20050531-0063 v1. 0 Firewall Commands firewall rule delete Delete a firewall rule. SYNTAX: firewall rule delete chain = <string> index = <number> where: chain index The name of the chain in which a rule must be deleted. REQUIRED REQUIRED RELATED COMMANDS: firewall rule add Add a firewall rule. E-DOC-CTC-20050531-0063 v1. 0 349 Firewall Commands firewall rule flush Flush all firewall rules. SYNTAX: firewall rule flush where: chain The name of the chain for which the rules must be flushed. OPTIONAL [chain = <string>] Note If not specified, the rules of all the chains will be flushed. 350 E-DOC-CTC-20050531-0063 v1. 0 Firewall Commands firewall rule list Show a list of the firewall rules in a chain. SYNTAX: firewall rule list [chain = <string>] [format = <{pretty | cli}>] where: chain The name of the chain for which the rules must be listed. OPTIONAL Note format If not specified, the rules of all the chains are shown. OPTIONAL Select the output format in which the list must be shown. Choose between: pretty: the list is shown as intuitive output in clear text. cli: the list is shown via the CLI commands configuration. The default is pretty. E-DOC-CTC-20050531-0063 v1. 0 351 Firewall Commands EXAMPLE: =>firewall rule list Rules (flags: C=Constant, D=Dynamic, E=Enable, L=Log) ===== Chain Nr. Flags Rule --------------------------------------------------------------------------------------sink 1 CDE : link sink_fire 2 CDE : link sink_system_service sink_fire 1 CE SSDP : accept ssdp_serv lan. * > *. ssdp_ip sink_system_service 1 CDE HTTPI : accept HTTPI_sv_0 HTTPI_if_0. * > *. * 2 DE PING_RESPONDER : accept PING_RESPONDER_sv_0 PING_RESPONDER_ if_0. * > *. * 3 CD SENDTO_LISTEN : accept SENDTO_LISTEN_sv_0 *. * > *. * 4 D ICMP_LISTEN : accept ICMP_LISTEN_sv_0 *. * > *. * 5 CD SRAS : accept SRAS_sv_0 *. * > *. * 6 CD RAS : accept RAS_sv_0 *. * > *. * 7 CDE MDAP : accept MDAP_sv_0 *. * > *. * 8 CDE SNMP_AGENT : accept SNMP_AGENT_sv_0 SNMP_AGENT_ if_0. * > *. * 9 CD DHCP-S : accept DHCP-S_sv_0 *. * > *. * 10 CDE DHCP-R : accept DHCP-R_sv_0 DHCP-R_if_0. * > *. * 11 CDE DNS-S : accept DNS-S_sv_0 DNS-S_if_0. * > *. * 12 CD RIP-Query : accept RIP-Query_sv_0 *. * > *. * 13 CDE RIP : accept RIP_sv_0 *. * > *. * 14 CDE TELNET : accept TELNET_sv_0 TELNET_if_0. * > *. * 15 CDE FTP : accept FTP_sv_0 FTP_if_0. * > *. * 16 CDE HTTPs : accept HTTPs_sv_0 HTTPs_if_0. * > *. * 17 CDE HTTP : accept HTTP_sv_0 HTTP_if_0. * > *. * forward 1 CDE : link forward_fire 2 CDE : link forward_host_service 3 CDE : link forward_level forward_level 1 CDE : link forward_level_Disabled forward_level_Disabled 1 CE AnyTraffic : accept *. * > *. * source 1 CDE : link source_fire source_fire 1 CE AnyTraffic : accept *. * > *. * => =>firewall rule list format=cli :firewall rule add chain=sink_fire index=1 name=SSDP srcintf=lan dstip=ssdp_ip serv=ssdp_serv | log=disabled state=enabled action=accept :firewall rule add chain=source_fire index=1 name=AnyTraffic log=disabled state=enabled | action=accept :firewall rule add chain=forward_level_BlockAll index=1 name=AnyTraffic log=disabled state=enabled | action=drop :firewall rule add chain=forward_level_Standard index=1 name=FromLAN srcintf=lan log=disabled | state=enabled action=accept :firewall rule add chain=forward_level_Disabled index=1 name=AnyTraffic log=disabled state=enabled | action=accept => 352 E-DOC-CTC-20050531-0063 v1. 0 Firewall Commands firewall rule modify Modify a firewall rule. SYNTAX: firewall rule modify chain = <string> index = <number> [newindex = <number>] [name = <string>] [clink = <chain name>] [srcintf [!]= <string>] [srcip [!]= <{_10. 0. 0. 138 | _192. 168. 1. 254| private | ssdp_ip | mdap_ip}>] [dstintf [!]= <string>] [dstip [!]= <{_10. 0. 0. 138 | _192. 168. 1. 254| private | ssdp_ip | mdap_ip}>] [serv [!]= <service expressions>] [log = <{disabled | enabled}>] [state = <{disabled | enabled}>] [action = <action>] If a value is preceded by a "!", it means NOT. For example "srcintf=!wan" means "if the source interface is different from WAN". [. . . ] REQUIRED bssid = <hardware-address> EXAMPLE: =>wireless wds list SpeedTouch180 00:90:96:4F:38:E4 SpeedTouch Sascha 00:90:96:62:5D:69 =>wireless wds delete bssid=00:90:96:62:5d:69 =>wireless wds list SpeedTouch180 00:90:96:4F:38:E4 => E-DOC-CTC-20050531-0063 v1. 0 869 Wireless Commands wireless wds flush Flush all WDS stations. SYNTAX: wireless wds flush 870 E-DOC-CTC-20050531-0063 v1. 0 Wireless Commands wireless wds list List the WDS stations. SYNTAX: wireless wds list EXAMPLE: =>wireless wds list SpeedTouch180 SpeedTouch Sascha => 00:90:96:4F:38:E4 00:90:96:62:5D:69 E-DOC-CTC-20050531-0063 v1. 0 871 Wireless Commands wireless wds scanresults Scan all networks. SYNTAX: wireless wds scanresults where: rescan Perform a new scan (enabled) or not (disabled). OPTIONAL [rescan = <{disabled | enabled}>] EXAMPLE: =>wireless wds scanresults rescan=yes All associations with the AP will be lost, due to the wireless network scan!SSID channel bssid noise SpeedTouchB39DEB <Protected Network> <Protected Network> SpeedTouchDE0566 => 9 11 11 1 00:90:96:af:48:5a 00:02:8a:37:01:c3 00:02:2d:2d:f9:e2 00:30:f1:9f:06:0c -89 -76 -76 -80 dBm dBm dBm dBm rssi -76 -52 -48 -56 dBm dBm dBm dBm 872 E-DOC-CTC-20050531-0063 v1. 0 Abbreviations Abbreviations The table below lists all the abbreviations used in the CLI Reference Guide. Abbreviation AAL5 ACL ADSL AES AF AP ARP ATM BSSID CA CAPI CC CEP CHAP CIDR CLI CLP CO CPE CRL CTD CWMP DHCP DN DNS DPD DSCP DSD DSL ECN EF FCS FTP GRE GRP Description ATM Adaption Layer 5 Access Control List Asymmetric Digital Subscriber Line Advanced Encryption System Assured Forwarding Access Point Address Resolution Protocol Asynchronous Transfer Mode Base Service Set IDentifier Certificate Authority Common ISDN Application Interface Continuity Check Certificate Enrollment Protocol Challenge Handshake Authentication Protocol Classless Inter Domain Routing Command Line Interface Cell Loss Priority Central Office Customer Premises Equipment Certificate Revocation List Conformance Traffic Descriptor CPE WAN Management Protocol Dynamic Host Configuration Protocol Distinguished Name Domain Name System Dead Peer Detection Differentiated Services Code Point Differentiated Service Delivery Digital Subscriber Line Explicit Congestion Notification Expedited Forwarding Frame Check Sequence File Transfer Protocol General Routing Encapsulation Gateway Routing Protocol E-DOC-CTC-20050531-0063 v1. 0 873 Abbreviations Abbreviation HDLC HTTP ICMP IDS IGD IGMP IKE IP IP oA IPCP IPSec ISDN ISI KB Kbps LAN LCP LDAP LLC MAC MC MD5 MGCP MLP MPLS MTU NAPT NAT NLPID NTP OAM OBC OID PAP PBX PFS PKCS PKI POTS Description High-level Data Link Control HyperText Transfer Protocol Internet Control Message Protocol Intrusion Detection System Internet Gateway Device Internet Group Management Protocol Internet Key Exchange Internet Protocol IP over ATM Internet Protocol Control Protocol IP Security Integrated Services Digital Network Independent Set ID Kilobytes Kilobits per second Local Area Network Link Control Protocol Light-weight Directory Access Protocol Logical Link Control Medium Access Control MultiCast Message Digest 5 Media Gateway Control Protocol Multi-Level access Policy Multiprotocol Label Switching Maximum Transmission Unit Network Address and Port Translation Network Address Translation Network Layer Protocol IDentifiers Network Time Protocol Operation and Maintenance On Board Controller Object IDentifier Password Authentication Protocol Private Branch Exchange Perfect Forward Secrecy Public Key Cryptography Standard Public Key Infrastructure Plain Old Telephone Service 874 E-DOC-CTC-20050531-0063 v1. 0 Abbreviations Abbreviation PPP PPPoA PPPoE PPTP PSD PSK PVC QoS RIP RTC RTT SAs SFTP SHDSL SIP SLA SMTP SNAP SNMP SNR SNTP SSH SSID TCP TFTP TKIP ToS TTL UA UDP ULP UPnP URI URL USB VC VCI VCMUX VDSL Description Point-to-Point Protocol PPP over ATM PPP over Ethernet Point-to-Point Tunneling Protocol Power Spectral Density Pre-Shared Key Permanent Virtual Channel Quality of Service Routing Information Protocol Real Time Clock Round Trip Time Security Associations Secure File Transfer Protocol Single Pair High-speed Digital Subscriber Line Session Initiation Protocol Service Level Agreement Simple Mail Transfer Protocol Sub Network Access Protocol Simple Network Management Protocol Signal-to-Noise Ratio Simple Network Time Protocol Secure SHell Service Set IDentifier Transmission Control Protocol Trivial File Transfer Protocol Temporal Key Integrity Protocol Type of Service Time To Live User Agent User Datagram Protocol Upper Layer Protocol Universal Plug and Play Uniform Resource Identifier Uniform Resource Locator Universal Serial Bus Virtual Channel Virtual Channel Identifier Virtual Channel MUltipleXing Very high speed Digital Subscriber Line E-DOC-CTC-20050531-0063 v1. 0 875 Abbreviations Abbreviation VLAN VLSM VP VPI VPN WAN WDS WEP WFQ WINS WLAN WPA WRR Description Virtual Local Area Network Variable Length Subnet Masking Virtual Path Virtual Path Identifier Virtual Private Networking Wide Area Network Wireless Distribution System Wired Equivalent Privacy Weighted Fair Queueing Windows Internet Naming Service Wireless LAN Wi-Fi Protected Access Weighted Round Robin 876 E-DOC-CTC-20050531-0063 v1. 0 Syslog Messages Syslog Messages Introduction This chapter lists the different Syslog messages. Contents This chapter lists the different Syslog messages of the following modules: Auto-PVC Module Configuration Module DHCP Client Module DHCP Relay Module DHCP Server Module Dyndns Module Firewall Module LOGIN Module IPSec Module ISDN Module Kernel Module Linestate Module NAPT Module PPP Module PPTP Module RIP Module Routing Module Session Module SIP Multi-media PBX Module SNTP Module Software Module UPnP Module Wireless Module 878 878 878 879 879 880 880 881 882 883 883 883 883 884 884 885 886 886 886 886 888 888 888 E-DOC-CTC-20050531-0063 v1. 0 877 Syslog Messages Auto-PVC Module Facility LOCAL5 LOCAL5 LOCAL5 LOCAL5 LOCAL5 LOCAL5 Severity WARNING WARNING WARNING WARNING WARNING WARNING Contents AUTOPVC script <script_name> failed AUTOPVC script <script_name> failed AUTOPVC script <script_name> (name1, qosb_name) failed AUTOPVC script <script_name> (name1, qosb_name, name2) failed AUTOPVC script 'autopvc_change_qos (itable[i]. intf, name1, qosb_name) failed AUTOPVC script <script_name> (name1, name2) failed Configuration Module Facility USER USER USER USER KERN Severity INFO INFO INFO INFO INFO Contents CONFIGURATION saved after running Embedded Setup Wizard CONFIGURATION saved by user <user_id> CONFIGURATION backup by user to file <filename> CONFIGURATION <conf_version> upgraded to version <version>) SYSTEM reset by user <user_id> to factory defaults: user settings deleted DHCP Client Module Facility LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 Severity WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING Contents DHCC lease ip-address <ip-address> bound to intf <intf_id> DHCC intf <intf_id> renews lease ip-address <ip-address> DHCC intf <intf_id> rebinds lease ip-address <ip-address> from server<$paratext><Default ¶ Font>(<ip-address>) DHCC offer received from <ip-address> (can be relay agent) for intf <intf_id> DHCC server (<ip-address>) offers <ip-address> to intf <intf_id> DHCC unable to configure ip address: <ip-address> (bootp-reply) DHCC bootp lease ip-address <ip-address> bound to intf <intf_id> from server (<ip-address>) DHCC <ip-address> already configured on intf <intf_id>: failure DHCC <ip-address> (<ip-address>) set on intf <intf_id>: {faillure||ok} DHCC <ip-address> deleted: {faillure||ok} 878 E-DOC-CTC-20050531-0063 v1. 0 Syslog Messages DHCP Relay Module Facility LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 Severity WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING WARNING Contents DHCR relay: Dropping boot rqs on interface <intf_id> due to invalid giaddr for server (<ip-address>) DHCR relay: Dropping boot reply with invalid relay agent option from <intf_id> DHCR relay: Dropping boot request containing the relay agent option from <intf_id> DHCR relay: Dropping boot reply to unknown interface from <intf_id> DHCR relay: Dropping boot reply to inactive interface <intf_id> DHCR relay: Dropping boot reply to inactive interface <intf_id> DHCR relay: Dropping boot request packet with spoofed giaddr field from <intf_id> DHCR relay: Dropping boot request received on unknown interface from <intf_id> DHCR relay: Dropping boot request on inactive interface <intf_id> DHCR relay: Dropping boot request with invalid hops field on interface <intf_id> DHCR relay: Dropping boot request with invalid giaddr on interface <intf_id> DHCP Server Module Facility LOCAL2 LOCAL2 LOCAL2 LOCAL2 LOCAL2 Severity WARNING WARNING WARNING WARNING WARNING Contents DHCS server: <DHCP Offer | DHCP ACK> cannot be send due to invalid server identifier DHCS server: DHCPACK cannot be send due to invalid server identifier DHCS server: DHCPNAK cannot be send due to invalid server identifier DHCS server up DHCS server went down E-DOC-CTC-20050531-0063 v1. 0 879 Syslog Messages Dyndns Module Facility DYNDNS DYNDNS DYNDNS DYNDNS DYNDNS DYNDNS DYNDNS DYNDNS DYNDNS DYNDNS Severity WARNING WARNING WARNING WARNING NOTICE WARNING WARNING WARNING NOTICE WARNING Contents <DYNDNS_ STR_ID> Connection failed to <dyndns_service> for client <dyndns_client> <DYNDNS_ STR_ID> Failed to resolve host name <dyndns_service> for client <dyndns_client> <DYNDNS_ STR_ID> Server Timeout(<dyndns_service>) for client <dyndns_client> <DYNDNS_ STR_ID> Update failed to server <dyndns_service> for client <dyndns_client> <DYNDNS_ STR_ID> client <dyndns_client> <"started"||"stopped"> <DYNDNS_ STR_ID> Update failed for client <dyndns_client>, incomplete configuration <DYNDNS_ STR_ID> Update failed for client <dyndns_client> (<message>), host <hostname> has not been updated <DYNDNS_ STR_ID> Update failed for client <dyndns_client> <DYNDNS_ STR_ID> Host <hostname> has been updated successfully by <dyndns_service> <DYNDNS_ STR_ID> Authentication failed to server <dyndns_service> Firewall Module Facility AUTH Severity WARNING Contents FIREWALL Hook: <hookname> Rule ID:<rule_id> Protocol: ICMP Src_ip: <ip_address> Dst_ip: <ip_address> ICMP message type: <message_type_name || message_type_id > Action: <action> FIREWALL Hook: <hookname> Rule ID:<rule_id> Protocol: <protocol_name> Src_ip_port: <ip-address:ip_port> Dst_ip_port: <ip-address:ip_port> Action: <action> AUTH WARNING 880 E-DOC-CTC-20050531-0063 v1. 0 Syslog Messages LOGIN Module Facility AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH Severity NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE Contents LOGOUT User <user_id> logged out on <connection_type> (<ip-address>) LOGOUT User <user_id> logged out on <connection_type> LOGOUT <session_name> session of user <user_id> killed (<ip-address>) LOGOUT <session_name> session of user <user_id> killed LOGIN User <user_id> tried to login on <connection_type> (from <ip-address>) LOGIN User <user_id> logged in on <connection_type> (from <ip-address>) LOGIN User logged in on <connection_type> (<ip-address>) LOGIN User <user_id> tried to log in on <connection_type> E-DOC-CTC-20050531-0063 v1. 0 881 Syslog Messages IPSec Module Facility KERNEL Severity ERROR Contents ESP packet dropped: Replay check failure USER INFO AddSa: SPIs:<spi/otherspi> Loc:<myid> Rem:<hisid> (<ip-address>) Prot:<prot>-<alg><keysize> Exp:<expiry> AddSuite: SPIs:<spi/otherspi> Loc:<myid> Rem:<hisid> (<ip-address>) Prot:<prot>-<alg><keysize> Exp:<expiry> Cert/map id mismatch: <hisid> using <dn> Cert: <hisid> using <dn> to establish to <myid> "Cert status unknown; no ISAKMP <to/from> <ip-address>" "Cert not usable; no ISAKMP <to/from> <ip-address>" DelSa: SPIs:<spi/otherspi> DelSuite: SPIs:<spi/otherspi> DelPhase1: Rem:<ip-address> ID: <hisid> Cookies: <cookies> <cause> Establish Request: <ip-address> to <ip-address> Secure map contains target <ip-address> for this gate but no red security policy entry for these nodes AddPhase1: Rem:<ip-address>, ID: <hisid>, Cookies: <cookies> Prot:<alg[keysize]>, Exp:<expiry> No local policy matches <myid> Notify from <ip-address>: <notify-string> Notify to <ip-address>: <notify-string> Rekey Phase 2: Loc:<myid>, Rem:<hisid> (<ip-address>) Got policy for peer:<ip-address>, I am <initiator/responder>, authentication: certificate Got policy for peer:<ip-address>, I am <initiator/responder>, authentication: certificate or shared Got policy for peer:<ip-address>, I am <initiator/responder>, authentication: shared Shared secret lookup failed for <id><to/from><ip-address> USER INFO USER USER USER USER USER USER USER USER USER INFO INFO INFO NOTICE INFO INFO INFO INFO INFO USER INFO USER USER USER USER USER INFO INFO INFO INFO INFO USER INFO USER INFO USER NOTICE 882 E-DOC-CTC-20050531-0063 v1. 0 Syslog Messages ISDN Module Facility KERN Severity USER Contents ISDN software key not installed : closing connection Kernel Module Facility KERN KERN KERN Severity WARNING WARNING EMERG Contents KERNEL cold reset KERNEL warm reset KERNEL Controlled restart (after internal error or explicit system reboot) Linestate Module Facility LOCAL5 LOCAL5 Severity NOTICE NOTICE Contents xDSL linestate up (downstream: <bitrate_in> kbit/s, upstream: <bitrate_out> kbit/ s) xDSL linestate up (downstream: <bitrate_in> kbit/s, upstream: <bitrate_out> kbit/s; output Power Down: <outputPowerDn> dBm, Up: <outputPowerUp> dBm; line Attenuation Down: <lineAttenuationDn> dB, Up: <lineAttenuationUp> dB; snr Margin Down: <snrMarginDn> dB, Up: <snrMarginUp> dB)" NAPT Module Facility LOCAL4 Severity INFO Contents NAPT Protocol: <TCP | UDP | ICMP> Open port: <port> Helper: <app_name> => <"failed" | "ok"> E-DOC-CTC-20050531-0063 v1. 0 883 Syslog Messages PPP Module Facility LOCAL0 LOCAL0 AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH AUTH LOCAL0 LOCAL0 Severity WARNING WARNING ERROR INFO NOTICE ERROR INFO INFO INFO ERROR ERROR INFO INFO DEBUG INFO DEBUG DEBUG ERROR ERROR Contents PPP Link up (<intf name>) PPP Link down (<intf name>) PPP PAP authentication failed (<intf name>) [protocol reject] PPP PAP on intf <intf_id> no response to authenticate-request PPP PAP remote user <remote_user_name> successful authenticated PPP PAP authentication for remote user <remote_user> failed PPP PAP Authenticate Ack received PPP PAP Authenticate Nack received PPP PAP Authenticate Request sent PPP PAP authentication failed (<intf name>) PPP CHAP authentication failed (<intf name>) PPP CHAP authentication failed [protocol reject(server)] PPP CHAP authentication failed [protocol reject(client)] PPP CHAP Receive challenge (rhost = <hostname>) PPP CHAP Chap receive success : authentication ok PPP CHAP Challenge Send (Id = <challenge_id>) PPP CHAP Send status response: {ack || nack} PPP IPCP cannot determine remote IP address (<intf name>) PPP IPCP cannot determine locale IP address (<intf name>) PPTP Module Facility LOCAL0 LOCAL0 Severity WARNING WARNING Contents PPTP tunnel (<Pbname>) up:(<ip addr>) PPTP tunnel (<Pbname>) down:(<ip addr>) 884 E-DOC-CTC-20050531-0063 v1. 0 Syslog Messages RIP Module Facility LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 LOCAL1 Severity INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO Contents RIP Packet received from unknown interface RIP Packet size is smaller than minimum size RIP Packet size is greater than maximum size RIP Wrong RIP packet alignment RIP RIP version 0 with command <command-name> received RIP Reserved field not zero in RIP header RIP RIP is not enabled for network address <ip-address> RIP Packet's v<version_nr> does not match to RIP v<version_nr> RIP Packet's v<version_nr> does not match to RIP v<version_nr> on interface <intfname> RIP Packet v<version_nr> is dropped because authentication is disabled on interface <intf-name> RIP Simple password authentication failed on interface<intf-name> RIP No authentication in RIP packet RIP Obsolete command <command-name> received RIP Unknown RIP command received RIP Response does not come from default RIP port RIP Datagram doesn't come from a valid neighbor: <ip-address> RIP Unsupported family from <ip-address> RIP Network is net 127, class D or class E network RIP Address <ip-address> is my own address, net 0 or not unicast RIP RIPv1 packet with incorrect must be zero fields RIP Route metric is not in the 1-16 range RIP Nexthop address is not directly reachable <ip-address> RIP RIPv2 address <ip-address> is not correct mask /<mask> applied RIP Not configured for sending RIPv1 packet on interface <intf-name> RIP RIP routing table is full RIP Neighbor <ip-address> is not connected to direct network RIP Interface <intf-name> has not any valid local IP address for sending RIPv2 packets RIP Interface <intf-name> has not any valid %s address for sending RIPv<version_nr> packets RIP IP Address <ip-address> not found in RIP table E-DOC-CTC-20050531-0063 v1. 0 885 Syslog Messages Routing Module Facility LOCAL1 LOCAL1 SECURITY Severity INFO INFO INFO Contents GRP Default destination is routed via gateway <ip_address> GRP Default destination is not routed anymore via gateway <ip_address> LABEL Rule Id:<rule_id> Protocol: ICMP Src_ip: <ip_address> Dst_ip: <ip_address> ICMP message type: <message_type_name || message_type_id > Label: <label_name> LABEL Rule Id:<rule_id> Protocol: <protocol_name> Src_ip: <ip_address> Dst_ip: <ip_address> Label: <label_name> SECURITY INFO Session Module Facility AUTH Severity NOTICE Contents SESSION TIMEOUT Timeout!(after <seconds> sec) SIP Multi-media PBX Module Facility AUTH AUTH AUTH AUTH AUTH Severity NOTICE NOTICE NOTICE NOTICE NOTICE Contents SIPPBX Pass: from <caller> to <callee> : time=<start time>, duration=<duration> SIPPBX Fail: from <caller> to <callee> : reason = <reason> SIPPBX Fail: Outbound registration failed : reason = <reason> SIPPBX Fail: Outbound de-registration timed out SIPPBX Fail: Outbound registration timed out SNTP Module Facility NTP NTP NTP NTP NTP NTP NTP Severity WARNING WARNING WARNING INFO INFO WARNING ERROR Contents SNTP Unable to contact server: <SNTP server ip> SNTP Server not synchronized: <SNTP server ip> SNTP Invalid response from server: <SNTP server ip> SNTP Synchronized to server: <SNTP server ip> SNTP Synchronized again to server: <SNTP server ip> SNTP Roundtrip exceeds limits SNTP No server(s) configured, check configuration 886 E-DOC-CTC-20050531-0063 v1. 0 Syslog Messages Facility NTP Severity ERROR Contents SNTP Systemtime update: time setting <systemtime> > new time setting: <new time> E-DOC-CTC-20050531-0063 v1. 0 887 Syslog Messages Software Module Facility KERN KERN KERN KERN KERN KERN Severity INFO INFO INFO INFO INFO INFO Contents SOFTWARE Copying all data files from <file_location> to <file_location> SOFTWARE Switchover going down in <number> seconds SOFTWARE No passive software found, duplicating active software SOFTWARE Duplication of active software failed SOFTWARE File <Filename> <receive || transmit> initiated SOFTWARE File <Filename> <receive || transmit><"" || not> successful terminated" UPnP Module Facility WARNING NOTICE NOTICE Severity SECURITY SECURITY SECURITY Contents UPnP<ActionName> refused for ip=<ip_address> UPnP <ActionName> (<Error_string>) for ip=<ip_address> UPnP action <ActionName> from ip=<ip_address> (<Error_string>) Wireless Module Facility KERN KERN KERN KERN KERN KERN KERN KERN KERN KERN Severity INFO INFO INFO INFO INFO INFO INFO INFO INFO INFO Contents WIRELESS interface turned off WIRELESS interface turned on WIRELESS automatic channel selection done (channel = <channel_number>) chosen WIRELESS automatic channel selection: scan failed! [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE ALCATEL-LUCENT SPEEDTOUCH 620

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual ALCATEL-LUCENT SPEEDTOUCH 620 will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag