D-Link DSR-150N DSR-150 User Manual - Page 224

Adding Firewall Rule for RIP Protocol

Page 224 highlights

Unified Services Router User Manual Internet on port %d Enabling remote access management for IP address range" Enabling remote access management to only this PC. Disabling Management Access from Internet on port %d Disabling remote access management for IP address range" Disabling remote access management only to this PC. MAC Filtering %sabled for BLOCK and PERMIT REST. MAC Filtering %sabled for PERMIT and BLOCK REST. Enabling Content Filtering. Disabling Content Filtering. Deleting rule, port triggering for protocol TCP. Deleting rule, port triggering for protocol UDP. Deleting rule, port triggering for protocol TCP. Deleting rule, port triggering for protocol UDP. Enabling rule, port triggering for protocol TCP. Enabling rule, port triggering for protocol UDP. Enabling rule, port triggering for protocol TCP. Enabling rule, port triggering for protocol UDP. Enabling DNS proxy. DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG Restarting DNS proxy. DEBUG checking DNS proxy for Secure zone. DEBUG checking DNS proxy for Public zone. Enabling Block traffic from %s zone. Configuring firewall session settings for " Disabling DMZ DEBUG DEBUG DEBUG DEBUG Disabling WAN-DMZ rules . Enabling WAN DMZ rules . Restarting DMZ rule having %s address with %s address. Enabling LAN DHCP relay. OneToOneNat configured successfully DEBUG DEBUG DEBUG DEBUG DEBUG OneToOneNat configuration failed DEBUG Deleting scheduled IPv6 rules. delete from FirewallRules6 where ScheduleName = '%s'. DEBUG DEBUG %d:%d:%d:%d:%d Disabling Port Trigger Rule for %d:%d:%d:%d:%d Adding Port Trigger Rule for %d:%d:%d:%d:%d Enabling Content Filter Disabling Content Filter Enabling Content Filter Setting NAT mode for pLogicalIfName = %s Enabling DROP for INPUT Enabling DROP for FORWARD Enabling NAT based Firewall Rules Setting transparent mode for pLogicalIfName \ Enabling Accept for INPUT Enabling Accept for FORWARD Setting Routing mode for pLogicalIfName \ Enabling DROP for INPUT Enabling DROP for FORWARD Disabling NAT based Firewall Rules Enabling Firewall Rules for URL Filtering & " Adding Firewall Rule for RIP Protocol Restarting Schedule Based Firewall Rules enabling IPS checks between %s and %s zones. disabling IPS checks between %s and %s zones. Stopping IPS...%s IPS started. Route already exists Route addition failed: Network Unreachable Route addition failed: Network is down Route addition failed Failed to add rule in iptables Failed to delete rule from iptables fwLBSpillOverConfigure: Something going wrong here fwLBSpillOverConfigure: unable to get interfaceNam e fwLBSpillOverConfigure: Could not set PREROUTING rules DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG DEBUG ERROR ERROR ERROR 222

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270

Unified Services Router
User Manual
222
Internet on port %d
%d:%d:%d:%d:%d
Enabling remote access management
for IP address range"
DEBUG
Disabling Port Trigger Rule for
%d:%d:%d:%d:%d
DEBUG
Enabling remote access management to
only this PC.
DEBUG
Adding Port Trigger Rule for
%d:%d:%d:%d:%d
DEBUG
Disabling Management Access from
Internet on port %d
DEBUG
Enabling Content Filter
DEBUG
Disabling remote access management
for IP address range"
DEBUG
Disabling Content Filter
DEBUG
Disabling remote access management
only to this PC.
DEBUG
Enabling Content Filter
DEBUG
MAC Filtering %sabled for BLOCK and
PERMIT REST.
DEBUG
Setting NAT mode for pLogicalIfName
= %s
DEBUG
MAC Filtering %sabled for PERMIT and
BLOCK REST.
DEBUG
Enabling DROP for INPUT
DEBUG
Enabling Content Filtering.
DEBUG
Enabling DROP for FORWARD
DEBUG
Disabling Content Filtering.
DEBUG
Enabling NAT based Firewall Rules
DEBUG
Deleting rule, port triggering for protocol
TCP.
DEBUG
Setting transparent mode for
pLogicalIfName
\
DEBUG
Deleting rule, port triggering for protocol
UDP.
DEBUG
Enabling Accept for INPUT
DEBUG
Deleting rule, port triggering for protocol
TCP.
DEBUG
Enabling Accept for FORWARD
DEBUG
Deleting rule, port triggering for protocol
UDP.
DEBUG
Setting Routing mode for
pLogicalIfName \
DEBUG
Enabling rule, port triggering for protocol
TCP.
DEBUG
Enabling DROP for INPUT
DEBUG
Enabling rule, port triggering for protocol
UDP.
DEBUG
Enabling DROP for FORWARD
DEBUG
Enabling rule, port triggering for protocol
TCP.
DEBUG
Disabling NAT based Firewall Rules
DEBUG
Enabling rule, port triggering for protocol
UDP.
DEBUG
Enabling Firewall Rules for URL
Filtering & "
DEBUG
Enabling DNS proxy.
DEBUG
Adding Firewall Rule for RIP Protocol
DEBUG
Restarting DNS proxy.
DEBUG
Restarting Schedule Based Firewall
Rules
DEBUG
checking DNS proxy for Secure zone.
DEBUG
enabling IPS checks between %s and
%s zones.
DEBUG
checking DNS proxy for Public zone.
DEBUG
disabling IPS checks between %s and
%s zones.
DEBUG
Enabling Block traffic from %s zone.
DEBUG
Stopping IPS...%s
DEBUG
Configuring firewall session settings for "
DEBUG
IPS started.
DEBUG
Disabling DMZ
DEBUG
Route already exists
DEBUG
Disabling WAN-DMZ rules .
DEBUG
Route addition failed: Network
Unreachable
DEBUG
Enabling WAN DMZ rules .
DEBUG
Route addition failed: Network is down
DEBUG
Restarting DMZ rule having %s address
with %s address.
DEBUG
Route addition failed
DEBUG
Enabling LAN DHCP relay.
DEBUG
Failed to add rule in iptables
DEBUG
OneToOneNat configured successfully
DEBUG
Failed to delete rule from iptables
DEBUG
OneToOneNat configuration failed
DEBUG
fwLBSpillOverConfigure: Something
going wrong here
ERROR
Deleting scheduled IPv6 rules.
DEBUG
fwLBSpillOverConfigure: unable to get
interfaceName
ERROR
delete from FirewallRules6 where
ScheduleName = '%s'.
DEBUG
fwLBSpillOverConfigure: Could not set
PREROUTING rules
ERROR