Sveasoft − SV−Guide
Table of Contents
SV−Guide….........................................................................................................................................................1
SV−Administration−Diagnostics…...................................................................................................................3
SV−Administration−Factory Defaults…...........................................................................................................4
SV−Administration−Firmware Upgrade….......................................................................................................5
SV−Administration−Log…................................................................................................................................6
SV−Administration−Management−Bandwidth Management….....................................................................7
SV−Administration−Management−Boot Wait…..............................................................................................9
SV−Administration−Management−Busy Box….............................................................................................10
SV−Administration−Management−Cron…....................................................................................................11
SV−Administration−Management−DHCPd…...............................................................................................12
SV−Administration−Management−DNSMasq…...........................................................................................13
SV−Administration−Management−Firewall…...............................................................................................14
SV−Administration−Management−NAS….....................................................................................................15
SV−Administration−Management−NTPClient…...........................................................................................16
SV−Administration−Management−PPP…......................................................................................................17
SV−Administration−Management−PPTP…...................................................................................................18
SV−Administration−Management−Reset Buttond….....................................................................................20
SV−Administration−Management−Router Password…................................................................................21
SV−Administration−Management−Routing…...............................................................................................22
SV−Administration−Management−SSHD…...................................................................................................23
SV−Administration−Management−Syslogd…................................................................................................25
SV−Administration−Management−Telnet…..................................................................................................26
SV−Administration−Management−Tftpd…...................................................................................................27
Sveasoft − SV−Guide
i
Table of Contents
SV−Administration−Management−UPn P…..................................................................................................28
SV−Administration−Management−WL…......................................................................................................29
SV−Administration−Management…...............................................................................................................38
SV−Application Gaming−DMZ…....................................................................................................................39
SV−Application Gaming−Port Forwarding…................................................................................................40
SV−Available Customer Firmware…..............................................................................................................41
SV−Available Public Firmware…....................................................................................................................44
SV−Bigpond−Problems…................................................................................................................................45
SV−Bigpond−Setup….......................................................................................................................................46
SV−Building From Source…...........................................................................................................................47
SV−Download Locations…..............................................................................................................................49
SV−FAQ….........................................................................................................................................................50
SV−Future Fimrware Builds….......................................................................................................................53
SV−Getting Help…...........................................................................................................................................54
SV−Recovering Firmware…............................................................................................................................55
SV−Router Shell Docs…...................................................................................................................................58
SV−Scripts….....................................................................................................................................................77
SV−Security−Firewall…..................................................................................................................................78
SV−Security−VPN…........................................................................................................................................79
SV−Setup−Advanced Routing….....................................................................................................................80
SV−Setup−DDNS…..........................................................................................................................................81
SV−Setup−DHCP…..........................................................................................................................................82
SV−Setup−Internet….......................................................................................................................................83
Sveasoft − SV−Guide
ii
Table of Contents
SV−Setup−Mac Clone…...................................................................................................................................85
SV−Setup−Router….........................................................................................................................................87
SV−Setup−Time Zone…...................................................................................................................................88
SV−Status−LAN…............................................................................................................................................89
SV−Status−Router…........................................................................................................................................90
SV−Status−Wireless…......................................................................................................................................91
SV−Upgrading Firmware….............................................................................................................................92
SV−WRT54 GHardware…..............................................................................................................................94
SV−Wireless−AP…...........................................................................................................................................98
SV−Wireless−Advanced Settings…................................................................................................................100
SV−Wireless−Basic Settings….......................................................................................................................102
SV−Wireless−Clientmode…..........................................................................................................................104
SV−Wireless−MACFilter…...........................................................................................................................105
SV−Wireless−Security…................................................................................................................................106
SV−Wireless−WDS….....................................................................................................................................108
Sveasoft − SV−Guide
iii
SV−Guide
Sveasoft Firmware Guide for WRT54G
Part 1: The GUI
The Sveasoft firmware is based on various versions of Linksys firmware, and as such the GUI/web interface is
also a derivative of the standard version. Hence some of what is mentioned in the GUI section may be very
similar to what is provided in the built−in router documentation.
Basic configuration information (WAN settings, IP addresses, etc.)
WAN (Internet) Supported Connections: Basic configuration (WAN/Internet, IP addresses,
etc.)
¨
Router: IP Gateway Setup ¨
DHCP: IP Allocation ¨
Time Setting: Router Time Zone ¨
DDNS: Dynamic DNS (a persistent hostname that automatically points to your dynamic IP) ¨
Mac Address Cloning: Configure your WRT54G to spoof your current MAC (required by
some ISPs)
¨
Advanced Routing: Advanced Internet routing (OSPF, static routes, etc) ¨
·
Wireless Settings related to wireless networking (network ID, encryption, WDS, etc.)
Basic Settings: Basic wireless network settings, required to operate (network ID, channel, etc) ¨
Security: Settings that control wireless encryption and authentication ¨
MAC Filter: Additional security settings allowing one to limit access to a few specific
wireless cards
¨
Advanced Settings: Miscellaneous settings that govern the wireless system (antenna diversity,
transmission power, etc)
¨
WDS: Settings that control the Wireless Distribution System, allowing you to connect
wirelessly to other access points to extend your network footprint
¨
·
Security and VPN settings
Firewall: Enable and configure the built in firewall ¨
VPN: Enable the VPN pass−through for different protocols ¨
·
Application & Gaming: Port forwarding and DMZ configuration
Port Range Forwarding: Forward external ports to computers on your LAN ¨
DMZ: Make the router forward all the ports to any computer on your LAN ¨
·
Administration: WRT54G management (system options, firmware upgrades, etc.)
Management: Enable and configure advanced features ¨
Log: Enable different logging options on the router ¨
Diagnostics: Run command shell commands ¨
Factory Defaults: Reset your router to the factory defaults ¨
Firmware Upgrade: Upgrade your router’s firmware ¨
·
Status: Current system status (and client listings)
Router: Router and Internet connection status ¨
·
SV−Guide 1
LAN: LAN interface and DHCP status ¨
Wireless: Wireless related information such as Channel, mode, signal strength, etc. ¨
Part 2: The Command Line Shell
The Sveasoft firmware makes it easy to access your router from a command line shell interface over Telnet,
SSH, or even through the web−shell command submission form. If you are interested in using more advanced
features and capabilities of your router, or want troubleshoot some problems the web GUI can’t help you with,
or just plain and simple like using the shell, this section will interest you. As this router runs Linux, the shell
is a Linux shell and will respond to Linux shell commands…i.e. ‘ls’ instead of ‘dir’, ‘ifconfig’ instead of
‘ipconfig /all’, etc.
Shell Documentation ·
Documentation Errors & Suggestions
Documentation Feedback ·
Documentation Project Team Contributors ·
Documentation Site Forums ·
Note: some of the reference links in the documentation point to bulletin board posts that are in Sveasoft’s
Customer Support forum. This is a private forum that interested people can get access to either by a paid
firmware subscription or otherwise contributing non−financially to the firmware project. There is more
information about this in the Sveasoft forum announcements
One page links to SV−Guide:
Index ·
Last edited on Sunday, April 11, 2004 5:07:31 am.
Sveasoft − SV−Guide
SV−Guide 2
SV−Administration−Diagnostics
Diagnostics
svadministrationdiagnostics.jpg
Command Shell Parameters − Click Run to Execute a Script or Busy Box Command ·
One page links to SV−Administration−Diagnostics:
SV−Guide ·
Last edited on Sunday, April 11, 2004 4:03:41 am.
SV−Administration−Diagnostics 3
SV−Administration−Factory Defaults
Factory Defaults
svadministrationfactorydefaults.jpg
Restore Factory Defaults − Click the Yes button to reset all configuration settings to their default
values, and then click the Save Settings button. Note: Any settings you have saved will be lost when
the default settings are restored. This feature is disabled by default.
·
One page links to SV−Administration−FactoryDefaults:
SV−Guide ·
Last edited on Sunday, April 11, 2004 4:05:39 am.
SV−Administration−Factory Defaults 4
SV−Administration−Firmware Upgrade
Howto: Upgrading Firmware
svadministrationfirmwareupgrade.jpg
You should not upgrade the firmware via Wireless. You could break your box.
Click Browse, select the binary (.bin), click OK, and then upload.
Wait, and DO NOT unplug, or turn off the router.
One page links to SV−Administration−FirmwareUpgrade:
SV−Guide ·
Last edited on Sunday, April 11, 2004 4:07:57 am.
SV−Administration−Firmware Upgrade 5
SV−Administration−Log
Log
svadministrationlog.jpg
Log − The Router can keep logs of all incoming or outgoing traffic for your Internet connection. To
keep activity logs, select Enable. To see a temporary log of the Router’s most recent incoming traffic,
click the Incoming Access Log button. To see a temporary log of the Router’s most recent outgoing
traffic, click the Outgoing Access Log button.
·
One page links to SV−Administration−Log:
SV−Guide ·
Last edited on Sunday, April 11, 2004 3:58:08 am.
SV−Administration−Log 6
SV−Administration−Management−Bandwidth
Management
Bandwidth Management
svadministrationbandwidth.jpg
Note: Bandwidth Management does not work on the WAN port in Satori V2.00.8.6
Bandwidth Management (Also know as QOS) has been implemented in the form of Wondershaper. When
active, Wondershaper will automatically deprioritise* certain internet traffic thus ensuring mission critical
applications (ie VoIP) will have priority over others (ie FTP)
Bandwidth Mgmt − Dis/Enable Wondershaper to prioritise packet traffic. ·
WAN / LAN& wLan − Enable Bandwidth Management (QOS) for either the WAN port or the
LAN/Wireless LAN Ports)
·
Uplink − Total Bits Per Second of your Uplink Bandwidth Minus 20% (IE 1500/256 = 204, 512/128
= 102, 256/64 = 51 )
·
Downlink − Total Bits Per Second of your Downlink Bandwidth Minus 20% (IE 1500/256 = 1200,
512/128 = 410 , 256/64 = 205 )
·
NOTE: Never Set your Bandwidth Capacity to be more than 80%
Shaping Priority of traffic based on IP addresses/IP Address Netmasks
Low Priority Source Netmasks − Deprioritise all traffic originating from the IP address or IP Address
Range
·
Low Priority Destination Netmask − Deprioritise all traffic sent to IP address or IP Address Range
Formatting Netmasks − For a Single IP Address /32 (ie 192.168.1.50/32) ¨
Formatting Netmasks − For a Range of Four IP Addresses /30 (ie 192.168.1.1/30 will
represent 192.168.1.1 to 192.168.1.3 inclusive)
¨
Formatting Netmasks − For a Range of Sixteen IP Addresses /28 (ie 192.168.1.1/28 will
represent 192.168.1.1 to 192.168.1.15 inclusive)
¨
Formatting Netmasks − For a Range of Sixty Four IP Addresses /26 (ie 192.168.1.1/26 will
represent 192.168.1.1 to 192.168.1.63 inclusive)
¨
·
SV−Administration−Management−Bandwidth Management 7
Formatting Netmasks − For a Range of IP Addresses /24 (ie 192.168.1.1/24 will represent
192.168.1.1 to 192.168.1.254 inclusive)
¨
Lower the Priority of traffic based on Port
Low Priority Source Ports − Deprioritise all traffic originating from this port (ie FTP Port 21) ·
Low Priority Destination Ports − Deprioritise all traffic sent to this port (ie FTP Port 21)
Formatting Ports − For Multiple ports, Seperate each port with a space (ie 21 110) ¨
·
NOTE YOU MUST REBOOT THE ROUTER BEFORE THE SETTINGS YOU
CONFIGURED BECOME ACTIVE
Additional Notes:
In Satori_2 2.00.8.7 Wondershaper will be able to set higher and lower priories ·
In Satori_2 2.00.8.7 Wondershaper will be able to better manage prioritising P2P Traffic Flow ·
From Busybox execute nvram show | grep wshaper to show wondershapers current settings ·
From Busybox execute wshaper status eth1 (can be any ethernet port) to return Wondershaper’s
current status if you have a v1 or v1.1 router.
·
From Busybox execute wshaper status vlan1 to return Wondershaper’s current status for WAN if you
have a v2 router (working on pre3).
·
One page links to SV−Administration−Management−BandwidthManagement:
SV−Administration−Management ·
Last edited on Sunday, April 11, 2004 4:45:22 am.
Sveasoft − SV−Guide
SV−Administration−Management−BandwidthManagement 8
SV−Administration−Management−Boot Wait
Boot Wait
svadministrationcron.jpg
When Enabled the router will pause for approximately 1 seconds (The default is 1/2 second) to allow for
incoming Tftp firmware upgrades. It is HIGHLY recommended that this is set to ENABLED prior to flashing
new firmware.
See Upgrade Firmware or Recovering Firmware for more information about flashing or recovering firmware.
One page links to SV−Administration−Management−BootWait:
SV−Administration−Management ·
Last edited on Sunday, April 11, 2004 4:52:28 am.
SV−Administration−Management−Boot Wait 9
SV−Administration−Management−Busy Box
WRT54G Firmware Documentation
Busybox
BusyBox v0.60.0 (2004.01.20−20:47+0000) multi−call binary
Usage: busybox [function] [arguments]...
or: [function] [arguments]...
Valid Commands are: ash, busybox, cat, chmod, cmp, cp, cut, date, dc, dmesg, echo, false, free, grep, gunzip,
hexdump, ifconfig, insmod, kill, killall, klogd, ln, logger, ls, lsmod, mkdir, more, mv, ping, printf, ps, pwd,
reboot, rm, rmdir, rmmod, route, sed, sh, sleep, stty, sync, syslogd, tail, telnet, telnetd, test, touch, traceroute,
true, uname, uptime, vi, wget, which, zcat
Lowering The Processor Speed: What this will do is underclock the MIPS processor. Be very, very careful!
The first step is to use nvram to set the clock frequency. You can do this with nvram set clkfreq=XXX where
XXX is the frequency you want to set (maximum is 125). Then, store it into the nvram with nvram commit.
Now, all you have to do is reboot the router (reboot)
Busybox Documentation can be found Here
WL Commands can be found Here
4 pages link to SV−Administration−Management−BusyBox:
SV−Administration−Diagnostics ·
SV−Administration−Management−DHCPd ·
SV−Administration−Management−SSHD ·
SV−Administration−Management−Telnet ·
Last edited on Tuesday, March 2, 2004 10:55:40 pm.
SV−Administration−Management−Busy Box 10
SV−Administration−Management−Cron
WRT54G Firmware Documentation
Cron
Cron is used to schedule commands or scripts (groups of commands) automatically at a specified time/date.
Cron Format
01 * * * * root echo “This command is run at one min past every hour”
17 8 * * * root echo “This command is run daily at 8:17 am”
17 20 * * * root echo “This command is run daily at 8:17 pm”
00 4 * * 0 root echo “This command is run at 4 am every Sunday”
* 4 * * Sun root echo “So is this”
42 4 1 * * root echo “This command is run 4:42 am every 1st of the month”
01 * 19 07 * root echo “This command is run hourly on the 19th of July”
minute This controls what minute of the hour the command will run on,
and is between ‘0’ and ‘59’
hour This controls what hour the command will run on, and is specified in
the 24 hour clock, values must be between 0 and 23 (0 is midnight)
dom This is the Day of Month, that you want the command run on, e.g. to
run a command on the 19th of each month, the dom would be 19.
month This is the month a specified command will run on, it may be specified
numerically (0−12), or as the name of the month (e.g. May)
dow This is the Day of Week that you want a command to be run on, it can
also be numeric (0−7) or as the name of the day (e.g. sun).
user This is the user who runs the command.
cmd This is the command that you want run. This field may contain
multiple words or spaces.
One page links to SV−Administration−Management−Cron:
SV−Administration−Management ·
Last edited on Tuesday, March 2, 2004 10:49:12 pm.
SV−Administration−Management−Cron 11
SV−Administration−Management−DHCPd
DHCPd
svadministrationdhcpd.jpg
Dynamic Host Configuration Protocol, a protocol for assigning dynamic IP addresses to devices on a network.
With dynamic addressing, a device can have a different IP address every time it connects to the network. In
some systems, the device’s IP address can even change while it is still connected. DHCP also supports a mix
of static and dynamic IP addresses.)
If Disabled the DHCP Server defined in Setup will not function.
Static IP Addresses
DHCPd can support Static IP addresses, these are machines that will have a constant IP address but
have been configured as DHCP.
·
DHCP static addresses are in the form of (IP address) (HW Address) (Hostname) with SPACE
seperating all variables (ie 192.168.1.50 00:06:55:43:1E:B1 sveasoft)
·
DHCP Static address should ALWAYS be outside of the DHCP assigned address Range or IP
conflicts could occur.
·
HW Address (also known as MAC address) can be found in either the LAN or Wireless Status Screen ·
Hostnames (also known as Full Computer Name) can be found in the system properties tab in
Windows XP
·
Advanced
Sveasoft Firmware has been compiled with udhcp (integrated in busybox) ·
All lease information configuration and lease information can be found in /tmp ·
udhcpd.conf file will show you the subnet ranges for the leasing ·
udhcpd.statics will show you the statics ip’s ·
udhcpd.leases for current leases ·
4 pages link to SV−Administration−Management−DHCPd:
SV−Administration−Management ·
SV−Administration−Management−DNSMasq ·
SV−ApplicationGaming−PortForwarding ·
SV−Setup−DHCP ·
Last edited on Sunday, April 11, 2004 4:55:47 am.
SV−Administration−Management−DHCPd 12
SV−Administration−Management−DNSMasq
WRT54G Firmware Documentation
Dnsmasq
DNS MasqMAC<−>IP<−>HOSTNAME mappings
Dnsmasq is a lightweight, easy to configure DNS forwarder and DHCP server. It is designed to provide DNS
and (optionally) DHCP to a small network. It can serve the names of local machines which are not in the
global DNS. The DHCP server integrates with the DNS server and allows machines with DHCP−allocated
addresses to appear in the DNS.
See DHCPd for more Information on Static IP allocation.
2 pages link to SV−Administration−Management−DNSMasq:
SV−Administration−Management ·
SV−Setup−DHCP ·
Last edited on Tuesday, March 2, 2004 10:49:48 pm.
SV−Administration−Management−DNSMasq 13
SV−Administration−Management−Firewall
Firewall
svadministrationdfirewall.jpg
Disable / Enable the Firewall
One page links to SV−Administration−Management−Firewall:
SV−Administration−Management ·
Last edited on Sunday, April 11, 2004 4:58:19 am.
SV−Administration−Management−Firewall 14
SV−Administration−Management−NAS
NAS
svadministrationdnas.jpg
One page links to SV−Administration−Management−NAS:
SV−Administration−Management ·
Last edited on Sunday, April 11, 2004 5:00:50 am.
SV−Administration−Management−NAS 15
SV−Administration−Management−NTPClient
NTP
svadministrationdntp.jpg
Short for Network Time Protocol, an Internet standard protocol (built on top of TCP/IP) that assures accurate
synchronization to the millisecond of computer clock times in a network of computers.
If enabled, NTP will attempt to contact one of four NTP server(s) on the Internet or alternatively NTP will
contact a nominated NTP server based on the entered Server IP address. NTP attempts to contact a NTP
server (on Router boot) every 30 seconds to set the correct time/date for the router then after successfully
contacting the NTP server, the router will continue to reattempt to recontact the NTP server hourly.
NTP returns current UTC plus/minus the timecorrection factor specified in Time Zone
3 pages link to SV−Administration−Management−NTPClient:
SV−Administration−Management ·
SV−Setup−TimeZone ·
SV−Status−Router ·
Last edited on Sunday, April 11, 2004 5:11:07 am.
SV−Administration−Management−NTPClient 16
SV−Administration−Management−PPP
PPP
svadministrationppp.jpg
PPP or Point−to−Point Protocol is a method of connecting a computer to the Internet. PPP is more stable than
the older SLIP protocol and provides error checking features. Working in the data link layer of the OSI model,
PPP sends the computer’s TCP/IP packets to a server that puts them onto the Internet.)
If you are not connecting to the internet via PPP (ie PPTP or PPPoe) then you can safely disable PPP.
2 pages link to SV−Administration−Management−PPP:
SV−Administration−Management ·
SV−Setup−Internet ·
Last edited on Sunday, April 11, 2004 5:27:11 am.
SV−Administration−Management−PPP 17
SV−Administration−Management−PPTP
PPTP
svadministrationpptp.jpg
Short for Point−to−Point Tunneling Protocol, a new technology for creating Virtual Private Networks (VPNs)
, developed jointly by Microsoft Corporation, U.S. Robotics, and several remote access vendor companies,
known collectively as the PPTP Forum. A VPN is a private network of computers that uses the public Internet
to connect some nodes. Because the Internet is essentially an open network, the Point−to−Point Tunneling
Protocol (PPTP) is used to ensure that messages transmitted from one VPN node to another are secure. With
PPTP, users can dial in to their corporate network via the Internet.
Howto: Proper PPTP VPN Server setup
For the best results the “Server IP” should be the same as the router’s LAN IP address.
So for example, if your router’s IP address is 192.168.1.1 enter this ip address into the “Server
IP”. Do not be alarmed that the IP addresses are the same.. There will be no conflicts on the
router. The only reason why you would select a different IP address in “Server IP” is if you
want to setup a complex VPN infrastructure with your own route’s on both sides of the VPN
connection. (This is the reason the setup allows you to choose your own IP for server and
clients.)
¨
·
Now for the “Client IP”... Please select 10 or 20 ip addresses in the same subnet that are not used by
the router or DHCP server…
For example: If the router’s IP address is 192.168.1.1 and DHCP is setup to serve ip addresses
from 192.168.1.100 to 192.168.1.150 you can choose any addresses between 192.168.1.2 to
192.168.1.99 and 192.168.1.151 to 192.168.1.254. So if you enter 192.168.1.10−20 in the
“Client IP” it should be ok!
¨
·
When you setup the VPN connection on a Windows XP computer make sure you deselect “Use
default gateway†under the TCP/IP properties of the connection. You don’t need it no matter what
anyone says. The only reason you would want to have this on is to allow the VPN client to use your
internet connection. This is pointless really because this will incur double the traffic on the router’s
internet interface. The connecting client already has the connection to internet (this is how it is
connecting to the router in the first place).
·
Routing is setup automatically by XP and the PPTP VPN Server. ·
After you follow these steps the connecting VPN client will be able to ping ALL hosts on your network,
Wireless and LAN.
2 pages link to SV−Administration−Management−PPTP:
SV−Administration−Management−PPTP 18
SV−Administration−Management ·
SV−Setup−Internet ·
Last edited on Sunday, April 11, 2004 5:30:26 am.
Sveasoft − SV−Guide
SV−Administration−Management−PPTP 19
SV−Administration−Management−Reset Buttond
Reset Button
svadministrationresetbutton.jpg
Daemon that monitors the pressing of the back panel reset button to either
Reboot the router ·
Reboot the router and restores the route firmware back to default values) ·
“The entry under the Administration−>Management allows you to turn this daemon off. The daemon just
watches the reset button reboots or resets the router depending on how long it is held down.”
If this daemon is disabled you can still reboot the router by either power cycling it, or running the reboot
command via telnet, SSH, or the administration screen. If your router is used on a location where the reset
button is unaccesible, disabling this daemon will free some resources on the router.
Reference:
http://www.sveasoft.com/modules/phpBB2/viewtopic.php?t=684
One page links to SV−Administration−Management−ResetButtond:
SV−Administration−Management ·
Last edited on Sunday, April 11, 2004 5:34:51 am.
SV−Administration−Management−Reset Buttond 20
SV−Administration−Management−Router Password
Router Password
svadministrationrouterpassword.jpg
Router Password − The new Password must not exceed 32 characters in length and must not include
any spaces. Enter the new Password a second time to confirm it.
·
Remote Management − This feature allows you to manage your Router from a remote location, via
the Internet. To disable this feature, keep the default setting, Disable. To enable this feature, select
Enable, and use the specified port (default is 8080) on your PC to remotely manage the Router. You
must also change the Router’s default password to one of your own, if you haven already. A unique
password will increase security. To remotely manage the Router, enter http://xxx.xxx.xxx.xxx:8080
(the x’s represent the Router’s Internet IP address, and 8080 represents the specified port) in your web
browser’s Address field. You will be asked for the Router’s password. After successfully entering the
password, you will be able to access the Router’s web−based utility.
·
Note: If the Remote Management feature is enabled, anyone who knows the Router’s Internet IP address and
password will be able to alter the Router’s settings.
One page links to SV−Administration−Management−RouterPassword:
SV−Administration−Management ·
Last edited on Sunday, April 11, 2004 4:37:40 am.
SV−Administration−Management−Router Password 21
SV−Administration−Management−Routing
Routing
svadministrationadvancerouting.jpg
Dis/Enable Advanced Routing
One page links to SV−Administration−Management−Routing:
SV−Administration−Management ·
Last edited on Sunday, April 11, 2004 5:37:00 am.
SV−Administration−Management−Routing 22
SV−Administration−Management−SSHD
SSHD
What is SSH? − Developed by SSH Communications Security Ltd., Secure Shell is a program to log into the
linksys router while providing strong authentication and secure communications over insecure channels. (ie
the internet).
svadministrationsshd.jpg
How to Setup SSH Public Keys Via Putty
Here’s how you can get public−key based ssh access to your WRT54G:
Get PuTTY ·
Get PuTTYgen ·
Run PuTTYgen, select SSH2 RSA at parameters, 1024 bits. Press generate, it will create a
public/private key pair from your mouse movements.
·
Change comment to username@hostname, this step is not necessary but I believe it simplifies the
login because putty will use username as default login. I put .(JavaScript must be enabled to view this email address).
·
Save both keys to files but DON’T close PuTTYgen yet. Select everything in the field Public key for
pasting into OpenSSH authorized_keys2 file and copy it into clipboard.
·
Open WRT54G management page, enable SSHD and paste the key into the Authorized Keys−field.
Note: You can enable pwd login at this point if you like, it does not appear to interfere with
public key login and gives you the possibility to login with a password from unknown hosts.
¨
·
Time to run PuTTY! Enter IP adress of your router under host name, switch Protocol to SSH, under
Connection−>Auto−login username to root and MOST
IMPORTANT: point Connection−>SSH−>Auth−>Private key file for authentication to the
file you saved your private key in.
¨
·
Since you don’t want PuTTY to forget all this stuff you finally put some profile name (e.g. WRT54G) below
Session−>Saved Sessions and press Save.
The moment of truth: press Open in PuTTY and cross your fingers. If you did everything right and I
didn’t explain it wrong, you should get directly to a shell after getting the message Code:
·
Using username “root”. Authenticating with public key “root@unknown”
followed by a MOTD.
SV−Administration−Management−SSHD 23
How to Setup SSH Public Keys Via Unix
Install OpenSSH on your system, note that this is NOT the same as SSH.com’s ssh client and it will
generate keys that do not play nice with the router
·
Run the following command ssh−keygen −t rsa ·
Sample Output:
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa): tutorial
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in tutorial.
Your public key has been saved in tutorial.pub.
The key fingerprint is:
b0:ea:8c:27:d8:04:88:45:39:aa:2e:4b:20:71:3d:8a root@sombrero
My key saved to the current directory that I was in when I ran ssh−keygen, which happens to be
/root/.ssh2/tutorial. If you did not specify a place to save the key it will be in /root/.ssh/id_rsa as
evidenced by the path in parenthesis above. cat the public key like this: /root/.ssh2/tutorial.pub (note
the .pub extension)
·
sombrero .ssh2 # cat tutorial.pub
ssh−rsa AAAAB3NzaC1yc2EAAAABIwAAAIEA2eGrJIqvdStAEgowqwMtEUjW4T0c6+JmD17HO3E0/LfpwnfafJYeKPVXbsgYzbVnjXNy7op5YjaO2mQRjqLYbe66AE2A1g+It should come out as one long line like that, thats how the sveasoft firmware likes it, nice and long,
all in one line. Copy the entire output from the cat, and paste it into the autorized keys section.
·
Now, fire up your ssh client like this. ·
ssh 192.168.1.1 −l root −i tutorial
Note that we are specifying the private key with the −i option, and root as the user we want to log in
as with the −l option.
·
Note If you chose to password protect your key, you will now be prompted for that password, enter it,
and you’ll be logged into your router via SSH.
·
Advanced
To connect SSH from the WAN interface, map any port to router−ip: port 22. ·
To utilize SSH password authentication, you must enable password authentication and reboot the
router… then you may log in with username root and your router password that is set from the web
interface.
·
Router Shell Documentation − Busybox ·
Note that a router password change will only be reflected in the SSH daemon after a reboot
2 pages link to SV−Administration−Management−SSHD:
SV−Administration−Management ·
SV−Administration−Management−Telnet ·
Last edited on Sunday, April 11, 2004 5:39:30 am.
Sveasoft − SV−Guide
SV−Administration−Management−SSHD 24
SV−Administration−Management−Syslogd
WRT54G Firmware Documentation
Syslogd
Syslogd messages are generated by certain router processes (deamons). Once enabled, syslogd will broadcast
all syslogd messages to a single nominated ip address. To capture the broadcast of syslogd, utilise a logging
capture program (ie Kiwi System Log) on the receiving machine, listening on UDP port 514.
syslodg example output
13−01−2004 15:49:21 Cron.Info 192.168.1.1 syslog[16322]: (root) MAIL (mailed 51 bytes of 13−01−2004 15:49:20 Cron.Info 192.168.1.1 syslog[16323]: (root) CMD (/sbin/monitor_ps)
13−01−2004 15:47:20 Cron.Info 192.168.1.1 syslog[16313]: (root) MAIL (mailed 51 bytes of 13−01−2004 15:47:20 Cron.Info 192.168.1.1 syslog[16314]: (root) CMD (/sbin/monitor_ps)
13−01−2004 15:46:41 Cron.Info 192.168.1.1 syslog[16304]: (root) MAIL (mailed 51 bytes of 13−01−2004 15:46:40 Cron.Info 192.168.1.1 syslog[16305]: (root) CMD (/sbin/monitor_ps)
13−01−2004 15:46:40 Cron.Info 192.168.1.1 syslog[16252]: (*system*) RELOAD (/tmp/crontab)
13−01−2004 15:46:38 Daemon.Info 192.168.1.1 dnsmasq[16293]: reading /tmp/udhcpd.leases
13−01−2004 15:46:38 Daemon.Info 192.168.1.1 dnsmasq[16293]: using nameserver 210.15.254.240
13−01−2004 15:46:38 Daemon.Info 192.168.1.1 dnsmasq[16293]: using nameserver 210.15.254.241
13−01−2004 15:46:38 Daemon.Info 192.168.1.1 dnsmasq[16293]: reading /tmp/resolv.conf
13−01−2004 15:46:38 Daemon.Info 192.168.1.1 dnsmasq[16293]: reading /etc/hosts
13−01−2004 15:46:38 Daemon.Warning 192.168.1.1 dnsmasq[16293]: failed to drop root privs
13−01−2004 15:46:38 Daemon.Info 192.168.1.1 dnsmasq[16293]: started, version 1.10 cachesize 13−01−2004 15:46:37 Daemon.Notice 192.168.1.1 pppd[16280]: pppd 2.4.1 started by root, 13−01−2004 15:46:36 Daemon.Info 192.168.1.1 dnsmasq[16258]: reading /tmp/udhcpd.leases
13−01−2004 15:46:36 Daemon.Info 192.168.1.1 dnsmasq[16258]: using nameserver 210.15.254.240
13−01−2004 15:46:36 Daemon.Info 192.168.1.1 dnsmasq[16258]: using nameserver 210.15.254.241
13−01−2004 15:46:36 Daemon.Info 192.168.1.1 dnsmasq[16258]: reading /tmp/resolv.conf
13−01−2004 15:46:36 Daemon.Info 192.168.1.1 dnsmasq[16258]: reading /etc/hosts
13−01−2004 15:46:36 Daemon.Warning 192.168.1.1 dnsmasq[16258]: failed to drop root privs
13−01−2004 15:46:36 Daemon.Info 192.168.1.1 dnsmasq[16258]: started, version 1.10 cachesize 13−01−2004 15:46:35 Cron.Info 192.168.1.1 syslog[16252]: (CRON) STARTUP (fork ok)
13−01−2004 15:46:35 Syslog.Info 192.168.1.1 syslogd started: BusyBox v0.60.0 (2004.01.09−NOTE: Syslogd messages cannot be utilised as Packet / Traffic Based Logging.
One page links to SV−Administration−Management−Syslogd:
SV−Administration−Management ·
Last edited on Tuesday, March 2, 2004 10:53:39 pm.
SV−Administration−Management−Syslogd 25
SV−Administration−Management−Telnet
Telnet
svadministrationtelnet.jpg
A terminal emulation program for TCP/IP networks used to provide a unsecure way of accessing the router
shell. As Telnet DOES NOT support password validation any machine on the WLan or LAN ports will
potentially have full router access.
Use SSH to securely access the router shell ·
Although Windows has a builtin telnet client, the freeware client PuTTY is highly recommended. ·
Router Shell Documentation − Busybox ·
Note: Telnet is blocked for access from the WAN (ETH1) Ports
One page links to SV−Administration−Management−Telnet:
SV−Administration−Management ·
Last edited on Sunday, April 11, 2004 5:41:24 am.
SV−Administration−Management−Telnet 26
SV−Administration−Management−Tftpd
Tftpd
Abbreviation of Trivial File Transfer Protocol, a simple form of the File Transfer Protocol (FTP). TFTP uses
the User Datagram Protocol (UDP) to transfer files to/from the router.
svadministrationtftpd.jpg
Tftp is primary utilised as an alterative (and safer) technique for upgrading firmware. As Linksys have
enhanced the Tftp client to provide password protection, it is only possible to utilise the Linksys Tftp client to
transfer files under Windows. Linux users can utilise the standard distribution tftp client.
Notes for Use to Linksys Tftp
Files must be transfered in BINARY MODE. ·
Files will fail to transfer if the internal CRC on the file being transferred is not correct. ·
One page links to SV−Administration−Management−Tftpd:
SV−Administration−Management ·
Last edited on Sunday, April 11, 2004 5:43:52 am.
SV−Administration−Management−Tftpd 27
SV−Administration−Management−UPn P
UPnP
svadministrationupnp.jpg
UPNP is short for Universal Plug and Play, a networking architecture that provides compatibility among
networking equipment, software and peripherals of the 400+ vendors that are part of the Universal Plug and
Play Forum. UPnP works with wired or wireless networks and can be supported on any operating system.
UPnP boasts device−driver independence and zero−configuration networking.
Note: upnp will not operate via a PPPOE internet connection.
One page links to SV−Administration−Management−UPnP:
SV−Administration−Management ·
Last edited on Sunday, April 11, 2004 5:46:18 am.
SV−Administration−Management−UPn P 28
SV−Administration−Management−WL
WRT54G Firmware Documentation
WL Commands
Usage: wl [−a|i <adapter>] [−hu] <command> [arguments]
−a, −i adapter name or number
−h, −u this message
ver get version information
up reinitialize and mark adapter up (operational)
down reset and mark adapter down (disabled)
out mark adapter down but do not reset hardware(disabled. On dualband cards, cards must be clk set board clock state. return error for set_clk attempt if the driver is not down
0: clock off
1: clock on
restart Restart driver. Driver must already be down.
reboot Reboot platform
ucflags Get/Set ucode flags
radio (on or off) Set the radio on or off.
dump print driver software state and chip registers to stdout
srdump print contents of SPROM to stdout
nvdump print nvram variables to stdout
nvset set an nvram variable
name=value (no spaces around ‘=’)
nvget get the value of an nvram variable
revinfo get hardware revision information
msglevel
set driver console debugging message bitvector
type ‘wl msglevel ?’ for values
PM set driver power management mode:
0: CAM (constantly awake)
1: PS (power−save)
SV−Administration−Management−WL 29
wake set driver power−save mode sleep state:
0: core−managed
1: awake
promisc set promiscuous mode ethernet address reception
0 − disable
1 − enable
monitor set monitor mode
0 − disable
1 − enable active monitor mode (interface still operates)
frag Set the fragmentation threshhold. (integer [256, 2346])
rts Set the RTS threshhold. (integer [0, 2347])
cwmin Set the cwmin. (integer [1, 255])
cwmax Set the cwmax. (integer [256, 2047])
srl Set the short retry limit. (integer [1, 255])
lrl Set the long retry limit. (integer [1, 255])
rate force a fixed rate:
valid values for 802.11a are (6, 9, 12, 18, 24, 36, 48, 54)
valid values for 802.11b are (1, 2, 5.5, 11)
valid values for 802.11g are (1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54)
−1 (default) means automatically determine the best rate
mrate force a fixed multicast rate:
valid values for 802.11a are (6, 9, 12, 18, 24, 36, 48, 54)
valid values for 802.11b are (1, 2, 5.5, 11)
valid values for 802.11g are (1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54)
−1 (default) means automatically determine the best rate
infra Set Infrastructure mode: 0 (IBSS) or 1 (Infra BSS)
ap Set AP mode: 0 (STA) or 1 (AP)
bssid Get the BSSID value, error if STA and not associated
channel Set the channel:
valid channels for 802.11b/g (2.4GHz band) are 1 through 14
valid channels for 802.11a (5 GHz band) are:
36, 40, 44, 48, 52, 56, 60, 64,
100, 104, 108, 112, 116,120, 124, 128, 132, 136, 140,
149, 153, 157, 161,
184, 188, 192, 196, 200, 204, 208, 212, 216
tssi Get the tssi value from radio
txpwr Set tx power in milliwatts. Range [1, 84].
txpathpwr
Turn the tx path power on or off on 2050 radios
powerindex
Set the transmit power for A band(0−63).
−1 − default value
Sveasoft − SV−Guide
SV−Administration−Management−WL 30
atten Set the transmit attenuation for B band. Args: bb radio txctl1.
auto to revert to automatic control
phyreg Get/Set a phy register.
radioreg
Get/Set a radio register.
shmem Get/Set a shared memory location.
macreg Get/Set any mac registers(include IHR and SB)
macreg offset size[2,4] [value]
antdiv Set antenna diversity for rx
0 − force use of antenna 0
1 − force use of antenna 1
3 − automatic selection of antenna diversity
txant Set the transmit antenna
0 − force use of antenna 0
1 − force use of antenna 1
3 − use the RX antenna selection that was in force during
the most recently received good PLCP header
plcphdr Set the plcp header.
“long” or “auto” or “debug”
phytype Get phy type
scbdump print driver scb state to stdout
ratedump
print driver rate selection tunables and
per−scb state to stdout, valid scb values are
0 through NSCB−1
rateparam
set driver rate selection tunables
arg 1: tunable id
arg 2: tunable value
wepstatus
Set or Get WEP status
wepstatus [on|off]
primary_key
Set or get index of primary key
addwep Set an encryption key. The key must be 5, 13 or 16 bytes long, or
10, 26, 32, or 64 hex digits long. The encryption algorithm is
automatically selected based on the key size. keytype is accepted
only when key length is 16 bytes/32 hex digits and specifies
whether AES−OCB or AES−CCM encryption is used. Default is ccm.
addwep <keyindex> <keydata> [ocb | ccm] [notx] [xx:xx:xx:xx:xx:xx]
rmwep Remove the encryption key at the specified key index.
wep Set WEP options.
wl wep [options]
[on|enable|1] enable WEP
Sveasoft − SV−Guide
SV−Administration−Management−WL 31
[off|disable|0] disable WEP
[sw|software] perform WEP in software
[hw|hardware] perform WEP in hardware
tkip Set TKIP options.
wl tkip [options]
[on|enable|1] enable TKIP
[off|disable|0] disable TKIP
[sw|software] perform TKIP in software
[hw|hardware] perform TKIP in hardware
aes Set AES options.
wl aes [options]
[on|enable|1] enable AES
[off|disable|0] disable AES
[sw|software] perform AES in software
[hw|hardware] perform AES in hardware
keys Prints a list of the current WEP keys
txiv Print Tx IV for key at specified key index.
wsec_test
Generate wsec errors
wsec_test <test_type> <keyindex|xx:xx:xx:xx:xx:xx>
type ‘wl wsec_test ?’ for test_types
tkip_countermeasures
Enable or disable TKIP countermeasures (TKIP−enabled AP only)
0 − disable
1 − enable
wsec_restrict
Drop unencrypted packets if WSEC is enabled
0 − disable
1 − enable
eap restrict traffic to 802.1X packets until 802.1X authorization succeeds
0 − disable
1 − enable
authorize
restrict traffic to 802.1X packets until 802.1X authorization succeeds
deauthorize
do not restrict traffic to 802.1X packets until 802.1X authorization succeeds
deauthenticate
deauthenticate a STA from the AP with optional reason code (AP ONLY)
wsec wireless security bit vector
1 − WEP enabled
2 − TKIP enabled
4 − AES enabled
8 − WSEC in software
wpa_auth
WPA authorization mode
[none|0] none
[unspecified|1] WPA 802.1X
[psk|2] WPA PSK
Sveasoft − SV−Guide
SV−Administration−Management−WL 32
[disable|255] disable WPA
scan Initiate an active scan across all channels.
Optional SSID argument specifies a particular SSID to scan.
With no SSID argument, a broadcast SSID scan is performed.
passive Puts scan engine into passive mode
regulatory
Get/Set regulatory domain mode (802.11d). Driver must be down.
spect Get/Set 802.11h Spectrum Management mode.
scanresults
Return results from last scan.
assoc Print information about current network association.
(also known as “status”)
status Print information about current network association.
(also known as “assoc”)
disassoc
Disassociate from the current BSS/IBSS.
chanlist
Return valid channels for the current settings.
channels
Return valid channels for the current settings.
channels_in_country
Return valid channels for the country specified.
Arg 1 is the country abbreviation
Arg 2 is the band(a or b)
curpower
Return current tx power settings
scansuppress
Suppress OID_802_11_BSSID_LIST_SCAN requests for testing.
0 − allow scans
1 − suppress scans
evm Start an EVM test on the given channel, or stop EVM test.
Arg 1 is channel number 1−14, or “off” or 0 to stop the test.
Arg 2 is optional rate (1, 2, 5.5 or 11)
rateset Returns or sets the supported and basic rateset, (b) indicates basic
With no args, returns the rateset. Args are
rateset “default” | “all” | <arbitrary rateset>
default − driver defaults
all − all rates are basic rates
arbitrary rateset − list of rates
List of rates are in Mbps and each rate is optionally followed
by “(b)” or “b” for a Basic rate. Example: 1(b) 2b 5.5 11
At least one rate must be Basic for a legal rateset.
roam_trigger
Set the roam trigger RSSI threshold. (integer)
Sveasoft − SV−Guide
SV−Administration−Management−WL 33
roam_delta
Set the roam candidate qualification delta. (integer)
roam_scan_period
Set the roam candidate qualification delta. (integer)
suprates
Returns or sets the 11g override for the supported rateset
With no args, returns the rateset. Args are a list of rates,
or 0 or −1 to specify an empty rateset to clear the override.
List of rates are in Mbps, example: 1 2 5.5 11
scan_channel_time
Get/Set scan channel time
scan_unassoc_time
Get/Set unassociated scan channel dwell time
scan_home_time
Get/Set scan home channel dwell time
scan_passive_time
Get/Set passive scan channel dwell time
scan_nprobes
Get/Set scan parameter for number of probes to use per channel scanned
prb_resp_timeout
Get/Set probe response timeout
channel_qa
Get last channel quality measurment
channel_qa_start
Start a channel quality measurment
country Select Country code for use with 802.11d
Use either long name or abbreviation from ISO 3166.
Use ‘wl country list’ for the complete list.
locale Select the country:
Worldwide
Thailand
Israel
Jordan
China
Japan
USA/Canada/ANZ
Europe
USAlow
JapanHigh
All
join Join a specified network SSID.
Join syntax is: join <ssid> [key xxxxx] [imode bss|ibss] [amode open|shared]
ssid Set or get the current SSID.
Setting will initiate an assoication attempt if in infrastructure mode,
or join/creation of an IBSS if in IBSS mode,
or creation of a BSS if in AP mode.
Sveasoft − SV−Guide
SV−Administration−Management−WL 34
mac Set or get the list of source MAC address matches.
wl mac xx:xx:xx:xx:xx:xx [xx:xx:xx:xx:xx:xx ...]
To Clear the list: wl mac none
macmode Set the mode of the MAC list.
0 − Disable MAC address matching.
1 − Deny association to stations on the MAC list.
2 − Allow association to stations on the MAC list.
wds Set or get the list of WDS member MAC addresses.
Set using a space separated list of MAC addresses.
wl wds xx:xx:xx:xx:xx:xx [xx:xx:xx:xx:xx:xx ...]
lazywds Set or get “lazy” WDS mode (dynamically grant WDS membership to anyone).
noise Get noise (moving average) right after tx in dBm
fqacurcy
Manufacturing test: set frequency accuracy mode.
freqacuracy syntax is: fqacurcy <channel>
Arg is channel number 1−14, or 0 to stop the test.
crsuprs Manufacturing test: set carrier suppression mode.
carriersuprs syntax is: crsuprs <channel>
Arg is channel number 1−14, or 0 to stop the test.
int Interrupt Test − remember to precede by ‘wl down’ and follow by ‘wl up’
lbt Loopback Test − remember to precede by ‘wl down’ and follow by ‘wl up’
band Returns or sets the current band
auto − auto switch between available bands (default)
a − force use of 802.11a band
b − force use of 802.11b band
bands Return the list of available 802.11 bands
phylist Return the list of available phytypes
shortslot
Get/Set 11g Short Slot Timing mode. (−1=auto, 0=long, 1=short)
shortslot_override
Get/Set 11g Short Slot Timing mode override. (−1=auto, 0=long, 1=short)
shortslot_restrict
Get/Set AP Restriction on associations for 11g Short Slot Timing capable STAs.
0 − Do not restrict association based on ShortSlot capability
1 − Restrict association to STAs with ShortSlot capability
ignore_bcns
AP only (G mode): Check for beacons without NONERP element (0=Examine beacons, 1=Ignore pktcnt Get the summary of good and bad packets.
upgrade Upgrade the firmware on an embedded device
gmode Set the 54g Mode (LegacyB|Auto||GOnly|BDeferred|Performance|LRS)
gmode_protection
Get G protection mode. (0=disabled, 1=enabled)
Sveasoft − SV−Guide
SV−Administration−Management−WL 35
gmode_protection_control
Get/Set 11g protection mode control alg. (0=always off, 1=monitor local association, 2=gmode_protection_cts
Get/Set 11g protection type to CTS (0=disable, 1=enable)
gmode_protection_override
Get/Set 11g protection mode override. (−1=auto, 0=disable, 1=enable)
legacy_erp
Get/Set 11g legacy ERP inclusion (0=disable, 1=enable)
scb_timeout
AP only: inactivity timeout value for authenticated stas
assoclist
AP only: Get the list of associated MAC addresses.
rssi Get the current RSSI val, for an AP you must specify the mac addr of the STA
isup Get driver operational state (0=down, 1=up)
fasttimer
Get/Set High frequency watchdog timeout (tx_power) [15 sec]
slowtimer
Get/Set Low frequency watchdog timeout (nrssislope) [60 sec]
radar Enable/Disable radar
glacialtimer
Get/Set Very Low frequency watchdog timeout (measurelo) [120 sec]
rssidump
Dump rssi values from aci scans
interference
Get/Set interference mitigation mode. Choices are:
0 = none
1 = non wlan
2 = wlan manual
3 = wlan automatic
aciargs Get/Set various aci tuning parameters. Choices are:
enter: CRS glitch trigger level to start detecting ACI
exit: CRS glitch trigger level to exit ACI mode
glitch Seconds interval between ACI scans when glitchcount is continuously high
spin: Num microsecs to delay between rssi samples
Usage: wl aciargs [enter x][exit x][spin x][glitch x]
frameburst
Disable/Enable frameburst mode
pwr_percent
Get/Set power output percentage
wet Get/Set wireless ethernet bridging mode
dtim Get/Set DTIM
Sveasoft − SV−Guide
SV−Administration−Management−WL 36
peer_mac
Get WDS peer MAC address
wpa_sup Get WDS peer MAC address
measure_req
Send an 802.11h measurement request.
Usage: wl measure_req <type> <target MAC addr>
Measurement types are: TPC, Basic, CCA, RPI
Target MAC addr format is xx:xx:xx:xx:xx:xx
quiet Send an 802.11h quiet command.
Usage: wl quiet <TBTTs until start>, <duration (in TUs)>, <offset (in TUs)>
csa Send an 802.11h channel switch anouncement
Usage wl csa <mode> <when (in TBTTs)> <channel>
constraint
Send an 802.11h Power Constraint IE
Usage: wl constraint 1−255 db
One page links to SV−Administration−Management−WL:
SV−Administration−Management−BusyBox ·
Last edited on Tuesday, March 2, 2004 11:01:59 pm.
Sveasoft − SV−Guide
SV−Administration−Management−WL 37
SV−Administration−Management
Management
svadministration.jpg
Router Password − Change the password used to administer the router ·
Bandwidth Management − Enable and configure Bandwitdh Management ·
Boot Wait − Enable or disable the boot wait feature ·
Cron − Enable and configure the cron daemon ·
DHCPd − Enable or disable the DHCP daemon and set static DHCP entries ·
DNS Masq − Enable or disable the DNS server ·
Firewall − Enable or disable the system’s firewall ·
NAS ·
NTP Client − Enable or disable the NTP daemon ·
PPP ·
PPTP − Enable and configure the built in PPTP server ·
Reset Button − Enable or disable the Reset Button daemon ·
Routing − Configure advanced routing options ·
SSHD − Enable and configure SSH access to the router ·
Syslogd − Enable the syslog daemon ·
Telnet − Enable or disable telnet access to the router ·
Tftpd − Enable or disable the tftp daemon used to upload new firmware images ·
UPnP − Enable or disable the UPnP features on the router ·
“The Enable/Disable flags under Administration−>Management are designed to be the “master switches” in
the system. If you disable anything here it is disabled everywhere.” The following was made in regards to the
Satori pre3.3 and earlier builds. It may have been implemented in later builds. “I will be moving the few odd
parameter settings out of the Enable/Disable area so they will be pure, system−wide off/on settings for the
major services.” Quoted from Sveasoft on March 28, 2004. Reference:
http://www.sveasoft.com/modules/phpBB2/viewtopic.php?t=1033
2 pages link to SV−Administration−Management:
SV−FAQ ·
SV−Guide ·
Last edited on Sunday, April 11, 2004 5:47:40 am.
SV−Administration−Management 38
SV−Application Gaming−DMZ
DMZ
svapplicationgamingdmz.jpg
The DMZ hosting feature allows one local user to be exposed to the Internet for use of a special−purpose
service such as Internet gaming or videoconferencing. DMZ hosting forwards all the ports at the same time to
one PC. The Port Forwarding feature is more secure because it only opens the ports you want to have opened,
while DMZ hosting opens all the ports of one computer, exposing the computer so the Internet can see it.
Any PC whose port is being forwarded must have its DHCP client function disabled and should have a new
static IP address assigned to it because its IP address may change when using the DHCP function.
One page links to SV−ApplicationGaming−DMZ:
SV−Guide ·
Last edited on Sunday, April 11, 2004 3:53:49 am.
SV−Application Gaming−DMZ 39
SV−Application Gaming−Port Forwarding
Port Range Forwarding
svapplicationgaming.jpg
The Port Range Forwarding screen sets up public services on your network, such as web servers, ftp servers,
e−mail servers, or other specialized Internet applications. (Specialized Internet applications are any
applications that use Internet access to perform functions such as videoconferencing or online gaming. Some
Internet applications may not require any forwarding.)
When users send this type of request to your network via the Internet, the Router will forward those requests
to the appropriate PC. Any PC whose port is being forwarded to must have a static IP address, either by
having its DHCP client function disabled, or by having a static DHCP entry defined (see DHCPd for help on
this). Using a dynamic IP address is not recommended, as its IP may change.
Customized Applications − Enter the name of the public service or other Internet application in the
field provided.
·
External Port− Enter the numbers of the External Ports (the port numbers seen by users on the
Internet).
·
TCP/UDP Protocol ·
IP Address − Enter the FULL IP Address of the PC running the application. ·
Enable − Click the Enable checkbox to enable port forwarding for the application. ·
One page links to SV−ApplicationGaming−PortForwarding:
SV−Guide ·
Last edited on Sunday, April 11, 2004 3:50:49 am.
SV−Application Gaming−Port Forwarding 40
SV−Available Customer Firmware
WRT54G Firmware Documentation
Sveasoft Firmware Current Version − Satori−pre5 v2.00.8.7sv
(Released April 11, 2004)
Enhancements
WDS greatly enhanced
supports any combination of P2P, br0, or br1 subnet for up to 10 links ·
PPPoE
completely replaced ·
using Roaring Penguin module ·
Client Mode
tested and working ·
stats in Stats−>Wireless page ·
Adhoc Mode
tested and working ·
stats in Stats−>Wireless page ·
BPALogin, DHCP, DNS fixes
thanks to Rod Whittby ·
Bandwidth Management
no longer requires rebooting ·
Loopback
new option under Administration−>Management ·
PPTP and VPN Passthrough fixes
Several misc bug fixes
SV−Available Customer Firmware 41
Previous Build Level details:
Satori−pre4 v2.00.8.7sv (Released March 28, 2004)
Internal Modifications
Added approximately 20 iptables filters includ