Error Log?
No Graphs?
how to flash tomato usb firmware to Asus rt-ac68w wireless router for cyberghostvpn
Are there plans for a version for the R8000?
DNSCrypt Problems
OpenVPN with BTGuard Problems
Tomato shibby changeip.com DDNS
Weird login error
Linksys E 1000 V2 which firmware do I use???
netgear 3800b
VPN Issue
WNR3500L v2 WAN IP
Quick Review & Specifications Netgear Dual Band WiFi Range Extender
Maximize the power of your network and make sure you have coverage in every corner of your home with the AC1200 High Power WiFi Range Extender. Get ultimate range and performance you need for iPads®, smartphones, laptops & more!
Product Highlights
- Extends 802.11ac dual band WiFi up to 1200Mbps
- 700mW amplified high-power design with 5dBi external antennas for ultimate range
- Dual core processor for max gigabit WiFi performance
- Flexible and convenient placement—horizontal or vertical
- Finds best location for optimal wireless coverage with dynamic LED indicators
- Easy installation—no CD or Ethernet cable required
- Provides security through encryption using WPA/WPA2/WEP
Product Benefits
- Boost WiFi in very large homes and even backyards
- Eliminate WiFi dead zones in hard to reach areas
- Improve your mobile WiFi speeds by up to 100% in remote areas
- FastLane feature uses both WiFi bands to establish one super high-speed connection
- Connect up to five devices like gaming consoles, smart TVs, and more to your WiFi network at gigabit speeds.
- Wirelessly share your media files with any device on your network
- Print documents & photos to any USB printer connected to the extender
Special Features
- Next Generation WiFi—Create faster dual band WiFi access with 802.11ac technology up to 1200Mbps.
- Ultimate Range—700 mW high-power amplifiers & high-gain 5dBi antennas for maximum WiFi coverage.
- Blazing Fast CPU—Powerful dual core ARM A9 processor enables maximum WiFi throughput at Gigabit speed.
- 5 Gigabit Ethernet Ports—Connect up to 5 wired devices like Blu-ray players, game consoles, smart TVs or streaming players to your WiFi network.
- Beamforming+—Focuses WiFi signals directly to wireless devices for more reliable connections.
- FastLane Technology—Use both WiFi bands to establish one super high-speed connection; ideal for HD streaming & gaming.
- Readyshare USB—Wirelessly share & access USB storage connected to the USB 3.0 port.
- Wireless Printing—Print documents & photos to any USB printer connected to the WiFi Range Extender. WiFi coverage
Specifications
- WiFi Technology - 802.11ac
- WiFi Tech and Range - AC1200 (300 Mbps+900 Mbps)†
- WiFi Band- Dual Band 2.4 & 5GHz
- Number of Ethernet Ports - Five (5) 10/100/1000 Ethernet ports with auto-sensing technology
- Number of USB Ports - One (1) USB 3.0 port
- Dimensions: 9.92 x 6.85 x 1.22 in (252 x 174 x 31 mm)
- Weight: 0.67 lb (302 g)
Key Features
- Extends 2.4 and 5 GHz WiFi signals from existing WiFi routers for better range
- Powerful 800 MHz dual core processor
- 700 mW high-power amplifiers
- 5dBi high-gain antennas
- Beamforming+ for improved reliability
- FastLane™ feature provides high-speed WiFi on both wireless bands and is ideal for HD gaming and video streaming
- Ease of Use - Push ‘N’ Connect using Wi-Fi Protected Setup®(WPS)1
- Power on/off button
How to Flash Firmware on your NETGEAR Router (Broadcom Based) using Linux and a USB-TTL Cable
This tutorial guides users to install firmware into their Broadcom(BRCM) based Netgear router from a linux machine, using USB-TTL cable.
Prerequisites:
- Target router with serial connection pins on board.
- One Ethernet cable.
- An appropriate screwdriver, which is used to open the case of the router.
- A USB-TTL cable or compatible serial cable.
- A machine installed with following software,
- TFTP Client.
- Serial Client (e.g. Minicom).
Supported Netgear Router Models:-
This tutorial may be referenced for following router models.
Serial Pin Connection:-
Visit appropriate link to get details of the serial pin connection for the target board.
Firmware upgrade procedure: -
STEP 1:
Connect one end of serial cable with the serial pins on the board and another end to your PC.
Configure serial client of your PC. If you are using minicom then this guidewill help you. A sample minicom configuration is given shown in Figure 1.
Figure 1
STEP 2:
Connect your PC to the LAN port of the router with a straight cable and assign a IP address “192.168.1.X” in your PC (assuming the router's default IP is 192.168.1.1).
STEP 3:
Now switch on your router. You must be able to -
See router's booting log in minicom.
- ping 192.168.1.1 (router's default IP) from your PC, as soon as router finishes its booting.
STEP 4:
Now to enter in boot prompt, you have to simultaneously press “Ctrl” and “c” key of your PC and reboot your router. In boot prompt, enter “tftpd” command to go into “TFTP Server mode”.
If tftp server sucessfully started, you will get a message "Reading::" as shown in Figure 2.
Figure 2
STEP 5:
Go into the directory containing the firmware file in your PC. Upload the firmware using following command.
tftp -m binary 192.168.1.1 -c put <Firmware Name>
STEP 6:
After the new firmware is transmitted, the router will start flashing it and reboot the unit automatically.
You will be able to follow the full booting process in your serial communication program. Allow this process to finish, it will take several minutes, and wait until it is COMPLETELY finished.
When it's done, you can try accessing your router's GUI via http://192.168.1.1
How to Set Up a Serial Console for NETGEAR R6200v1
Introduction:
Using serial console setup users can get access to the serial console of their router. Serial console setup finds its most important use in debricking a router. Moreover, developers may use it to extract useful debug information from their routers.
This short tutorial explains how to setup serial console for Netgear R6200v1.
Identify location of Serial pins on your router:
First open the case of your router. You should be able to find pins for serial communications at the location indicated in Figure1(a).
Figure1(a): Serial pin location on your router
Note:- Some R6200v1 may not come with pins for serial communications. In such cases, you will have to attach the pins on your own. Go to the location as indicated in Figure1(a), where you will find a connection with the name JP1 as shown in Figure 1(b). Solder the pins here carefully.
Figure1(b): Serial pin location on your router
Identify important pins on router for serial communication:
Important pins on the router for serial communication are identified in Figure 2.
Figure 2: Important pins on the router for serial communication
Identify important pins in USB-TTL cable:
Important pins in the USB-TTL cable are indicated in Figure 3.
Figure 3: Important pins in USB-TTL cable
How to connect USB-TTL cable to the pins on the router for serial communication:
The connection between USB-TTL cable and pins on the router for serial communication is explained in Figure 4.
Figure 4: Connection between USB-TTL cable and pins for serial communication
Physical setup of your serial console ends here.
Verification of the setup:
To verify your setup, start serial client on your PC with proper parameters and then power on your router. As soon as you do this, you will be able to see debug information from the router on your screen. If you do not see anything, check that all the connections have been made properly and if in doubt, reattach the cables. Verify that the Serial Client has the proper parameters for the connection.
How to Set Up a Serial Console for NETGEAR R6200v2
Introduction:
Using serial console setup users can get access to the serial console of their router. Serial console setup finds its most important use in debricking a router. Moreover, developers may use it to extract useful debug information from their routers.
This short tutorial explains how to setup serial console for Netgear R6200v2.
Identify location of Serial pins on your router:
First open the case of your router. You should be able to find pins for serial communications at the location indicated in Figure1(a).
Figure1(a): Serial pin location on your router
Note:-
Some R6200v2 may not come with pins for serial communications. In such cases, you will have to attach the pins on your own. Go to the location as indicated in Figure1(a), where you will find a connection with the name J252 as shown in Figure 1(b). Solder the pins here carefully.
Figure1(b): Serial pin location on your router
Identify important pins on router for serial communication:
Important pins on the router for serial communication are identified in Figure 2.
Figure 2: Important pins on the router for serial communication
Identify important pins in USB-TTL cable:
Important pins in the USB-TTL cable are indicated in Figure 3.
Figure 3: Important pins in USB-TTL cable
How to connect USB-TTL cable to the pins on the router for serial communication:
The connection between USB-TTL cable and pins on the router for serial communication is explained in Figure 4.
Figure 4: Connection between USB-TTL cable and pins for serial communication
Physical setup of your serial console ends here.
Verification of the setup:
To verify your setup, start serial client on your PC with proper parameters and then power on your router. As soon as you do this, you will be able to see debug information from the router on your screen. If you do not see anything, check that all the connections have been made properly and if in doubt, reattach the cables. Verify that the Serial Client has the proper parameters for the connection.
How to Properly Adjust the Antennas on the NETGEAR R7000 "Nighthawk" Router
Do you have a R7000 Nighthawk from NETGEAR? Are you super pleased with the superior range and speeds you're getting? Good!
Are you less than pleased with those floppy antennas? I thought so, which is why you have ended up here. The truth is that the antennas aren't really floppy at all -- they're quite sturdy, but there's a "trick" to installing and adjusting them correctly. Here's how.
Step 1: Hold the antenna parallel to the router housing.
Step 2:"Screw" the antenna into the connector as if you were using a screwdriver to drive a screw, by twisting it as shown. Do this until you feel it tighten snugly. Alternately, or if you have small fingers, you could twist the knurled end in; it will move independently from the antennas (which is how they are adjustable)
Step 3: Gently adjust the antennas to the desired angles. If tightened correctly in step 2, they will stay firmly in place.
Note that if you move an antenna to the left, the connection may loosen, in which case you can simply hold the antenna in place in the position desired and tighten the knurled end to hold it in place.
Did this procedure work for you? Do you have other suggestions? If so, please leave a comment below.
Category:
DD-WRT Update on Heartbleed Vulnerability
Via: DD-WRT
The Heartbleed vulnerability in discovered in OpenSSL 1.0.1 - 1.0.1f is one of the most serious matters in encrypted data communication during the last years. First of all we can ensure you that the encrypted web services like the DD-WRT Online Shop and the Activation center never have been affected because the OpenSSL version we are using does not contain the vulnerability.
Currently the main focus of the Heartbleed discussion lies on web servers using SSL/TLS but other services on Linux systems are also using OpenSSL. By default none of these services is enabled in DD-WRT - nevertheless it is important that you check your router settings to find out if you might be affected by Heartbleed.
The Heartbleed vulnerability allows an attacker to read random 64k blocks of memory of the service using OpenSSL (with TLS). Since every request delivers another 64k memory block an attacker could retrieve sensitive data from the service i.e. private keys. More detailed information about Heartbleed can be found in the security advisory:
http://www.kb.cert.org/vuls/id/720951
and here:
English: http://www.infoq.com/news/2014/04/heartbleed-ssl
German: http://www.golem.de/news/openssl-wichtige-fragen-und-antworten-zu-heartbleed-1404-105740.html
In DD-WRT itself the following services are using OpenSSL with TLS:
- openvpn
- squid
- freeradius
- asterisk
- curl
- pound
- tor
- transmission
If you don't use one of these services you are not affected.
Only builds 19163 thru 23882 are affected.
All Kong's builds have been updated with latest openssl.
For R6300V1/WNDR4500: http://www.desipro.de/ddwrt/K3-AC/23885/
For R6250/R6300V2/R7000: http://www.desipro.de/ddwrt/K3-AC-Arm/r23884/
For WNR3500L V1: http://www.desipro.de/ddwrt/K26/r21395+/
Official Response from NETGEAR on Hearbleed for their routers and ReadyNAS
NETGEAR can confirm no vulnerabilities to the Heartbleed bug have been found in our routers.
NETGEAR has taken steps to prevent compromise by the Heartbleed bug with our latest Network Attached storage products by releasing new firmware.
Please update your ReadyNAS products to the latest firmware 6.1.7, which is posted and available for download from the NETGEAR support site.
Older versions of the NETGEAR ReadyNAS products use an older version of Open SSL and are not affected.
We recommend the 6.1.7 Firmware Upgrade for the following models:
RN102/RN103 Series
RN312/314 Series
RN516 Series
RN716 Series
RN3220 RN4220
Information and Downloads on the Heartbleed Bug
The Heartbleed vulnerability allows an attacker to read random 64k blocks of memory of the service using OpenSSL (with TLS). Since every request delivers another 64k memory block an attacker could retrieve sensitive data from the service i.e. private keys. More detailed information about Heartbleed can be found in the security advisory:
http://www.kb.cert.org/vuls/id/720951 and here http://www.infoq.com/news/2014/04/heartbleed-ssl
This vulnerability is only if running the following services are using OpenSSL with TLS:
- openvpn
- squid
- freeradius
- asterisk
- curl
- pound
- tor
- transmission
Depending on your setup you may not be affected by Heartbleed.
In addition, NETGEAR confirms there are no vulnerabilities to the Heartbleed bug in thier routers running factory firmware.
If you are running and old version of DD-WRT, Tomato or a NETGEAR supplied DD-WRT buid here are the links for new builds that have the Heartbleed fixes
DD-WRT Releases by Kong
- DD-WRT K3 for NETGEAR R6300v2 WiFi Router Kong
- DD-WRT K3 for NETGEAR R6250 WiFi Router Kong
- DD-WRT K3 for NETGEAR R7000 Nighthawk WiFi Router Kong build
- DD-WRT Kong Mod WNDR4500V1/V2 Updated with latest openssl for Heartbleed
Tomato Releases
- Tomato by Shibby for WNR3500Lv1 117-VPN
- Tomato by Shibby for WNR3500Lv2 v117 (All In One)
- Tomato by Toastman for WNR3500Lv1 1.28.7505 (USB)
- Tomato by Toastman for WNR3500Lv1 1.28.7505 (VPN)
- Tomato by Toastman for WNR3500Lv2 1.28.7505
DD-WRT Releases by NETGEAR
- DD-WRT for WNDR4500v1 - Updated DD-WRT release for NETGEAR's WNDR4500v1
- DD-WRT Firmware for NETGEAR R7000 Wi-Fi Router - DD-WRT firmware release for NETGEAR's R7000 802.11ac wi-fi router.
- DD-WRT Firmware for NETGEAR R6250
- DD-WRT for NETGEAR R6200v2 - DD-WRT updated release for NETGEAR R6200v2.
- DD-WRT for NETGEAR R6300v1
- DD-WRT Firmware for NETGEAR R6300v2
- DD-WRT for WNDR4500v2 With Heatbleed Protection - Updated 04/21/2014
- DD-WRT for NETGEAR WNDR3400v2 With Heartbleed Protection- Updated 04/17/2014
- DD-WRT or NETGEAR R6200 (v1) With Heartbleed Protection - Updated 04/14/2014