2010-01-01 00:00:22 RV110W syslog.notice syslog-ng[344]: syslog-ng version 1.6.12 starting 2010-01-01 00:00:23 RV110W kern.notice Linux version 2.6.22 (root@localhost.localdomain) (gcc version 4.2.3) #1 Wed Feb 24 16:16:48 CST 2016 2010-01-01 00:00:23 RV110W kern.warning CPU revision is: 00019749 2010-01-01 00:00:23 RV110W kern.warning Found an ST compatible serial flash with 256 64KB blocks; total size 16MB 2010-01-01 00:00:23 RV110W kern.warning Determined physical RAM map: 2010-01-01 00:00:23 RV110W kern.warning memory: 04000000 @ 00000000 (usable) 2010-01-01 00:00:23 RV110W kern.info Zone PFN ranges: 2010-01-01 00:00:23 RV110W kern.warning Normal 0 -> 16384 2010-01-01 00:00:23 RV110W kern.warning HighMem 16384 -> 16384 2010-01-01 00:00:23 RV110W kern.info early_node_map[1] active PFN ranges 2010-01-01 00:00:23 RV110W kern.warning 0: 0 -> 16384 2010-01-01 00:00:24 RV110W kern.warning Built 1 zonelists. Total pages: 16384 2010-01-01 00:00:24 RV110W kern.notice Kernel command line: root=/dev/mtdblock2 console=ttyS0,115200 init=/sbin/preinit 2010-01-01 00:00:24 RV110W kern.warning Primary instruction cache 32kB, physically tagged, 4-way, linesize 32 bytes. 2010-01-01 00:00:24 RV110W kern.warning Primary data cache 32kB, 4-way, linesize 32 bytes. 2010-01-01 00:00:24 RV110W kern.info Synthesized TLB refill handler (20 instructions). 2010-01-01 00:00:24 RV110W kern.info Synthesized TLB load handler fastpath (32 instructions). 2010-01-01 00:00:24 RV110W kern.info Synthesized TLB store handler fastpath (32 instructions). 2010-01-01 00:00:24 RV110W kern.info Synthesized TLB modify handler fastpath (31 instructions). 2010-01-01 00:00:24 RV110W kern.warning PID hash table entries: 512 (order: 9, 2048 bytes) 2010-01-01 00:00:24 RV110W kern.warning CPU: BCM5357 rev 2 at 300 MHz 2010-01-01 00:00:24 RV110W kern.warning Using 150.000 MHz high precision timer. 2010-01-01 00:00:25 RV110W kern.warning Dentry cache hash table entries: 8192 (order: 3, 32768 bytes) 2010-01-01 00:00:25 RV110W kern.warning Inode-cache hash table entries: 4096 (order: 2, 16384 bytes) 2010-01-01 00:00:25 RV110W kern.info Memory: 59696k/65536k available (3351k kernel code, 5784k reserved, 620k data, 224k init, 0k highmem) 2010-01-01 00:00:25 RV110W kern.warning Mount-cache hash table entries: 512 2010-01-01 00:00:25 RV110W kern.info NET: Registered protocol family 16 2010-01-01 00:00:25 RV110W kern.warning PCI: no core 2010-01-01 00:00:25 RV110W kern.warning PCI: no core 2010-01-01 00:00:25 RV110W kern.warning PCI: Fixing up bus 0 2010-01-01 00:00:25 RV110W kern.info Time: MIPS clocksource has been installed. 2010-01-01 00:00:25 RV110W kern.info NET: Registered protocol family 2 2010-01-01 00:00:26 RV110W kern.warning IP route cache hash table entries: 1024 (order: 0, 4096 bytes) 2010-01-01 00:00:26 RV110W kern.warning TCP established hash table entries: 2048 (order: 2, 16384 bytes) 2010-01-01 00:00:26 RV110W kern.warning TCP bind hash table entries: 2048 (order: 1, 8192 bytes) 2010-01-01 00:00:26 RV110W kern.info TCP: Hash tables configured (established 2048 bind 2048) 2010-01-01 00:00:26 RV110W kern.info TCP reno registered 2010-01-01 00:00:26 RV110W kern.notice VFS: Disk quotas dquot_6.5.1 2010-01-01 00:00:26 RV110W kern.warning Dquot-cache hash table entries: 1024 (order 0, 4096 bytes) 2010-01-01 00:00:26 RV110W kern.info squashfs: version 3.2-r2 (2007/01/15) Phillip Lougher 2010-01-01 00:00:26 RV110W kern.info JFFS2 version 2.2. (NAND) (SUMMARY) © 2001-2006 Red Hat, Inc. 2010-01-01 00:00:26 RV110W kern.warning fuse init (API version 7.8) 2010-01-01 00:00:27 RV110W kern.info io scheduler noop registered (default) 2010-01-01 00:00:27 RV110W kern.info HDLC line discipline: version $Revision: 1.1.1.2 $, maxframe=4096 2010-01-01 00:00:27 RV110W kern.info N_HDLC line discipline registered. 2010-01-01 00:00:27 RV110W kern.info bpductl_init 2010-01-01 00:00:27 RV110W kern.info Serial: 8250/16550 driver $Revision: 1.1.1.2 $ 4 ports, IRQ sharing disabled 2010-01-01 00:00:27 RV110W kern.info serial8250: ttyS0 at MMIO 0x0 (irq = 8) is a 16550A 2010-01-01 00:00:27 RV110W kern.info loop: module loaded 2010-01-01 00:00:27 RV110W kern.info PPP generic driver version 2.4.2 2010-01-01 00:00:27 RV110W kern.info PPP MPPE Compression module registered 2010-01-01 00:00:27 RV110W kern.info NET: Registered protocol family 24 2010-01-01 00:00:27 RV110W kern.err pflash: found no supported devices 2010-01-01 00:00:27 RV110W kern.notice sflash: squash filesystem with lzma found at block 1742 2010-01-01 00:00:27 RV110W kern.notice Creating 7 MTD partitions on \"sflash\": 2010-01-01 00:00:27 RV110W kern.notice 0x00000000-0x00040000 : \"boot\" 2010-01-01 00:00:28 RV110W kern.notice 0x00040000-0x00df0000 : \"linux\" 2010-01-01 00:00:28 RV110W kern.notice 0x001b3bb0-0x00df0000 : \"rootfs\" 2010-01-01 00:00:28 RV110W kern.notice 0x00df0000-0x00ef0000 : \"lang\" 2010-01-01 00:00:28 RV110W kern.notice 0x009f0000-0x00df0000 : \"rdt_test\" 2010-01-01 00:00:28 RV110W kern.notice 0x00ef0000-0x00ff0000 : \"rwdata\" 2010-01-01 00:00:28 RV110W kern.notice 0x00ff0000-0x01000000 : \"nvram\" 2010-01-01 00:00:28 RV110W kern.warning u32 classifier 2010-01-01 00:00:28 RV110W kern.warning Actions configured 2010-01-01 00:00:28 RV110W kern.warning Netfilter messages via NETLINK v0.30. 2010-01-01 00:00:28 RV110W kern.warning nf_conntrack version 0.5.0 (512 buckets, 4096 max) 2010-01-01 00:00:28 RV110W kern.info Register conntrack protocol helper for ESP. 2010-01-01 00:00:28 RV110W kern.warning ctnetlink v0.93: registering with nfnetlink. 2010-01-01 00:00:28 RV110W kern.info IPv4 over IPv4 tunneling driver 2010-01-01 00:00:28 RV110W kern.warning ip_tables: (C) 2000-2006 Netfilter Core Team 2010-01-01 00:00:28 RV110W kern.info TCP cubic registered 2010-01-01 00:00:28 RV110W kern.info Initializing XFRM netlink socket 2010-01-01 00:00:28 RV110W kern.info NET: Registered protocol family 1 2010-01-01 00:00:28 RV110W kern.info NET: Registered protocol family 10 2010-01-01 00:00:28 RV110W kern.info lo: Disabled Privacy Extensions 2010-01-01 00:00:28 RV110W kern.info tunl0: Disabled Privacy Extensions 2010-01-01 00:00:28 RV110W kern.info Mobile IPv6 2010-01-01 00:00:29 RV110W kern.warning ip6_tables: (C) 2000-2006 Netfilter Core Team 2010-01-01 00:00:29 RV110W kern.info IPv6 over IPv4 tunneling driver 2010-01-01 00:00:29 RV110W kern.info sit0: Disabled Privacy Extensions 2010-01-01 00:00:29 RV110W kern.info NET: Registered protocol family 17 2010-01-01 00:00:29 RV110W kern.info NET: Registered protocol family 15 2010-01-01 00:00:29 RV110W kern.notice Ebtables v2.0 registered 2010-01-01 00:00:29 RV110W kern.info L2TP core driver, V2.0 2010-01-01 00:00:29 RV110W kern.info PPPoL2TP kernel driver, V2.0 2010-01-01 00:00:24 RV110W daemon.info httpd[346]: httpd server started at port 80 2010-01-01 00:00:29 RV110W kern.info L2TP/IP support (L2TPv3) 2010-01-01 00:00:29 RV110W kern.info L2TP/IPv6 support (L2TPv3) 2010-01-01 00:00:29 RV110W kern.info L2TP netlink interface: Feb 24 2016 16:15:57 2010-01-01 00:00:29 RV110W kern.info L2TP ethernet pseudowire support (L2TPv3) 2010-01-01 00:00:29 RV110W kern.info 802.1Q VLAN Support v1.8 Ben Greear 2010-01-01 00:00:29 RV110W kern.info All bugs added by David S. Miller 2010-01-01 00:00:29 RV110W kern.warning VFS: Mounted root (squashfs filesystem) readonly. 2010-01-01 00:00:29 RV110W kern.info Freeing unused kernel memory: 224k freed 2010-01-01 00:00:29 RV110W kern.warning Warning: unable to open an initial console. 2010-01-01 00:00:30 RV110W kern.warning Failed to execute /init 2010-01-01 00:00:30 RV110W kern.warning Algorithmics/MIPS FPU Emulator v1.5 2010-01-01 00:00:30 RV110W kern.warning ctf: module license \'Proprietary\' taints kernel. 2010-01-01 00:00:30 RV110W kern.warning et_module_init: passivemode set to 0x1 2010-01-01 00:00:30 RV110W kern.warning eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 5.100.138.11 2010-01-01 00:00:30 RV110W kern.warning Found an ST compatible serial flash with 256 64KB blocks; total size 16MB 2010-01-01 00:00:30 RV110W kern.err SQUASHFS error: Can\'t find a SQUASHFS superblock on mtdblock3 2010-01-01 00:00:30 RV110W kern.warning eth1: Broadcom BCM4347 802.11 Wireless Controller 5.100.138.11 2010-01-01 00:00:30 RV110W kern.warning COEX: downgraded chanspec 0x2d08 to 0x2b06: channel 4 used by exiting BSSs 2010-01-01 00:00:30 RV110W kern.info vlan1: dev_set_allmulti(master, 1) 2010-01-01 00:00:30 RV110W kern.info vlan1: dev_set_promiscuity(master, 1) 2010-01-01 00:00:30 RV110W kern.info device eth0 entered promiscuous mode 2010-01-01 00:00:30 RV110W kern.info device vlan1 entered promiscuous mode 2010-01-01 00:00:30 RV110W kern.warning COEX: downgraded chanspec 0x2d08 to 0x2b06: channel 4 used by exiting BSSs 2010-01-01 00:00:30 RV110W kern.info device eth1 entered promiscuous mode 2010-01-01 00:00:30 RV110W kern.info device wl0.1 entered promiscuous mode 2010-01-01 00:00:30 RV110W kern.info br0: port 3(wl0.1) entering learning state 2010-01-01 00:00:30 RV110W kern.info br0: port 2(eth1) entering learning state 2010-01-01 00:00:30 RV110W kern.info br0: port 1(vlan1) entering learning state 2010-01-01 00:00:30 RV110W kern.info br0: topology change detected, propagating 2010-01-01 00:00:30 RV110W kern.info br0: port 3(wl0.1) entering forwarding state 2010-01-01 00:00:30 RV110W kern.info br0: topology change detected, propagating 2010-01-01 00:00:30 RV110W kern.info br0: port 2(eth1) entering forwarding state 2010-01-01 00:00:31 RV110W kern.info br0: topology change detected, propagating 2010-01-01 00:00:31 RV110W kern.info br0: port 1(vlan1) entering forwarding state 2010-01-01 00:00:24 RV110W daemon.info httpd[413]: httpd server (ssl support) started at port 443 2010-01-01 00:00:31 RV110W kern.info wl0.0: IEEE 802.11 STA 6c:fa:a7:13:92:e6 associated with BSSID bc:67:1c:40:7d:24 2010-01-01 00:00:31 RV110W kern.info wl0.0: IEEE 802.11 STA 6c:fa:a7:13:93:4d associated with BSSID bc:67:1c:40:7d:24 2010-01-01 00:00:31 RV110W kern.info wl0.0: IEEE 802.11 STA 34:4d:f7:86:a5:e1 associated with BSSID bc:67:1c:40:7d:24 2010-01-01 00:00:26 RV110W daemon.info dnsmasq[522]: started, version 1.10 cachesize 150 2010-01-01 00:00:26 RV110W daemon.err dnsmasq[522]: failed to load names from /etc/hosts: No such file or directory 2010-01-01 00:00:26 RV110W daemon.warning dnsmasq[522]: failed to access /tmp/resolv.conf: No such file or directory 2010-01-01 00:00:27 RV110W daemon.info udhcpd[527]: udhcp server (v0.9.8) started 2010-01-01 00:00:29 RV110W daemon.info Wireless[690]: WPS UPnP Init, ifname:eth1(0, 1), hwaddr[BC:67:1C:40:7D:24] 2010-01-01 00:00:32 RV110W kern.warning vlan2: Setting MAC address to bc 67 1c 40 7d 23. 2010-01-01 00:00:32 RV110W kern.info vlan2: dev_set_allmulti(master, 1) 2010-01-01 00:00:32 RV110W kern.info vlan2: dev_set_allmulti(master, -1) 2010-01-01 00:00:33 RV110W kern.info vlan2: dev_set_allmulti(master, 1) 2010-01-01 00:00:33 RV110W user.info syslog: PPPoE: Use vlan2 for PPPoE discovery 2010-01-01 00:00:33 RV110W local2.notice pppd[987]: pppd 2.4.1 started by (unknown), uid 0 2010-01-01 00:00:33 RV110W local2.info pppd[987]: Using interface ppp0 2010-01-01 00:00:33 RV110W local2.warning pppd[987]: Couldn\'t increase MTU to 1500 2010-01-01 00:00:33 RV110W local2.err pppd[987]: Couldn\'t increase MRU to 1500 2010-01-01 00:00:33 RV110W local2.notice pppd[987]: local IP address 10.64.64.64 2010-01-01 00:00:33 RV110W local2.notice pppd[987]: remote IP address 10.112.112.112 2010-01-01 00:00:33 RV110W user.info syslog: Link Up: Port 1 2010-01-01 00:00:33 RV110W user.info syslog: Link Up: WAN Port 2010-01-01 00:00:34 RV110W daemon.info udhcpd[533]: received REQUEST from 10:78:D2:30:87:C3 2010-01-01 00:00:34 RV110W daemon.info udhcpd[533]: sending ACK to 10.0.0.5 2010-01-01 00:00:35 RV110W kern.info wl0.0: IEEE 802.11 STA 6c:fa:a7:13:92:e6 associated with BSSID bc:67:1c:40:7d:24 2010-01-01 00:00:35 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 6C:FA:A7:13:92:E6 WPA: pairwise key exchange completed 2010-01-01 00:00:35 RV110W local2.info pppd[987]: Sending PADI 2010-01-01 00:00:35 RV110W local2.notice pppd[987]: Connect: ppp0 <--> vlan2 2010-01-01 00:00:35 RV110W local2.warning pppd[987]: Couldn\'t increase MTU to 1500 2010-01-01 00:00:35 RV110W local2.err pppd[987]: Couldn\'t increase MRU to 1500 2010-01-01 00:00:35 RV110W kern.info wl0.0: IEEE 802.11 STA 6c:fa:a7:13:93:4d associated with BSSID bc:67:1c:40:7d:24 2010-01-01 00:00:36 RV110W daemon.info udhcpd[533]: received REQUEST from 6C:FA:A7:13:92:E6 2010-01-01 00:00:36 RV110W daemon.info udhcpd[533]: sending NAK to 6C:FA:A7:13:92:E6 2010-01-01 00:00:36 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 6C:FA:A7:13:93:4D WPA: pairwise key exchange completed 2010-01-01 00:00:36 RV110W local2.warning pppd[987]: Local IP address changed to x.x.x.x 2010-01-01 00:00:36 RV110W local2.warning pppd[987]: Remote IP address changed to 212.179.37.1 2010-01-01 00:00:36 RV110W daemon.info udhcpd[533]: received REQUEST from 6C:FA:A7:13:93:4D 2010-01-01 00:00:36 RV110W daemon.info udhcpd[533]: sending NAK to 6C:FA:A7:13:93:4D 2010-01-01 00:00:37 RV110W daemon.info udhcpd[533]: received DISCOVER from 6C:FA:A7:13:92:E6 2010-01-01 00:00:38 RV110W daemon.info udhcpd[533]: sending OFFER to 255.255.255.255 with 10.0.0.6 2010-01-01 00:00:38 RV110W daemon.info udhcpd[533]: received DISCOVER from 6C:FA:A7:13:93:4D 2010-01-01 00:00:39 RV110W daemon.info udhcpd[1138]: udhcp server (v0.9.8) started 2010-01-01 00:00:39 RV110W daemon.info dnsmasq[1148]: started, version 1.10 cachesize 150 2010-01-01 00:00:39 RV110W daemon.info dnsmasq[1148]: using nameserver 62.219.186.7 2010-01-01 00:00:39 RV110W daemon.info dnsmasq[1148]: using nameserver 192.117.235.237 2010-01-01 00:00:40 RV110W daemon.info udhcpd[533]: sending OFFER to 255.255.255.255 with 10.0.0.7 2010-01-01 00:00:40 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:93:4D 2010-01-01 00:00:40 RV110W daemon.info udhcpd[1142]: sending NAK to 6C:FA:A7:13:93:4D 2010-01-01 00:00:40 RV110W daemon.info udhcpd[533]: Received a SIGTERM 2010-01-01 00:00:42 RV110W daemon.info udhcpd[1142]: received DISCOVER from 6C:FA:A7:13:93:4D 2010-01-01 00:00:43 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.6 2010-01-01 00:00:43 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:92:E6 2010-01-01 00:00:43 RV110W daemon.info udhcpd[1142]: sending NAK to 6C:FA:A7:13:92:E6 2010-01-01 00:00:43 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:93:4D 2010-01-01 00:00:43 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2010-01-01 00:00:44 RV110W daemon.info udhcpd[1142]: received DISCOVER from 6C:FA:A7:13:92:E6 2010-01-01 00:00:45 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.7 2010-01-01 00:00:45 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:92:E6 2010-01-01 00:00:45 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2010-01-01 00:00:45 RV110W daemon.info Wireless[1266]: WPS UPnP Init, ifname:eth1(0, 1), hwaddr[BC:67:1C:40:7D:24] 2010-01-01 00:00:46 RV110W kern.warning wan ip 51dacb86 2010-01-01 00:00:46 RV110W kern.warning lan_interface[0]: ip 0a00008a mask ffffff00 2016-09-04 10:19:39 RV110W kern.info wl0.0: IEEE 802.11 STA 34:4d:f7:86:a5:e1 associated with BSSID bc:67:1c:40:7d:24 2016-09-04 10:19:39 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 34:4D:F7:86:A5:E1 WPA: pairwise key exchange completed 2016-09-04 10:19:44 RV110W daemon.info udhcpd[1142]: received REQUEST from 34:4D:F7:86:A5:E1 2016-09-04 10:19:44 RV110W daemon.info udhcpd[1142]: sending NAK to 34:4D:F7:86:A5:E1 2016-09-04 10:19:45 RV110W daemon.info udhcpd[1142]: received DISCOVER from 34:4D:F7:86:A5:E1 2016-09-04 10:19:46 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.8 2016-09-04 10:19:46 RV110W daemon.info udhcpd[1142]: received REQUEST from 34:4D:F7:86:A5:E1 2016-09-04 10:19:46 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-04 10:44:38 RV110W daemon.info httpd[517]: Administrator session timeout. 2016-09-04 10:44:38 RV110W daemon.info httpd[517]: Administrator logined from x.x.x.x 2016-09-04 10:51:22 RV110W daemon.info httpd[517]: Administrator logout from x.x.x.x 2016-09-04 10:51:45 RV110W daemon.info httpd[517]: Administrator session timeout. 2016-09-04 10:51:45 RV110W daemon.info httpd[517]: Administrator logined from x.x.x.x 2016-09-04 13:21:59 RV110W kern.info wl0.1: IEEE 802.11 STA e8:50:8b:c8:0a:f7 associated with BSSID 02:67:1c:40:7d:25 2016-09-04 13:22:00 RV110W daemon.info Wireless[578]: wlan(wl0.1): IEEE 802.11 STA E8:50:8B:C8:0A:F7 WPA: pairwise key exchange completed 2016-09-04 13:22:03 RV110W daemon.info udhcpd[1142]: received REQUEST from E8:50:8B:C8:0A:F7 2016-09-04 13:22:03 RV110W daemon.info udhcpd[1142]: sending NAK to E8:50:8B:C8:0A:F7 2016-09-04 13:22:04 RV110W daemon.info udhcpd[1142]: received DISCOVER from E8:50:8B:C8:0A:F7 2016-09-04 13:22:05 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.9 2016-09-04 13:22:05 RV110W daemon.info udhcpd[1142]: received REQUEST from E8:50:8B:C8:0A:F7 2016-09-04 13:22:05 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-04 13:29:41 RV110W kern.info wl0.1: IEEE 802.11 STA e8:50:8b:c8:0a:f7 associated with BSSID 02:67:1c:40:7d:25 2016-09-04 13:29:41 RV110W daemon.info Wireless[578]: wlan(wl0.1): IEEE 802.11 STA E8:50:8B:C8:0A:F7 WPA: pairwise key exchange completed 2016-09-04 13:29:44 RV110W daemon.info udhcpd[1142]: received REQUEST from E8:50:8B:C8:0A:F7 2016-09-04 13:29:44 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.9 2016-09-04 13:49:12 RV110W daemon.info httpd[517]: Administrator session timeout. 2016-09-04 13:49:13 RV110W daemon.info httpd[517]: Administrator logined from x.x.x.x 2016-09-04 14:01:09 RV110W daemon.info httpd[517]: Administrator session timeout. 2016-09-04 14:01:53 RV110W daemon.info httpd[517]: Administrator session timeout. 2016-09-04 14:01:53 RV110W daemon.info httpd[517]: Administrator logined from x.x.x.x 2016-09-04 14:10:52 RV110W kern.info wl0.1: IEEE 802.11 STA e8:50:8b:c8:0a:f7 associated with BSSID 02:67:1c:40:7d:25 2016-09-04 14:10:53 RV110W daemon.info Wireless[578]: wlan(wl0.1): IEEE 802.11 STA E8:50:8B:C8:0A:F7 WPA: pairwise key exchange completed 2016-09-04 14:10:56 RV110W daemon.info udhcpd[1142]: received REQUEST from E8:50:8B:C8:0A:F7 2016-09-04 14:10:56 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.9 2016-09-04 14:11:33 RV110W daemon.info httpd[517]: Administrator session timeout. 2016-09-04 14:11:33 RV110W daemon.info httpd[517]: Administrator logined from x.x.x.x 2016-09-04 14:29:43 RV110W daemon.info httpd[517]: Administrator logout from x.x.x.x 2016-09-04 15:05:11 RV110W kern.info wl0.0: IEEE 802.11 STA 64:bc:0c:83:42:7a associated with BSSID bc:67:1c:40:7d:24 2016-09-04 15:05:11 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 64:BC:0C:83:42:7A WPA: pairwise key exchange completed 2016-09-04 15:08:26 RV110W kern.info wl0.0: IEEE 802.11 STA 64:bc:0c:83:42:7a associated with BSSID bc:67:1c:40:7d:24 2016-09-04 15:08:26 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 64:BC:0C:83:42:7A WPA: pairwise key exchange completed 2016-09-04 15:08:30 RV110W kern.info wl0.0: IEEE 802.11 STA 64:bc:0c:83:42:7a associated with BSSID bc:67:1c:40:7d:24 2016-09-04 15:08:30 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 64:BC:0C:83:42:7A WPA: pairwise key exchange completed 2016-09-04 15:08:38 RV110W daemon.info udhcpd[1142]: received DISCOVER from 64:BC:0C:83:42:7A 2016-09-04 15:08:39 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.10 2016-09-04 15:08:39 RV110W daemon.info udhcpd[1142]: received REQUEST from 64:BC:0C:83:42:7A 2016-09-04 15:08:39 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-04 15:08:41 RV110W daemon.info udhcpd[1142]: received DISCOVER from 64:BC:0C:83:42:7A 2016-09-04 15:08:41 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.10 2016-09-04 15:08:41 RV110W daemon.info udhcpd[1142]: received REQUEST from 64:BC:0C:83:42:7A 2016-09-04 15:08:41 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-04 15:11:12 RV110W kern.info wl0.0: IEEE 802.11 STA 64:bc:0c:83:42:7a associated with BSSID bc:67:1c:40:7d:24 2016-09-04 15:11:12 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 64:BC:0C:83:42:7A WPA: pairwise key exchange completed 2016-09-04 15:11:53 RV110W kern.info wl0.0: IEEE 802.11 STA 64:bc:0c:83:42:7a associated with BSSID bc:67:1c:40:7d:24 2016-09-04 15:11:53 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 64:BC:0C:83:42:7A WPA: pairwise key exchange completed 2016-09-04 15:11:54 RV110W daemon.info udhcpd[1142]: received DISCOVER from 64:BC:0C:83:42:7A 2016-09-04 15:11:55 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.10 2016-09-04 15:11:55 RV110W daemon.info udhcpd[1142]: received REQUEST from 64:BC:0C:83:42:7A 2016-09-04 15:11:55 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-04 15:26:34 RV110W daemon.info httpd[517]: Administrator session timeout. 2016-09-04 15:26:34 RV110W daemon.info httpd[517]: Administrator logined from x.x.x.x 2016-09-04 15:49:22 RV110W kern.info wl0.0: IEEE 802.11 STA 34:4d:f7:86:a5:e1 associated with BSSID bc:67:1c:40:7d:24 2016-09-04 15:49:22 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 34:4D:F7:86:A5:E1 WPA: pairwise key exchange completed 2016-09-04 15:49:23 RV110W daemon.info udhcpd[1142]: received REQUEST from 34:4D:F7:86:A5:E1 2016-09-04 15:49:23 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.8 2016-09-04 15:51:37 RV110W kern.info wl0.0: IEEE 802.11 STA 34:4d:f7:86:a5:e1 associated with BSSID bc:67:1c:40:7d:24 2016-09-04 15:51:37 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 34:4D:F7:86:A5:E1 WPA: pairwise key exchange completed 2016-09-04 15:51:41 RV110W daemon.info udhcpd[1142]: received REQUEST from 34:4D:F7:86:A5:E1 2016-09-04 15:51:41 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.8 2016-09-04 16:06:01 RV110W daemon.info httpd[517]: Administrator logout from x.x.x.x 2016-09-04 16:48:22 RV110W kern.info wl0.1: IEEE 802.11 STA e8:50:8b:c8:0a:f7 associated with BSSID 02:67:1c:40:7d:25 2016-09-04 16:48:22 RV110W daemon.info Wireless[578]: wlan(wl0.1): IEEE 802.11 STA E8:50:8B:C8:0A:F7 WPA: pairwise key exchange completed 2016-09-04 16:48:22 RV110W daemon.info udhcpd[1142]: received REQUEST from E8:50:8B:C8:0A:F7 2016-09-04 16:48:22 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.9 2016-09-04 17:40:17 RV110W kern.info wl0.1: IEEE 802.11 STA 64:66:b3:2b:d6:a9 associated with BSSID 02:67:1c:40:7d:25 2016-09-04 17:40:17 RV110W daemon.info Wireless[578]: wlan(wl0.1): IEEE 802.11 STA 64:66:B3:2B:D6:A9 WPA: pairwise key exchange completed 2016-09-04 17:40:22 RV110W daemon.info udhcpd[1142]: received DISCOVER from 64:66:B3:2B:D6:A9 2016-09-04 17:40:23 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.11 2016-09-04 17:40:26 RV110W daemon.info udhcpd[1142]: received DISCOVER from 64:66:B3:2B:D6:A9 2016-09-04 17:40:26 RV110W kern.info LAN2WLAN: Add entry: hash:32/33, cnt:1/6, index:9, sip:169.254.30.235, dip:224.0.0.252, smac:64:66:b3:2b:d6:a9 (New Group) 2016-09-04 17:40:28 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.11 2016-09-04 17:40:35 RV110W daemon.info udhcpd[1142]: received DISCOVER from 64:66:B3:2B:D6:A9 2016-09-04 17:40:36 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.11 2016-09-04 17:40:36 RV110W daemon.info udhcpd[1142]: received REQUEST from 64:66:B3:2B:D6:A9 2016-09-04 17:40:36 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-04 17:40:36 RV110W kern.info LAN2WLAN: Add entry: hash:32/33, cnt:1/6, index:9, sip:10.0.0.11, dip:224.0.0.252, smac:64:66:b3:2b:d6:a9 (New Group) 2016-09-04 17:40:36 RV110W kern.info LAN2WLAN: Add entry: hash:32/33, cnt:1/6, index:9, sip:10.0.0.11, dip:224.0.0.253, smac:64:66:b3:2b:d6:a9 (New Group) 2016-09-04 17:40:37 RV110W kern.info LAN2WLAN: Add entry: hash:32/33, cnt:1/6, index:9, sip:10.0.0.11, dip:224.0.0.252, smac:64:66:b3:2b:d6:a9 (New Group) 2016-09-04 17:40:39 RV110W kern.info LAN2WLAN: Add entry: hash:32/33, cnt:1/6, index:9, sip:10.0.0.11, dip:224.0.0.252, smac:64:66:b3:2b:d6:a9 (New Group) 2016-09-04 17:40:40 RV110W kern.info LAN2WLAN: Add entry: hash:32/33, cnt:1/6, index:9, sip:10.0.0.11, dip:224.0.0.252, smac:64:66:b3:2b:d6:a9 (New Group) 2016-09-04 18:17:17 RV110W daemon.info Wireless[578]: The wireless client with MAC address eth1 had an authentication failure 2016-09-04 18:17:17 RV110W daemon.info Wireless[578]: wlan0(eth1): IEEE 802.11 STA 34:4D:F7:86:A5:E1 deauthed from BSSID reason 16 2016-09-04 18:17:48 RV110W kern.info wl0.0: IEEE 802.11 STA 34:4d:f7:86:a5:e1 associated with BSSID bc:67:1c:40:7d:24 2016-09-04 18:17:49 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 34:4D:F7:86:A5:E1 WPA: pairwise key exchange completed 2016-09-04 18:17:50 RV110W daemon.info udhcpd[1142]: received REQUEST from 34:4D:F7:86:A5:E1 2016-09-04 18:17:50 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.8 2016-09-04 18:18:34 RV110W kern.info wl0.0: IEEE 802.11 STA 34:4d:f7:86:a5:e1 associated with BSSID bc:67:1c:40:7d:24 2016-09-04 18:18:34 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 34:4D:F7:86:A5:E1 WPA: pairwise key exchange completed 2016-09-04 18:18:35 RV110W daemon.info udhcpd[1142]: received REQUEST from 34:4D:F7:86:A5:E1 2016-09-04 18:18:35 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.8 2016-09-04 19:31:38 RV110W kern.info wl0.1: IEEE 802.11 STA e8:50:8b:c8:0a:f7 associated with BSSID 02:67:1c:40:7d:25 2016-09-04 19:31:39 RV110W daemon.info Wireless[578]: wlan(wl0.1): IEEE 802.11 STA E8:50:8B:C8:0A:F7 WPA: pairwise key exchange completed 2016-09-04 19:31:43 RV110W daemon.info udhcpd[1142]: received DISCOVER from E8:50:8B:C8:0A:F7 2016-09-04 19:31:44 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.9 2016-09-04 19:31:44 RV110W daemon.info udhcpd[1142]: received REQUEST from E8:50:8B:C8:0A:F7 2016-09-04 19:31:44 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-04 20:44:26 RV110W kern.info wl0.1: IEEE 802.11 STA dc:41:5f:04:bb:bf associated with BSSID 02:67:1c:40:7d:25 2016-09-04 20:44:26 RV110W daemon.warning Wireless[578]: wlan0(wl0.1): IEEE 802.11 STA DC:41:5F:04:BB:BF WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 20:44:27 RV110W daemon.warning Wireless[578]: wlan0(wl0.1): IEEE 802.11 STA DC:41:5F:04:BB:BF WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 20:44:28 RV110W daemon.warning Wireless[578]: wlan0(wl0.1): IEEE 802.11 STA DC:41:5F:04:BB:BF WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 20:44:29 RV110W daemon.warning Wireless[578]: wlan0(wl0.1): IEEE 802.11 STA DC:41:5F:04:BB:BF WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 20:44:30 RV110W daemon.warning Wireless[578]: wlan0(wl0.1): IEEE 802.11 STA DC:41:5F:04:BB:BF WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 20:44:31 RV110W daemon.warning Wireless[578]: wlan0(wl0.1): IEEE 802.11 STA DC:41:5F:04:BB:BF WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 21:14:44 RV110W kern.info wl0.0: IEEE 802.11 STA e8:50:8b:2f:fc:34 associated with BSSID bc:67:1c:40:7d:24 2016-09-04 21:14:44 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA E8:50:8B:2F:FC:34 WPA: pairwise key exchange completed 2016-09-04 21:14:45 RV110W daemon.info udhcpd[1142]: received DISCOVER from E8:50:8B:2F:FC:34 2016-09-04 21:14:47 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.12 2016-09-04 21:14:47 RV110W daemon.info udhcpd[1142]: received REQUEST from E8:50:8B:2F:FC:34 2016-09-04 21:14:47 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-04 21:49:07 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:93:4D 2016-09-04 21:49:07 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.6 2016-09-04 21:49:09 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:92:E6 2016-09-04 21:49:09 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.7 2016-09-04 22:16:49 RV110W daemon.info Wireless[578]: The wireless client with MAC address eth1 had an authentication failure 2016-09-04 22:16:49 RV110W daemon.info Wireless[578]: wlan0(eth1): IEEE 802.11 STA E8:50:8B:2F:FC:34 deauthed from BSSID reason 16 2016-09-04 22:17:48 RV110W daemon.info udhcpd[1142]: received REQUEST from 10:78:D2:30:87:C3 2016-09-04 22:17:48 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.5 2016-09-04 22:38:32 RV110W kern.info wl0.0: IEEE 802.11 STA f4:09:d8:13:37:7b associated with BSSID bc:67:1c:40:7d:24 2016-09-04 22:38:32 RV110W daemon.warning Wireless[578]: wlan0(eth1): IEEE 802.11 STA F4:09:D8:13:37:7B WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 22:38:33 RV110W daemon.warning Wireless[578]: wlan0(eth1): IEEE 802.11 STA F4:09:D8:13:37:7B WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 22:38:34 RV110W daemon.warning Wireless[578]: wlan0(eth1): IEEE 802.11 STA F4:09:D8:13:37:7B WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 22:38:35 RV110W daemon.warning Wireless[578]: wlan0(eth1): IEEE 802.11 STA F4:09:D8:13:37:7B WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 22:38:36 RV110W daemon.warning Wireless[578]: wlan0(eth1): IEEE 802.11 STA F4:09:D8:13:37:7B WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 22:38:37 RV110W daemon.warning Wireless[578]: wlan0(eth1): IEEE 802.11 STA F4:09:D8:13:37:7B WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 22:38:38 RV110W daemon.warning Wireless[578]: wlan0(eth1): IEEE 802.11 STA F4:09:D8:13:37:7B WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 22:38:39 RV110W daemon.warning Wireless[578]: wlan0(eth1): IEEE 802.11 STA F4:09:D8:13:37:7B WPA: Received invalid EAPOL-KEY MIC (msg 2/4) 2016-09-04 23:22:17 RV110W kern.info wl0.1: IEEE 802.11 STA e4:98:d6:4f:be:d5 associated with BSSID 02:67:1c:40:7d:25 2016-09-04 23:22:17 RV110W daemon.info Wireless[578]: wlan(wl0.1): IEEE 802.11 STA E4:98:D6:4F:BE:D5 WPA: pairwise key exchange completed 2016-09-04 23:22:18 RV110W daemon.info udhcpd[1142]: received DISCOVER from E4:98:D6:4F:BE:D5 2016-09-04 23:22:19 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.13 2016-09-04 23:22:20 RV110W daemon.info udhcpd[1142]: received REQUEST from E4:98:D6:4F:BE:D5 2016-09-04 23:22:20 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-04 23:46:56 RV110W kern.info wl0.1: IEEE 802.11 STA 80:e6:50:11:61:42 associated with BSSID 02:67:1c:40:7d:25 2016-09-04 23:46:56 RV110W daemon.info Wireless[578]: wlan(wl0.1): IEEE 802.11 STA 80:E6:50:11:61:42 WPA: pairwise key exchange completed 2016-09-04 23:46:58 RV110W daemon.info udhcpd[1142]: received DISCOVER from 80:E6:50:11:61:42 2016-09-04 23:46:59 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.14 2016-09-04 23:47:00 RV110W daemon.info udhcpd[1142]: received REQUEST from 80:E6:50:11:61:42 2016-09-04 23:47:00 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-05 00:16:34 RV110W daemon.info Wireless[578]: The wireless client with MAC address eth1 had an authentication failure 2016-09-05 00:16:34 RV110W daemon.info Wireless[578]: wlan0(eth1): IEEE 802.11 STA 64:BC:0C:83:42:7A deauthed from BSSID reason 16 2016-09-05 01:21:01 RV110W daemon.info Wireless[578]: The wireless client with MAC address wl0.1 had an authentication failure 2016-09-05 01:21:01 RV110W daemon.info Wireless[578]: wlan0(wl0.1): IEEE 802.11 STA E4:98:D6:4F:BE:D5 deauthed from BSSID reason 16 2016-09-05 02:43:53 RV110W daemon.info httpd[517]: Administrator session timeout. 2016-09-05 02:43:53 RV110W daemon.info httpd[517]: Administrator logined from x.x.x.x 2016-09-05 02:54:58 RV110W daemon.info snmpd[6062]: Creating directory: /var/net-snmp 2016-09-05 02:54:58 RV110W daemon.info snmpd[6062]: NET-SNMP version 5.4.3 2016-09-05 02:56:14 RV110W daemon.info snmpd[6088]: NET-SNMP version 5.4.3 2016-09-05 02:56:28 RV110W daemon.info snmpd[6098]: NET-SNMP version 5.4.3 2016-09-05 03:24:13 RV110W daemon.info httpd[517]: Administrator session timeout. 2016-09-05 05:49:48 RV110W daemon.info udhcpd[1142]: received REQUEST from 34:4D:F7:86:A5:E1 2016-09-05 05:49:48 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.8 2016-09-05 08:00:02 RV110W user.info syslog: email Smtp Auth Success 2016-09-05 08:00:05 RV110W user.info syslog: email Smtp Send Success 2016-09-05 09:20:17 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:93:4D 2016-09-05 09:20:17 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.6 2016-09-05 09:20:20 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:92:E6 2016-09-05 09:20:20 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.7 2016-09-05 10:17:47 RV110W daemon.info udhcpd[1142]: received REQUEST from 10:78:D2:30:87:C3 2016-09-05 10:17:47 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.5 2016-09-05 10:46:07 RV110W daemon.info httpd[517]: Administrator session timeout. 2016-09-05 10:46:07 RV110W daemon.info httpd[517]: Administrator logined from x.x.x.x 2016-09-05 14:25:28 RV110W daemon.info httpd[517]: Administrator session timeout. 2016-09-05 15:09:03 RV110W kern.info wl0.0: IEEE 802.11 STA 64:bc:0c:83:42:7a associated with BSSID bc:67:1c:40:7d:24 2016-09-05 15:09:03 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 64:BC:0C:83:42:7A WPA: pairwise key exchange completed 2016-09-05 15:09:04 RV110W daemon.info udhcpd[1142]: received REQUEST from 64:BC:0C:83:42:7A 2016-09-05 15:09:04 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.10 2016-09-05 17:21:00 RV110W daemon.info udhcpd[1142]: received REQUEST from 34:4D:F7:86:A5:E1 2016-09-05 17:21:00 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.8 2016-09-05 17:40:59 RV110W kern.info wl0.1: IEEE 802.11 STA 64:66:b3:2b:d6:a9 associated with BSSID 02:67:1c:40:7d:25 2016-09-05 17:40:59 RV110W daemon.info Wireless[578]: wlan(wl0.1): IEEE 802.11 STA 64:66:B3:2B:D6:A9 WPA: pairwise key exchange completed 2016-09-05 17:41:03 RV110W daemon.info udhcpd[1142]: received DISCOVER from 64:66:B3:2B:D6:A9 2016-09-05 17:41:04 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.11 2016-09-05 17:41:04 RV110W daemon.info udhcpd[1142]: received REQUEST from 64:66:B3:2B:D6:A9 2016-09-05 17:41:04 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-05 17:41:04 RV110W kern.info LAN2WLAN: Add entry: hash:32/33, cnt:1/6, index:9, sip:10.0.0.11, dip:224.0.0.252, smac:64:66:b3:2b:d6:a9 (New Group) 2016-09-05 17:41:05 RV110W kern.info LAN2WLAN: Add entry: hash:32/33, cnt:1/6, index:9, sip:10.0.0.11, dip:224.0.0.252, smac:64:66:b3:2b:d6:a9 (New Group) 2016-09-05 17:41:05 RV110W kern.info LAN2WLAN: Add entry: hash:32/33, cnt:1/6, index:9, sip:10.0.0.11, dip:224.0.0.253, smac:64:66:b3:2b:d6:a9 (New Group) 2016-09-05 17:41:05 RV110W kern.info LAN2WLAN: Add entry: hash:32/33, cnt:1/6, index:9, sip:10.0.0.11, dip:224.0.0.252, smac:64:66:b3:2b:d6:a9 (New Group) 2016-09-05 17:41:08 RV110W kern.info LAN2WLAN: Add entry: hash:32/33, cnt:1/6, index:9, sip:10.0.0.11, dip:224.0.0.252, smac:64:66:b3:2b:d6:a9 (New Group) 2016-09-05 17:41:08 RV110W kern.info LAN2WLAN: Add entry: hash:32/33, cnt:1/6, index:9, sip:10.0.0.11, dip:224.0.0.252, smac:64:66:b3:2b:d6:a9 (New Group) 2016-09-05 17:56:30 RV110W kern.info wl0.1: IEEE 802.11 STA e8:50:8b:c8:0a:f7 associated with BSSID 02:67:1c:40:7d:25 2016-09-05 17:56:30 RV110W daemon.info Wireless[578]: wlan(wl0.1): IEEE 802.11 STA E8:50:8B:C8:0A:F7 WPA: pairwise key exchange completed 2016-09-05 17:56:30 RV110W daemon.info udhcpd[1142]: received REQUEST from E8:50:8B:C8:0A:F7 2016-09-05 17:56:30 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.9 2016-09-05 18:31:24 RV110W kern.info wl0.0: IEEE 802.11 STA 64:bc:0c:83:42:7a associated with BSSID bc:67:1c:40:7d:24 2016-09-05 18:31:24 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 64:BC:0C:83:42:7A WPA: pairwise key exchange completed 2016-09-05 18:31:25 RV110W daemon.info udhcpd[1142]: received REQUEST from 64:BC:0C:83:42:7A 2016-09-05 18:31:25 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.10 2016-09-05 18:50:23 RV110W kern.info wl0.0: IEEE 802.11 STA 34:4d:f7:86:a5:e1 associated with BSSID bc:67:1c:40:7d:24 2016-09-05 18:50:23 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 34:4D:F7:86:A5:E1 WPA: pairwise key exchange completed 2016-09-05 18:50:24 RV110W daemon.info udhcpd[1142]: received REQUEST from 34:4D:F7:86:A5:E1 2016-09-05 18:50:24 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.8 2016-09-05 20:51:28 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:93:4D 2016-09-05 20:51:28 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.6 2016-09-05 20:51:30 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:92:E6 2016-09-05 20:51:30 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.7 2016-09-05 20:54:20 RV110W kern.info wl0.0: IEEE 802.11 STA ec:1f:72:c9:d9:63 associated with BSSID bc:67:1c:40:7d:24 2016-09-05 20:54:20 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA EC:1F:72:C9:D9:63 WPA: pairwise key exchange completed 2016-09-05 20:54:21 RV110W daemon.info udhcpd[1142]: received DISCOVER from EC:1F:72:C9:D9:63 2016-09-05 20:54:22 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.15 2016-09-05 20:54:22 RV110W daemon.info udhcpd[1142]: received REQUEST from EC:1F:72:C9:D9:63 2016-09-05 20:54:22 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-05 21:12:21 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c associated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:12:21 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:12:22 RV110W daemon.info udhcpd[1142]: received DISCOVER from 28:CF:DA:EE:EA:3C 2016-09-05 21:12:23 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.16 2016-09-05 21:12:24 RV110W daemon.info udhcpd[1142]: received REQUEST from 28:CF:DA:EE:EA:3C 2016-09-05 21:12:24 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-05 21:13:17 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:13:17 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:14:40 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:14:40 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:16:32 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:16:32 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:19:24 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:19:24 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:21:33 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:21:33 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:23:03 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:23:03 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:29:58 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:29:58 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:31:25 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:31:25 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:32:08 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:32:08 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:36:49 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:36:49 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:37:55 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:37:55 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:48:57 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:48:57 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:49:18 RV110W kern.info wl0.0: IEEE 802.11 STA 6c:fa:a7:13:8e:68 associated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:49:18 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 6C:FA:A7:13:8E:68 WPA: pairwise key exchange completed 2016-09-05 21:49:19 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:8E:68 2016-09-05 21:49:19 RV110W daemon.info udhcpd[1142]: sending NAK to 6C:FA:A7:13:8E:68 2016-09-05 21:49:23 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:8E:68 2016-09-05 21:49:23 RV110W daemon.info udhcpd[1142]: sending NAK to 6C:FA:A7:13:8E:68 2016-09-05 21:49:24 RV110W daemon.info udhcpd[1142]: received DISCOVER from 6C:FA:A7:13:8E:68 2016-09-05 21:49:25 RV110W daemon.info udhcpd[1142]: sending OFFER to 255.255.255.255 with 10.0.0.17 2016-09-05 21:49:25 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:8E:68 2016-09-05 21:49:25 RV110W daemon.info udhcpd[1142]: sending ACK to 255.255.255.255 2016-09-05 21:50:57 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:50:58 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:51:53 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:51:53 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:53:03 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:53:03 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 21:55:18 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 21:55:18 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 22:01:20 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 22:01:20 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 22:07:36 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 22:07:36 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 22:17:47 RV110W daemon.info udhcpd[1142]: received REQUEST from 10:78:D2:30:87:C3 2016-09-05 22:17:47 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.5 2016-09-05 22:31:54 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 22:31:54 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 22:39:08 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 22:39:08 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 22:45:33 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 22:45:33 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 22:47:38 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 22:47:38 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 22:51:43 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 22:51:43 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 22:53:48 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 22:53:48 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 22:58:49 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 22:58:49 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-05 23:19:21 RV110W kern.info wl0.0: IEEE 802.11 STA 28:cf:da:ee:ea:3c reassociated with BSSID bc:67:1c:40:7d:24 2016-09-05 23:19:21 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 28:CF:DA:EE:EA:3C WPA: pairwise key exchange completed 2016-09-06 00:14:40 RV110W daemon.info Wireless[578]: The wireless client with MAC address eth1 had an authentication failure 2016-09-06 00:14:40 RV110W daemon.info Wireless[578]: wlan0(eth1): IEEE 802.11 STA 64:BC:0C:83:42:7A deauthed from BSSID reason 16 2016-09-06 00:14:40 RV110W daemon.info Wireless[578]: The wireless client with MAC address eth1 had an authentication failure 2016-09-06 00:14:40 RV110W daemon.info Wireless[578]: wlan0(eth1): IEEE 802.11 STA 6C:FA:A7:13:8E:68 deauthed from BSSID reason 16 2016-09-06 01:14:37 RV110W daemon.info Wireless[578]: The wireless client with MAC address eth1 had an authentication failure 2016-09-06 01:14:37 RV110W daemon.info Wireless[578]: wlan0(eth1): IEEE 802.11 STA EC:1F:72:C9:D9:63 deauthed from BSSID reason 16 2016-09-06 01:19:00 RV110W daemon.info Wireless[578]: The wireless client with MAC address wl0.1 had an authentication failure 2016-09-06 01:19:00 RV110W daemon.info Wireless[578]: wlan0(wl0.1): IEEE 802.11 STA E8:50:8B:C8:0A:F7 deauthed from BSSID reason 16 2016-09-06 03:14:35 RV110W daemon.info Wireless[578]: The wireless client with MAC address eth1 had an authentication failure 2016-09-06 03:14:35 RV110W daemon.info Wireless[578]: wlan0(eth1): IEEE 802.11 STA 34:4D:F7:86:A5:E1 deauthed from BSSID reason 16 2016-09-06 03:19:52 RV110W kern.info wl0.0: IEEE 802.11 STA 34:4d:f7:86:a5:e1 associated with BSSID bc:67:1c:40:7d:24 2016-09-06 03:19:52 RV110W daemon.info Wireless[578]: wlan(eth1): IEEE 802.11 STA 34:4D:F7:86:A5:E1 WPA: pairwise key exchange completed 2016-09-06 03:19:57 RV110W daemon.info udhcpd[1142]: received REQUEST from 34:4D:F7:86:A5:E1 2016-09-06 03:19:57 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.8 2016-09-06 08:00:02 RV110W user.info syslog: email Smtp Auth Success 2016-09-06 08:00:04 RV110W user.info syslog: email Smtp Send Success 2016-09-06 08:22:38 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:93:4D 2016-09-06 08:22:38 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.6 2016-09-06 08:22:40 RV110W daemon.info udhcpd[1142]: received REQUEST from 6C:FA:A7:13:92:E6 2016-09-06 08:22:40 RV110W daemon.info udhcpd[1142]: sending ACK to 10.0.0.7 2016-09-06 09:05:43 RV110W daemon.info httpd[517]: Administrator session timeout. 2016-09-06 09:05:43 RV110W daemon.info httpd[517]: Administrator logined from x.x.x.x