Solved

DIR-615 DLink Router

Posted on 2011-03-24
6
1,404 Views
Last Modified: 2012-05-11
Is it possible to activate a log for the DIR-615 DLink Router to record all traffic activity?
0
Comment
Question by:ws11
  • 3
  • 3
6 Comments
 
LVL 2

Expert Comment

by:cripplecaptain
ID: 35209001
The logging on the stock firmware for that router is in my oppinion... rather poor. Howerver that router appears to be capable of running the open source firmware dd-wrt which has much more capable logging and works with programs like link logger http://www.linklogger.com/dd-wrt_setup.htm  this is a guide for setting up link logger. Flashing dd-wrt is also incredibly easy.  I hope this is helpfull to you

Link logger is not free but it is cheap, although you could use any syslog agregator of your choosing depending on your needs.
0
 

Author Comment

by:ws11
ID: 35209114
I activated syslog on the current router setup and pointed it to a specific machine.  What I don't understand is what is that doing and how can I find the log file?  Also I am somewhat uncomfortable with using a firmware that is not directly from the manufacturer.  Should this be a concern and could I get any issues using it?
0
 
LVL 2

Accepted Solution

by:
cripplecaptain earned 125 total points
ID: 35209256
Well if anything dd-wrt is a more stable and better supported firmware then the stock dlink firmware. HOWEVER in rare cases due to issues like power outtages or failing hardware you can brick the router when flashing the dd-wrt firmware its rare and can actually be recovered from.

Thats just my little disclaimer for you though.

 So you need to setup a machine to collect that syslog information something like kiwi syslog daemon for windows or as posted earlier its likely link logger could grab that info. I have used kiwi it was pretty easy to get going but if you arent overly tech savy all of the opensource/free syslog stuff is not very flashy and be hard to get used to.

learning how to use syslog is a little more difficult then the scope of this question though :/ but here is a link to some windows based syslog server utilities http://www.syslog.org/wiki/Main/WindowsSyslogServers
0
How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

 

Author Comment

by:ws11
ID: 35209459
Great thanks.  I just don't use this feature and the documentation is not that great.  I did realize the log was viewable in the web admin interface after I asked this question.  I also think the time on the router was impacting some of the routers features.  I had not set the time and it was way off.  I now have log entries and my schedules are appearing to work.  

Thanks for the help.  It is good to know that if you brick the router you can recover.  What brand of router do you like for home where remote connections and vpn features are needed?
0
 
LVL 2

Expert Comment

by:cripplecaptain
ID: 35209537
Out of habit I like linksys/cisco routers for home use however if I was going to be hosting vpn services and manageing my network traffic and exception etc. Id put a cheapo computer running Opensource Untangle in between my modem and router.

Depending how bricked the router is you can reload the firmware when it powers up looking for firmware and if its bricked past that it can be restored by JTAG. if you want some info on it Id recommend reading up on it here http://www.dd-wrt.com/wiki/index.php/Recover_from_a_Bad_Flash

Also id actually look for a router that comes with dd-wrt preloaded if I want to really do some hobbyist home networking (you can usualy buy a linksys router preloaded with dd-wrt from newegg for cheap) there are some pretty cool options in DD-WRT
0
 

Author Closing Comment

by:ws11
ID: 35210593
Thanks again for your advice.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now