1. PPTP/L2TP VPN Client auto dial-in feature
2. Support User’s group and group’s privileges edit
3. Updated max number of wireless clients
4. Wireless IGMP Snooping support and Multicast to Unicast
5. OSPF support on L2TP over IPsec
6. Category filters for device logging
7. Support configurable IPsec backup policy
8. Support WCF 3-month trial license
9. Support multiple OpenVPN clients with the same certificate
10. Alerts via SMS for WAN/IPsec/CPU/RAM events
11. Support source port configuration for custom services
12. Multi-language support
13. Support Omni SSLVPN client
14. Select verified DDNS services:
a. DynDNS
b. D-Link DDNS
c. FreeDNS
d. NO-IP
e. 3322.org
f. Oray (existing in M7)
g. Custom
1. SQL injection Post authentication attack in Captive portal change password page.
2. WAN3 interface is unable in drop-down list of WAN interfaces on bandwidth profile page.
3. Unable to establish the SSL VPN tunnels in mac 10.6.8 host.
4. L2TP Over IPsec port option is not available in OSPF setting page.
5. Outbound firewall rule is not working for LAN to DMZ.
6. Unable to configure Static type and DHCP statefull on IPv6 WAN.
7. Unable to edit the subnet mask value in traffic selector page.
8. Unable to do default (factory default) from GUI.
9. Unable to detect the USB printer.
10. Unable to edit 2.4Ghz setting when WDS is enabled on 5Ghz radio
11. Able to establish WDS link even if the security modes are mismatched.
12. Still block URL even if blocked keyword is removed.
13. Unable to delete the users in specific case.
14. Unable to send logs to Gmail account from gmx sender mail address. 15. DSR PPTP Client doesn’t stay connected with Windows PPTP server.
16. VPN Pass-through is unstable.
17. CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow.
18. Update SSL VPN certificate validity time.
19. Unable to Remote firmware upgrade through PPPoE WAN.
20. Support 64 characters for PPPoE password [DEUR20160217000004]
21. CVE-2015-3195: OpenSSL x509 _Attribute memory leak.
22. Unable to set WAN port speed. [DI20160310000002]
23. Configuration version is updated without a configuration change after reboot. [DI20160405000007]
24. Unable to establish OpenVPN client tunnel with Access server.
25. Unable to select multiple port in custom service of inbound bandwidth profile.
26. Unable to support IPsec main mode for iPad/iPhone Cisco IPsec client.
27. Dashboard information incorrect. DGC20160518000002
28. NTP service is not working for customized NTP server. [DGC20160614000003]
29. OpenVPN client mode is not work.
30. OpenVPN tunnel doesn’t disconnect after OpenVPN server is disabled. 31. Unable to run traffic if PPPoE with DHCPv6 option is disabled.
32. Unable run traffic over PPTP client tunnel in MAC OS.
33. Passwords in configuration file is in plain text.
34. Unable to support NFS.
35. Unable to edit DHCP Reserved IP entry.
36. Reboot logs contains username and password of the WAN PPPoE credentials.
37. Add display active private routes in "IPv4 routes table".
38. Remove MAC traffic selector Match type option when the bandwidth profile is configured for Inbound traffic. [DEUR20160218000008], [DUSA20160726000001]
39. Ping packets are going out without NAT IP when WAN is configured with PPPoE in WAN auto-rollover.
40. User group login Policies should be also applied for SSH.
41. Unable to login SSL VPN Portal when internal and external user is configured with same name.
42. The critical page display on VPN>SSL VPN>SSL VPN Server Policy.
43. Incorrect session entries on Active session page.
44. WAN is coming up, when clicked 'RENEW' button in WAN status page even though routing mode is configured as Transparent.
45. Unable to support FQDN Sever address for L2TP in WAN setting. [DRU20160126000002] 46. Unable to configure hash key (-) in PSK field for IPsec policies.
47. DHCP relay is not working over VLAN.
48. Support 32 bit mask for private static routes with destination as single IP.
49. DHCPv6 server is not giving lease to the clients who sent IAID as zero in request packet.
50. Application rule is still working even if the rule is disabled or deleted.
51. Unable to add second routing policy with same service at protocol binding.[DGC20160520000003]
52. Unable to show connected network printer on Windows7.
53. Error display on Wi-Fi schedule control. [DGC20160614000003]
54. UPnP device is not showing correct name in the host
55. Unable to continually play Audio stream from specific server.
56. Support PPPoE MSS auto-detect. [DI20160509000004]
57. Deleting the conntrack entry of ICMP reply packet from WAN.
58. unable to ping 8.8.8.8 through L2TP/IPSec tunnel from Windows client. 59. 3G connectivity is not coming up after reboot.
60. Unable to add SNMP Access list for same IP with different community and privileges.[DI20160706000002]
61. Adding Help content in “Aprroved Urls” page for approved URls priority is wrong.[DUSA20161014000002]
62. Incorrect WAN link speed status in CLI [DI20160531000002]
63. Unable to configure PPTP client IP pool in LAN Subnet. [ DRU20160623000003]
64. Unable to get IP using DWM-156 A3. [DEUR20160627000005], [DEUR20160822000002]
65. Showing wrong VLAN info.
66. DDNS status message is not displaying properly when there is symbol # in the password.
67. Unable to change 20Mhz to 80Mhz in 5Ghz radio setting. [DGC20160618000001]
68. Dashboard information incorrect. [DGC20160518000002]
69. Support 80Mhz channel spacing for Russia [DI20160615000002]
70. Support 48 characters for email address. [DUSA20160831000003]
71. CVE-2016-5696: “Off-path” TCP exploits.
72. Insecure RSA public keys in TLS certificates for GUI login and OpenVPN.
73. Unable to send logs to Gmail account from gmx sender mail address. [DEUR20151113000006]
74. CLI command to show port link speed is displaying port speed value even WAN link is down. [DI20160531000002]
75. Unable to configure PPTP client IP pool in LAN Subnet. [DRU20160623000003]
76. Able to configure WAN mode in load balancing even when user configured configurable port as DMZ.
77. Unable to support full tunnel for remote L2TP over IPsec client [DUSA20160723000002]
78. Configuration is getting increased with reboot even without a configuration change. [DI20160405000007]
79. 5G Channel display “frequency”, not “channel” in wireless status page. 80. Showing wrong VLAN info in the WebUI. [DEUR20160421000005]
81. DDNS status message is not displaying properly when there is symbol # in the password. [DEUR20160421000005]
82. Sometimes device is getting crashed while changing radio settings frequently under wireless traffic. [DGC20160618000001]
83. Low throughput in NAT mode with PPPoE wan type. [DI20160509000004]
84. Dashboard information incorrect. [DGC20160518000002]
85. 3G is not coming up after reboot. [DEUR20160325000004]
86. Unable to add SNMP Access list with same IP, Subnet Mask and different community, privileges. [DI20160706000002]
87. Maximum log entries are not reaching up to 1500 lines in GUI Page. [DI20160913000004]
88. Help content in approved Urls page description for approved URls priority is wrong. [DUSA20161014000002]
89. Unable to support DWM-157 B1 [DEUR20160913000002]
1. In the WAN spill-over mode, DSR don’t allow users to establish L2TP and L2TP over IPsec from Internet to WAN 2 when WAN 2 is not triggered to be active.
2. There is an issue where the router is not able to transfer files > 250MB from Windows XP to USB storage after apply WinXP.reg script file.
3. Daylight saving with manual settings is not working properly for Newfoundland and Greenland time zones.
4. It's able to configure the same MAC address to WAN1 and WAN2 ports by selecting the 'Clone your PC's MAC Address' option.
5. After editing the WEP profile (wep-64), another WEP profile (wep-128) wireless client is not reconnecting until disable/enable the corresponding SSID.
6. VLAN dropped in and dropped out packet entries are incorrect in dashboard page.
7. User cannot enable UPnP on LAN and VLAN simultaneously.
8. Bandwidth rules over IPsec VPN tunnel are not being followed.
9. Snmpwalk takes long time to display IPsec details.
10. Spillover threshold can’t approach configured value very precisely.
11. IPsec failover only works for specific scenarios, e.g. in site-to-site tunnel mode, IPsec failover will only happen in one of end points.
12. Bandwidth control does not work when users select pre-defined services, e.g. http or "ftp.
13. Specific Service support for inbound traffic management is not work.
Do NOT upgrade firmware on any D-Link product over a wireless connection. Failure of the device may result. Use only hard-wired LAN network connections.
1. Save the current routers configuration to file. Tools/System. (Note that reloading this onto new major version of firmware can cause problems and thus is recommended to configure the router from scratch. Do not load the old configuration file from the old major version. If you're upgrading from minor to minor version, reloading of the configuration file shouldn't cause a problem. In these cases, please do not upload the previous older configuration file, rather set up the router from scratch. Should you need the configuration information from the previous saved configuration file, capture, copy or write down all required information from the configuration file loaded on the router BEFORE applying the newer firmware update.)
For routers using the new web page UI:
Management -> System Admin -> System
Save Settings To Local Hard Drive
2. Factory reset the router using the routers web page Tools/System, is easiest, or the back button.
3. Update the router using the routers web page Tools/System using the .bin file(s) that was downloaded for your product model. The .bin files have to be unpacked from the .zip file.
4. After the router as updated and status has reported it was successful on the routers web page, power OFF the ISP modem/ONT for 30 seconds then power back ON the modem/ONT. Perform one more Factory reset of the router using the routers web page Tools/System.
5. After the router has reset and come back to ready, reload the saved configuration file or reconfigure the router from scratch and walk thru the set up wizard. Status LEDs should be Blue, Green or White for power and internet (Globe) the router unit depending on model.
Clear all browser caches before and after loading FW files.
1. DSR-500AC/1000AC product doesn’t support BGP routing and are not affected by the potential vulnerability that is well known as CVE-2004-0230, the attacker can potentially reset the BGP connection with the device.
2. All DSR routers with WW version are not allowed to install RU firmware image in order to prevent unnecessary misunderstanding for customers.
3. Before plug DWM-152/156 3G USB dongle in DSR-500AC/1000AC, please make sure the SIM Card is not set PIN code.
4. Microsoft Windows XP has some well-known limitation to access USB storage of DSR router, D-Link provides a Registry Script file named: WinXP.reg which can solve limitation of Windows XP environment. Without applying this script file, it cannot copy file from Windows XP to USB storage. (This issue will not happen when copy file from USB storage to Windows XP)
5. For any firmware downgrade situation, i.e. from a newer version to an older one, it will take more time to restart system comparing to firmware upgrade, i.e. from an older version to a newer one. If you MUST execute firmware downgrade for your own reasons, please allow DSR more time to reboot system.
6. To authenticate SSL VPN users through external databases including RADIUS, LDAP, AD and POP3, admin must also need to create user accounts with the same username and password in the local user database.
Before you consider downloading this firmware, go to the system information page of the router and make sure that the currently installed version isn’t either newer or matching this release.
Due to the large variety of router models and different methods for upgrading the device, it is highly recommended that you read and, above all, understand the installation steps before you apply the new firmware, even if you are a power user.
In theory, these steps shouldn’t be much of a hassle for anyone, because manufacturers try to make them as easy as possible, even if they don’t always succeed. Basically, you must upload the new firmware to the router through its administration page and allow it to upgrade.
If you install a new version, you can expect increased security levels, different vulnerability issues to be resolved, improved overall performance and transfer speeds, enhanced compatibility with other devices, added support for newly developed technologies, as well as several other changes.
If you’re looking for certain safety measures, remember that it would be best if you perform the upload using an Ethernet cable rather than a wireless connection, which can be interrupted easily. Also, make sure you don’t power off the router or use its buttons during the installation, if you wish avoid any malfunctions.
If this firmware meets your current needs, get the desired version and apply it to your router unit; if not, check with our website as often as possible so that you don’t miss the update that will improve your device.
Top 4 Download periodically updates information of D-Link DSR-150 rev.B1 Router Firmware 2.11 WW/RU full driver from the manufacturer, but some information may be slightly out-of-date.
Using warez version of D-Link DSR-150 rev.B1 Router Firmware 2.11 WW/RU driver is hazardous. Our driver download links are directly from our mirrors or publisher's website, D-Link DSR-150 rev.B1 Router Firmware 2.11 WW/RU torrent files or shared files from free file sharing and free upload services, including Rapidshare, HellShare, HotFile, FileServe, MegaUpload, YouSendIt, MailBigFile, DropSend, MediaMax, zUpload, MyOtherDrive, SendSpace, DepositFiles, Letitbit, LeapFile, DivShare or MediaFire, are not allowed!
It is not recommended to download drivers from illegal sites which distribute a keygens, key generators, pirate keys, serial numbers, warez full versions or cracks for D-Link DSR-150 rev.B1 Router Firmware 2.11 WW/RU. These drivers might corrupt your computer installation or breach your privacy. A driver might contain a trojan horse opening a backdoor on your computer. Hackers can use this backdoor to take control of your computer, copy data from your computer or to use your computer to distribute viruses and spam to other people.