Tag Archives: reboot

Yealink Handset Crackling or Buzzing from Handset and Speakerphone

You may occasionally notice that your Yealink phone starts crackling or buzzing.  This has most commonly been observed after the phone has been in operation for sometime without being rebooted or after a firmware update.

Below are some troubleshooting steps that you can try to resolve the buzzing and crackling

  • Try restarting the Yealink Phone (You can either remove the Power or Ethernet Cable if using PoE, alternatively just hold down the X key until you are prompted to restart the phone)
  • Try a Factory Reset on the Phone, ensure that you have all the required settings to reconfigure the device after the factory reset.
  • Update the phone firmware to the latest release and then perform a factory reset prior to configuring or provisioning the phone again.
  • Confirm if crackling or buzzing is just occurring from the handset or also from the speakerphone.  If just the handset exhibits the issue then the cable or handset may need to be replaced.
  • Ensure that the VoIP/SIP Phone System is up to date
  • Ensure that you are using the most appropriate voice Codecs for your phones and the SIP Trunk. (A-law is commonly used in Europe and u-law is generally used in the United States)

Watchguard XTM 1050, XTM 2050, XTM 2 Series, XTM 3 Series, XTM 5 Series, XTM 8 Series – Fireware XTM OS 11.6.1 – Build # 346666

Watchguard XTM 1050, XTM 2050, XTM 2 Series, XTM 3 Series, XTM 5 Series, XTM 8 Series – Fireware XTM OS 11.6.1 – Build # 346666

11.6.1 – Build # 346666 Provides some new features and resolves the following issues:

• This release introduces support for the new high-performance XTM 5 Series models 515, 525, 535, and 545

• Provides an update to our localized user interfaces and documentation

• An XTM device configured in bridge mode can now pass VLAN traffic between 802.1Q switches or bridges

• FireCluster support for XTM 25, 26, and 33 wired models

• Several issues have been resolved in this release that caused XTM devices to crash when configured to use Application Control or IPS [66937, 65426, 65636, 67312, 66135, 67159, 67399, 67310]

• An issue was resolved that caused some XTM device processes to crash when running Mu Dynamics default published vulnerability test [66490]

• An issue was resolved that caused a kernel crash and device reboot [67329]

• The XTM 2 Series device can now handle a large file transfer without interface instability [67367]

• A problem that caused incorrect data to display on the XTM 5 Series LCD screen has been resolved [67197]

• Policy Manager now displays the correct VLAN limits for XTM 5 Series models 505, 510, 520, and 530 with a standard Fireware XTM feature key (not Pro) [67780]

• You can now successfully configure and apply Traffic Management actions for XTM 2 and 3 Series devices from the Web UI [67221, 66645]

• Firebox X Edge e-Series devices can now be successfully managed with templates [67658]

• The notification message sent when a local Log or Report database is down now correctly shows the host IP address instead of “???” [41731]

• The Log Server can now handle backup files greater than 2GB in size without generating an error message: “Error (8199), Exception during backup of oldest log data: File is not a zip file” exception” [66811]

• The DHCP lease activity report now works correctly [66062]

• Log Collector now handles XTM device log data that spans multiple SSL/TLS records without crashing [66347]

• A problem has been resolved that caused poor performance on XTM 2 Series models 25 and 26 because of an incorrect memory allocation for security subscription signatures [67240]

• A deny message is now correctly sent to the web browser in most cases when Application Control blocks content in the Web/Web 2.0 category [66201]

• The WebBlocker automatic database update time is no longer off by one hour when daylight savings time is in effect on the host server’s timezone [67551]

• If you use PPPoE or DHCP for an external interface on an XTM device configured to use multi-WAN, the XTM device no longer loses the default routes for external interfaces after the external interface reconnects [67424, 67520]

• A problem has been resolved that caused a static route to fail after an external interface configured to use PPPoE is disconnected, then reconnected [67520]

• Tagged VLAN traffic is now correctly recognized when an XTM device is configured in Bridge mode [64355]

• The CLl command “restore factory default all” now successfully restores a device to its factory default settings [66240]

• An issue has been resolved that caused Policy Manager to incorrectly display an interface IP address as 0.0.0.0/24 when you viewed a FireCluster configuration for a cluster in drop-in mode [63551]

• The Mobile VPN with SSL process no longer crashes during a FireCluster failover [66118]

You can download 11.6.1 – Build # 346666 from the Watchguard website

DD-WRT Firmware Revision Histroy for the D-Link DIR-615 Rev D1 D2 D3 and D4 (Includes Virgin Media Supplied D-Link DIR-615 Router)

DD-WRT Firmware Revision Histroy for the D-Link DIR-615 Rev D1 D2 D3 and D4 (Includes Virgin Media Supplied D-Link DIR-615 Router)

r20119 V24-preSP2 – 10-12-2012 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2012/10-12-12-r20119-testing/dlink-dir615d/

r20086 V24-preSP2 – 10-06-2012 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2012/10-06-12-r20086-testing/dlink-dir615d/

r19519 V24-preSP2 – 07-20-2012 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2012/07-20-12-r19519/dlink-dir615d/

r19342 V24-preSP2 – 06-08-2012 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2012/06-08-12-r19342/dlink-dir615d/

r19327 V24-preSP2 – 06-06-2012 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2012/06-06-12-r19327/dlink-dir615d/

r18777 V24-preSP2 – 03-19-2012 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2012/03-19-12-r18777/dlink-dir615d/

r18767 V24-preSP2 – 03-08-2012 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2012/03-08-12-r18767/dlink-dir615d/

r18740 V24-preSP2 – 03-08-2012 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2012/03-08-12-r18740/dlink-dir615d/

r18687 V24-preSP2 – 03-08-2012 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2012/03-08-12-r18687/files/dlink-dir615d/

r18024 V24-preSP2 – 12-20-2011 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2011/12-20-11-r18024/dlink-dir615d/

r18007 V24-preSP2 – 12-14-2011 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2011/12-14-11-r18007/dlink-dir615d/

r18000 V24-preSP2 – 12-12-2011 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2011/12-12-11-r18000/dlink-dir615d/

r17990 V24-preSP2 – 12-09-2011 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2011/12-09-11-r17990/dlink-dir615d/

r17967 V24-preSP2 – 12-07-2011 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2011/12-07-11-r17967/dlink-dir615d/

r17201 V24-preSP2 – 06-14-2011 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2011/06-14-11-r17201/dlink-dir615d/

r16994 V24-preSP2 – 05-08-2011 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2011/05-08-11-r16994/dlink-dir615d/

r16785 V24-preSP2 – 04-09-2011 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2011/04-09-11-r16785/dlink-dir615d/

r16754 V24-preSP2 – 04-09-2011 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2011/04-09-11-r16754/dlink-dir615d/

r16454 V24-preSP2 – 03-17-2011 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2011/03-17-11-r16454/dlink-dir615d/

r16214 V24-preSP2 – 02-17-2011 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2011/02-17-11-r16214/dlink-dir615d/

r15962 V24-preSP2 – 12-24-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/12-24-10-r15962/dlink-dir615d/

r15940 V24-preSP2 – 12-18-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/12-18-10-r15940/dlink-dir615d/

r15778 V24-preSP2 – 11-21-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/11-21-10-r15778/dlink-dir615d/

r15704 V24-preSP2 – 11-09-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/11-09-10-r15704/dlink-dir615d/

r15693 V24-preSP2 – 11-06-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/11-06-10-r15693/dlink-dir615d/

r15506 V24-preSP2 – 10-26-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/10-26-10-r15506/dlink-dir615d/

r15501 V24-preSP2 – 10-25-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/10-25-10-r15501/dlink-dir615d/

r15437 V24-preSP2 – 10-12-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/10-12-10-r15437/dlink-dir615d/

r15407 V24-preSP2 – 10-09-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/10-09-10-r15407/dlink-dir615d/

r15362 V24-preSP2 – 10-05-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/10-05-10-r15362/dlink-dir615d/

r15334 V24-preSP2 – 10-02-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/10-02-10-r15334/dlink-dir615d/

r14929 V24-preSP2 – 08-12-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/08-12-10-r14929/dlink-dir615d/

r14896 V24-preSP2 – 08-07-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/08-07-10-r14896/dlink-dir615d/

r14815 V24-preSP2 – 07-16-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/07-16-10-r14815/dlink-dir615d/

r14684 V24-preSP2 – 06-30-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/06-30-10-r14684/dlink-dir615d/

r14594 V24-preSP2 – 06-12-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/06-12-10-r14594/dlink-dir615d/

r14569 V24-preSP2 – 06-09-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/06-09-10-r14569/dlink-dir615d/

r14537 V24-preSP2 – 06-03-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/06-03-10-r14537/dlink-dir615d/

r14473 V24-preSP2 – 05-25-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/05-25-10-r14473/dlink-dir615d/

r14289 V24-preSP2 – 04-16-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/04-16-10-r14289/dlink-dir615d/

r14280 V24-preSP2 – 04-15-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/04-15-10-r14280/dlink-dir615d/

r13637 V24-preSP2 – 01-16-2010 – ftp://dd-wrt.com/others/eko/BrainSlayer-V24-preSP2/2010/01-16-10-r13637/dlink-dir615d2/ (d2 Revision Only)

[RESOLVED] Google Android ICS 4.0, 4.01 or 4.02 – Handset Crashes and Reboots when you try to connect to an IPSec Xauth PSK VPN over the 3G Mobile Network

You may find that your Google Android ICS 4.0, 4.01 or 4.02 Smart Phone crashes and reboots when you try to connect to an IPSec Xauth PSK VPN over the 3G Mobile Network.  This has been seen to occur with Watchguard and Cisco VPN connections and is related to a glitch in the Google Android Modem Driver.

You will need to wait for an Over the Air update to Google Android 4.0.3 for the issue to be resolved, if this issue is severely affecting you then you may be able to contact your moile network carrier and/or the handset manufacturer to arrange to have the phone updated earlier.

Further information about this issue can be found here: http://code.google.com/p/android/issues/detail?id=23404&can=1&q=vpn%20xauth&colspec=ID Type Status Owner Summary Stars