Menu principale

D-Link DIR-882: EXO AC2600 MU-MIMO Wi-Fi Router

Aperto da Carciofone, 18 Marzo 2018, 17:47:10

Carciofone

D-Link DIR-882
EXO AC2600 MU-MIMO Wi-Fi Router
Dual-band Wireless AC2600 (1,733 Mbps on 5 GHz + 800 Mbps on 2.4 GHz)




DIR-882 A1 (MediaTek MT7621A (880 MHz, 2 cores)


EXO AC2600 MU-MIMO Wi-Fi Router DIR-882 in breve:

  Dual-band Wireless AC2600 (1,733 Mbps on 5 GHz + 800 Mbps on 2.4 GHz)
    802.11ac Wave 2 con MU-MIMO e Advanced AC SmartBeam
    Gigabit WAN e 4 x Gigabit LAN
    porte 1 x USB 3.0 e 1 x USB 2.0 per condivisione media sharing


MIMO multi-utente (MU-MIMO)
L'AC2600 MU-MIMO Wi-Fi Router è progettato per supportare la tecnologia MU-MIMO che consente a più dispositivi di ottenere contemporaneamente un segnale Wi-Fi a banda larga potente, distribuendo i dati più efficientemente, per ottenere le più alte velocità Wi-Fi in casa. I contenuti multimediali HD possono viaggiare più velocemente, il trasferimento di grandi file avviene in pochi secondi e sarà possibile godersi i giochi senza tempi di attesa.

Processore dual core: maggiore potenza di elaborazione
Desideri un processore potente ad alte prestazioni in grado di gestire più attività a velocità incredibili?
Il processore dual-core potenzia l'elaborazione multi-tasking e migliora le velocità di throughput per tutte le tue applicazioni.

Copertura WiFi estrema: SmartBeam Forming
Quattro antenne esterne ad alte prestazioni e potenti amplificatori garantiscono una maggiore copertura Wi-Fi in tutta la casa. Un maggior numero di dispositivi si connetterà con maggiore velocità alla rete con assenza di zone morte.
Migliora la copertura dirigendo la larghezza di banda ai tuoi dispositivi mentre ti sposti all'interno della tua casa.
Potrai guardare video HD in streaming, effettuare chiamate Skype con i tuoi amici e giocare on-line da ovunque ti trovi, ottenendo sempre la migliore esperienza possibile grazie alla tecnologia AC SmartBeam avanzato e al flusso dati 4X4 che traccia i dispositivi collegati per ottenere una velocità e una portata Wi-Fi migliorata.


Supporto DLNA & QoS
Accessibile condivisione multimediale di file audio e video ottimizzata per flussi 4K grazie alla presenza di porte USB 3.0 e 2.0.

Caratteristiche
Connettività
• Velocità WiFi combinata con modalità AC fino a 800 Mbps su 2.4 GHz e 1,733 Mbps su 5 GHz
• Advanced AC SmartBeam™ 4X4 dramatically enhances wireless signal strength and throughput
• 802.11 a/b/g/n/ac wireless LAN for a complete range of wireless compatibility
• 5 porte ethernet Gigabit WAN and LAN
• 2 porte USB (1 x USB 3.0, 1 x USB 2.0) per connettere stampanti e driver HD

Hassle-Free D-Link Smart Connect Technology per il band steering
• Distribuzione automatica dei client wireless su una delle due bande 2.4 Ghz e 5 Ghz a seconda del carico di di rete e delle velocità di ciascun client wireless.

Advanced Quality of Service (QoS)
• Band steering efficiently balances the data load between the two wireless bands
• Airtime fairness optimally adjusts the data rate of wireless clients for the best performance

Security
• WPA & WPA2 wireless encryption protects the network from intruders
• Wi-Fi Protected Setup (WPS) securely adds devices to your network at the push of a button


Panoramica
The EXO AC2600 MU-MIMO Wi-Fi Router brings a host of new technologies to create the best Wi-Fi experience to date. Supporting the latest in Wi-Fi technology, with combined Wi-Fi speeds of up to 2,533 Mbps, it allows you to create a home Wi-Fi that connects all of your computers, game consoles, smart  TVs  and  mobile  devices.  AC  SmartBeam™  together  with  MU-MIMO  technology  brings  you the  future  of  high-bandwidth  wireless  connectivity,  further  increasing  the  speed  and  coverage  of your network.

Superior Coverage and Speed with Advanced AC SmartBeam™
The  DIR-882  upgrades  your  network  to  the  latest  dual-band  high-speed  wireless  technology to bring you lightning fast Wi-Fi speeds of up to 2,533 Mbps, so you can meet the increasing demand  from  multimedia  applications.  Enjoy  seamless  high  definition  streaming  media, Internet  phone  calls,  online  gaming  and  content-rich  web  surfing  throughout  your  home  or office.
In addition, 10/100/1000 Gigabit Ethernet ports give you solid, dependable wired performance for devices such as Network Attached Storage (NAS), set-top boxes and gaming consoles. The built-in Quality of Service (QoS) engine allows you to prioritise important traffic to ensure that your favourite applications are receiving optimal bandwidth.

Smooth Streaming with Wireless 802.11ac Wave 2
The  DIR-882  brings  a  host  of  new  technologies  to  create  the  best  wireless  networking experience to date. With 802.11ac Wave 2 technology, it provides Gigabit wireless connectivity with combined transfer rates of up to 2,533 Mbps (1,733 Mbps Wireless AC + 800 Mbps Wireless N). Featuring Multiple-User MIMO (MU-MIMO) technology, it can send and receive data to and from devices simultaneously to increase speed and efficiency. It is like having multiple routers in your home.

File Sharing at Your Fingertips
The  DIR-882  lets  you  connect  a  USB  storage  device  and  instantly  share documents, movies, pictures and music. You can have your music library on a USB drive and share it with your entire home. You can show photos on the living  room  TV,  while  a  family  member  watches  a  movie  on  their  computer. 
You can stream media files to multiple devices without interruption, or save them to your device for offline playback.
The  intuitive  interface  lets  anyone  immediately  connect  to  a  variety of entertainment options stored on your own storage device.

Hassle-Free D-Link Smart Connect Technology
Ever  since  the  introduction  of  5  GHz  wireless  technology,  users  have  had  to blindly guess whether the 5 GHz or 2.4 GHz band would provide them with the best  networking  experience.  D-Link's  Smart  Connect  Technology  eliminates this confusion by automatically distributing devices to the optimal network.
Simply initiate a connection to the DIR-882 and its advanced algorithms will determine the best network for your device to connect to, thereby ensuring a faster, more reliable and hassle-free experience.
 
Easy to Set Up and Secure
Sharing your Internet connection doesn't have to be a complicated process: just open a web browser to access the setup wizard and follow the easy step-by-step  instructions  to  get  started.  Configure,  apply  and  set  up  WPA/WPA2 wireless security in minutes with the wireless network setup wizard, or use Wi-Fi Protected Setup (WPS), which establishes an encrypted connection to new
devices without the need to enter settings or create passwords. In addition, the built-in firewall requires no setup, protecting you against malicious attacks from  the  Internet  and  access  control  features  allow  you  to  restrict  access  to your network giving you greater control over network users.

Specifiche
Device Interfaces
• 802.11 a/b/g/n/ac wireless LAN
• Four 10/100/1000 Gigabit LAN ports
• 10/100/1000 Gigabit WAN port
• Two USB ports (one USB 3.0, one USB 2.0)

Antenna Type
• Four dual-band dipole antennas with high gain and amplified

Standards
• IEEE 802.11ac
• IEEE 802.11n
• IEEE 802.11g
• IEEE 802.11b
• IEEE 802.11a
• IEEE 802.3
• IEEE 802.3u

Minimum System Requirements
• Windows 10/8/7 / Mac OS X 10.4 or higher
• Microsoft Internet Explorer 6 or higher, Firefox 1.5 or higher, or other Java-enabled browser
• Ethernet network interface
• Fiber, Cable or DSL modem
• Subscription with an Internet service provider

Advanced Features
• Guest zone
• Multi-language web setup wizard
• Green Ethernet
• DLNA media server support
• Advanced AC SmartBeam™ 2
• Bridge mode       
• Dual active firewall: Network Address Translation (NAT) & Stateful Packet Inspection (SPI)
• VPN passthrough/multi-session PPTP/L2TP/IPSec
• Advanced QoS with band steering
• VPN server - L2TP over IPSec

Mobile App Support
• QRS Mobile per IOS e Android

Wireless Security
• WPA & WPA2 (Wi-Fi Protected Access)
• Wi-Fi Protected Setup (WPS) PIN/PBC

Dimensions (L x W x D)
• 258.8 x 184.1 x 45.5 mm 

Weight
• 565 grams 

Power
• Input:100 to 240 V AC, 50/60 Hz
• Input:12 V, 2.5 A

Temperature
• Operating: 0 to 40 °C (32 to 104 °F)
• Storage: -20 to 65 °C (-4 to 149 °F)

Humidity
• Operating: 0% to 90% non-condensing
• Storage: 5% to 95% non-condensing

Certifications
• FCC Class B
• CE Class B
• C-Tick
• DLNA
• IPv6 Ready
• Wi-Fi Certified
• Wi-Fi Protected Setup (WPS)
• Wi-Fi Multimedia (WMM)
• Compatible with Windows 10[/size]


Documentazione
Scheda tecnica EU luglio 2017
Guida installazione rapida: V1.00 IT 20170824
Manuale prodotto V1.00 EU

Domande frequenti (Frequently Asked Questions - FAQ)
D-Link IT

Codice sorgente GPL Fw v.1.01

Firmware
WORLDWIDE (Mondiale)
DIR-882 Rev A1 1.30B08 ALL multi 20210329 BETA con note edizione incluse
DIR-882 Rev A1 1.22b04 ALL multi 20191010 con note edizione incluse
DIR-882 A1 1.20 EU 20190904 con note edizione incluse
DIR-882 Ax v1.11B01 20181012 SPI Fix (vpn_noworking_issue)
DIR-882 A1 1.11 EU 20180919 con nota edizione
DIR-882 Ax 1.02 build 02 20180203 con nota edizione -> Attenzione, per l'installazione attenersi alle istruzioni sotto!
DIR-882 Ax 1.01 build 02 20170818 con nota edizione

Firmware alternativi

A partire dalla versione dir882-a1 build 33006 20170803

Approfondimenti
WikiDevi: DIR-882 rev A1
Smart Connect (connessione intelligente)

Supporto internazionale D-Link
Pagina prodotto: Italia, Medio Oriente
Sito FTP: Europa, Germania, Australia, USA, US-SEC_ADV
Supporto Tecnico: Taiwan TSD

Carciofone


Carciofone

Attenzione: aggiunto al primo post link del download del nuovo firmware v. 1.02B02 20180203 correttivo dei bag riguardanti il protocollo di sicurezza WPA2.

Istruzioni di installazione. Attenersi alla seguente sequenza:

1) Resettare il router tramite interfaccia web;
2) Aggiornare una prima volta il router caricando manualmente il file 1_DIR-882_RevA_MiddleFirmware.bin. Attendere il tempo necessario all'aggiornamento (circa 4 minuti);
3) Aggiornare per la seconda volta con il firmware 2_DIR-882_RevA_Firmware102B02.bin ed attendere che il router effettui il riavvio (4 minuti circa).
4) Resettare nuovamente il router alle impostazioni iniziali di fabbrica tramite l'interfaccia web e NON utilizzare file di configurazione salvati in precedenza con versioni diverse del firmware.

Changelog:
DIR-882 Firmware Release Notes

Firmware: 1.02b02
Hardware: Rev. Ax
Release Date: 2018/02/09

Note:
This release is to patch the WPA2 Key Reinstallation Attack (KRACK) Security Vulnerabilities affecting this product.

Problems Resolved:
A WPA2 wireless protocol vulnerability was reported to CERT//CC and public disclosed as: VU#228519 - Wi-Fi Protected Access II (WPA2) handshake traffic can be manipulated to induce nonce and session key reuse.

The following CVE IDs have been assigned to VU#228519. These vulnerabilities in the WPA2 protocol:

   ·   CVE-2017-13077: reinstallation of the pairwise key in the Four-way handshake

   ·   CVE-2017-13078: reinstallation of the group key in the Four-way handshake

   ·   CVE-2017-13079: reinstallation of the integrity group key in the Four-way
       handshake

   ·   CVE-2017-13080: reinstallation of the group key in the Group Key handshake

   ·   CVE-2017-13081: reinstallation of the integrity group key in the Group Key
       handshake

   ·   CVE-2017-13082: accepting a retransmitted Fast BSS Transition Re-association
       Request and reinstalling the pairwise key while processing it

   ·   CVE-2017-13084: reinstallation of the STK key in the PeerKey handshake

   ·   CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS)
       PeerKey (TPK) key in the TDLS handshake

   ·   CVE-2017-13087: reinstallation of the group key (GTK) when processing a
       Wireless Network Management (WNM) Sleep Mode Response frame

   ·   CVE-2017-13088: reinstallation of the integrity group key (IGTK) when
       processing a Wireless Network Management (WNM) Sleep Mode Response
       frame


This patch also included fixes for DNSmasq vulnerability:

   ·   CVE-2017-14491 ­ Remote code execution in the DNS subsystem that can be
       exploited from the other side of the internet against public-facing systems and
       against stuff on the local network. The previously latest version had a two-byte
       overflow bug, which could be leveraged, and all prior builds had an unlimited
       overflow.

   ·   CVE-2017-14492 ­ The second remote code execution flaw works via a heap-
       based overflow.

   ·   CVE-2017-14493 ­ Google labels this one as trivial to exploit. It's a stack-based
       buffer overflow vulnerability that enables remote code execution if it's used in
       conjunction with the flaw below.

   ·   CVE-2017-14494 ­ This is an information leak in DHCP which, when using in
       conjunction with CVE-2017-14493, lets an attacker bypass the security
       mechanism ASLR and attempt to run code on a target system.

   ·   CVE-2017-14495 ­ A limited flaw this one, but can be exploited to launch a
       denial of service attack by exhausting memory. Dnsmasq is only vulnerable,
       however, if the command line switches --add-mac, --add-cpe-id or --add-subnet
       are used.

·   CVE-2017-14496 ­ Here the DNS code performs invalid boundary checks,
    allowing a system to be crashed using an integer underflow leading to a huge
    memcpy() call. Android systems are affected if the attacker is local or tethered
    directly to the device.

·   CVE-2017-13704 ­ A large DNS query can crash the software

---------------------

Firmware: 1.02b01
Hardware: Rev. Ax
Release Date: 2017/11/29

Note:
This release is to patch the WPA2 Key Reinstallation Attack (KRACK) Security Vulnerabilities affecting this product.

Problems Resolved:
A WPA2 wireless protocol vulnerability was reported to CERT//CC and public disclosed as: VU#228519 - Wi-Fi Protected Access II (WPA2) handshake traffic can be manipulated to induce nonce and session key reuse.

The following CVE IDs have been assigned to VU#228519. These vulnerabilities in the WPA2 protocol:

   ·   CVE-2017-13077: reinstallation of the pairwise key in the Four-way handshake

   ·   CVE-2017-13078: reinstallation of the group key in the Four-way handshake

   ·   CVE-2017-13079: reinstallation of the integrity group key in the Four-way
       handshake

   ·   CVE-2017-13080: reinstallation of the group key in the Group Key handshake

   ·   CVE-2017-13081: reinstallation of the integrity group key in the Group Key
       handshake

   ·   CVE-2017-13082: accepting a retransmitted Fast BSS Transition Re-association
       Request and reinstalling the pairwise key while processing it

   ·   CVE-2017-13084: reinstallation of the STK key in the PeerKey handshake

   ·   CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS)
       PeerKey (TPK) key in the TDLS handshake

   ·   CVE-2017-13087: reinstallation of the group key (GTK) when processing a
       Wireless Network Management (WNM) Sleep Mode Response frame

   ·   CVE-2017-13088: reinstallation of the integrity group key (IGTK) when
       processing a Wireless Network Management (WNM) Sleep Mode Response
       frame

This patch also included fixes for DNSmasq vulnerability:

   ·   CVE-2017-14491 ­ Remote code execution in the DNS subsystem that can be
       exploited from the other side of the internet against public-facing systems and
       against stuff on the local network. The previously latest version had a two-byte
       overflow bug, which could be leveraged, and all prior builds had an unlimited
       overflow.

   ·   CVE-2017-14492 ­ The second remote code execution flaw works via a heap-
       based overflow.

   ·   CVE-2017-14493 ­ Google labels this one as trivial to exploit. It's a stack-based
       buffer overflow vulnerability that enables remote code execution if it's used in
       conjunction with the flaw below.

   ·   CVE-2017-14494 ­ This is an information leak in DHCP which, when using in
       conjunction with CVE-2017-14493, lets an attacker bypass the security
       mechanism ASLR and attempt to run code on a target system.

   ·   CVE-2017-14495 ­ A limited flaw this one, but can be exploited to launch a
       denial of service attack by exhausting memory. Dnsmasq is only vulnerable,
       however, if the command line switches --add-mac, --add-cpe-id or --add-subnet
       are used.

   ·   CVE-2017-14496 ­ Here the DNS code performs invalid boundary checks,
       allowing a system to be crashed using an integer underflow leading to a huge
       memcpy() call. Android systems are affected if the attacker is local or tethered
       directly to the device.

   ·   CVE-2017-13704 ­ A large DNS query can crash the software

---------------------

Firmware: 1.02b01
Hardware: Rev. Ax
Release Date: 2017/11/28

Problems Resolved:
- CVE-2017-14491 ­ Remote code execution in the DNS subsystem that can be exploited from the other side of the internet against public-facing systems and against stuff on the local network. The previously latest version had a two-byte overflow bug, which could be leveraged, and all prior builds had an unlimited overflow.

- CVE-2017-14492 ­ The second remote code execution flaw works via a heap-based overflow.

- CVE-2017-14493 ­ Google labels this one as trivial to exploit. It's a stack-based buffer overflow vulnerability that enables remote code execution if it's used in conjunction with the flaw below.

- CVE-2017-14494 ­ This is an information leak in DHCP which, when using in conjunction with CVE-2017-14493, lets an attacker bypass the security mechanism ASLR and attempt to run code on a target system.

- CVE-2017-14495 ­ A limited flaw this one, but can be exploited to launch a denial of service attack by exhausting memory. Dnsmasq is only vulnerable, however, if the command line switches --add-mac, --add-cpe-id or --add subnet are used.

- CVE-2017-14496 ­ Here the DNS code performs invalid boundary checks, allowing a system to be crashed using an integer underflow leading to a huge memcpy() call.
Android systems are affected if the attacker is local or tethered directly to the device.

- CVE-2017-13704 ­ A large DNS query can crash the software.

Enhancements:
None

---------------------

Firmware: 1.01b02
Hardware: Rev. Ax
Release Date: 2017/08/18

Problems Resolved:
1. Fixed WAN performance willbe impact once VLAN is enabled.
2. Fixed DLNA and UPnP doesn't work properly sometimes once enable at the same time.
3. Fixed Log schedule doesn't work properly under same setting.

Enhancements:
1. Endurance improved.
2. MU-MIMO improved.
3. USB IoT improved (PNY pen drive).

---------------------

Firmware: FW 1.00b07
Hardware: Rev. Ax
Release Date: 2017/06/01

Notes:
1st release


m4ss1

Pubblicato nel primo messaggio il nuovo firmware 1.11 del 19.09.2018 per la revisione hardware Ax.

m4ss1

Disponibile nuovo firmware per la versione versione hardware A1 (DIR-882 Ax v1.11B01 20181012), è stato risolto il problema con le connessioni VPN.

m4ss1

Aggiornato primo messaggio: pubblicato il nuovo firmware DIR-882 A1 1.20 EU 20190904

- 1. Fixed the problem that SG CountryCode Code Setting Operator's Preservation is not effective
- 2. Fixed the problem that EU VLAN of IPTV and VOIP Interfaces cannot be set to bridge mode.
- 3. The latest SKU tables incorporating Indian country code

m4ss1

Pubblicato nel primo messaggio il link del nuovo firmware DIR-882 Rev A1 1.22b04 ALL multi 20191010

DIR-882 Rev.A Firmware Release Notes
Firmware: 1.22b04
Hardware: Rev. Ax
Release Date: 2019/10/10

Problems Resolved:
1. Compatible to actual D-Link Wi-Fi app for PPPoE setup with VLAN-ID.

----------


Carciofone

Attenzione: pubblicato nel primo messaggio il link del nuovo firmware DIR-882 Rev A1 1.30B08 Beta ALL multi 20210329 correttivo di una vulnerabilità di buffer overflow.

m4ss1

Lo stato prodotto del DIR-882 è stato aggiornato in "End of Sale".

D-Link continuerà a fornire assistenza per questo prodotto in linea con i termini e le condizioni di garanzia riportate qui.

Licenza Creative Commons
Il contenuto dei messaggi del forum è distribuito con
Licenza Creative Commons Attribuzione Non commerciale 4.0
Tutti i marchi registrati citati appartengono ai legittimi proprietari