D Link DI524G2 Wireless Router User Manual 2

D Link Corporation Wireless Router Users Manual 2

Users Manual 2

Download: D Link DI524G2 Wireless Router User Manual 2
Mirror Download [FCC.gov]D Link DI524G2 Wireless Router User Manual 2
Document ID994201
Application ID7dBgzIOHySSeTaVtZi2rMw==
Document DescriptionUsers Manual 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize165.42kB (2067697 bits)
Date Submitted2008-09-03 00:00:00
Date Available2008-09-04 00:00:00
Creation Date2007-08-03 13:38:29
Producing SoftwareAdobe PDF Library 7.0
Document Lastmod2008-08-22 17:11:59
Document TitleUsers Manual 2
Document CreatorAdobe InDesign CS2 (4.0.4)

Using the Configuration Menu (continued)
Advanced > Virtual Server continued
Click on this icon to edit the virtual service
Click on this icon to delete the virtual service
Example #2:
If you have an FTP server that you wanted Internet users to access by WAN port
2100 and only during the weekends, you would need to enable it as such. FTP
server is on LAN computer 192.168.0.30. FTP uses port 21, TCP.
Name: FTP Server
Private IP: 192.168.0.30
Protocol Type: TCP
Private Port: 21
Public Port: 2100
Schedule: From: 01:00AM to 01:00AM, Sat to Sun
All Internet users who want to access this FTP Server
must connect to it from port 2100. This is an example of
port redirection and can be useful in cases where there
are many of the same servers on the LAN network.
21
Using the Configuration Menu (continued)
Advanced > Applications
Some applications require multiple connections, such as Internet gaming, video
conferencing, Internet telephony and others. These applications have difficulties working
through NAT (Network Address Translation). Special Applications makes some of these
applications work with the DI-524. If you need to run applications that require multiple
connections, specify the port normally associated with an application in the “Trigger Port”
field, select the protocol type as TCP or UDP, then enter the public ports associated
with the trigger port to open them for inbound traffic.
The DI-524 provides some predefined applications in the table on the bottom of the
web page. Select the application you want to use and enable it.
Note! Only one PC can use each Special Application tunnel.
Name:
This is the name referencing the special application.
Trigger Port:
This is the port used to trigger the application. It can be either
a single port or a range of ports.
Trigger Type:
This is the protocol used to trigger the special application.
Public Port:
This is the port number on the WAN side that will be used
to access the application. You may define a single port or a
range of ports. You can use a comma to add multiple ports or
port ranges.
Public Type:
This is the protocol used for the special application.
22
Using the Configuration Menu (continued)
Advanced > Filters > IP Filters
Filters are used to deny or allow LAN (Local Area Network) computers from accessing
the Internet. The DI-524 can be setup to deny internal computers by their IP or MAC
addresses. The DI-524 can also block users from accessing restricted web sites.
IP Filters:
IP Filter is used to deny LAN IP addresses from accessing
the Internet. You can deny specific port numbers or all ports
for the specific IP address.
IP Address:
The IP address of the LAN computer that will be denied
access to the Internet.
Port Range:
The single port or port range that will be denied access to the
Internet.
Protocol Type:
Select the protocol type
Schedule:
This is the schedule of time when the IP Filter will be enabled.
23
Using the Configuration Menu (continued)
Advanced > Filters > URL Blocking
URL Blocking is used to deny LAN computers from accessing specific web sites by the
URL. A URL is a specially formatted text string that defines a location on the Internet.
If any part of the URL contains the blocked word, the site will not be accessible and
the web page will not display. To use this feature, enter the text string to be blocked
and click Apply. The text to be blocked will appear in the list. To delete the text, just
highlight it and click Delete.
Filters-
Select the filter you wish to use; in this case, URL Blocking
was chosen.
URL Blocking-
Select Enabled or Disabled.
Keywords-
Enter the keywords in this field. Block URLs which contain
keywords listed below.
24
Using the Configuration Menu (continued)
Advanced > Filters > MAC Filters
Use MAC (Media Access Control) Filters to allow or deny LAN (Local Area Network)
computers by their MAC addresses from accessing the Network. You can either manually
add a MAC address or select the MAC address from the list of clients that are currently
connected to the Broadband Router.
Filters-
Select the filter you wish to use; in this case, MAC filters was
chosen.
MAC Filters-
Choose Disable MAC filters; allow MAC addresses listed
below; or deny MAC addresses listed below.
Name-
Enter the name here.
MAC Address-
Enter the MAC Address.
DHCP Client-
Select a DHCP client from the pull-down list; click Clone to
copy that MAC Address.
25
Using the Configuration Menu (continued)
Advanced > Filters > Domain Blocking
Domain Blocking is used to allow or deny LAN (Local Area Network) computers from
accessing specific domains on the Internet. Domain blocking will deny all requests to
a specific domain such as http and ftp. It can also allow computers to access specific
sites and deny all other sites.
Filters-
Select the filter you wish to use; in this case, Domain Blocking was chosen.
Domain BlockingDisabledAllowDeny-
Select Disabled to disable Domain Blocking
Allows users to access all domains except Blocked Domains
Denies users access to all domains except
Permitted Domains
Blocked Domains- Enter the Blocked Domains in this field
Permitted
Domains-
Enter the Permitted Domains in this field
26
Using the Configuration Menu (continued)
Advanced > Firewall
Firewall Rules is an advanced feature used to deny or allow traffic from passing
through the DI-524. It works in the same way as IP Filters with additional settings. You
can create more detailed access rules for the DI-524. When virtual services are created
and enabled, it will also display in Firewall Rules. Firewall Rules contain all network
firewall rules pertaining to IP (Internet Protocol).
In the Firewall Rules List at the bottom of the screen, the priorities of the rules are from
top (highest priority) to bottom (lowest priority.)
Note:
The DI-524 MAC Address filtering rules have precedence over the Firewall Rules.
Firewall RulesName-
Enable or disable the Firewall
Action-
Allow or Deny
Source-
Enter the IP Address range
Destination-
Enter the IP Address range; the Protocol;
and the Port Range
Schedule-
Select Always or enter the Time Range.
Enter the name
27
Using the Configuration Menu (continued)
Advanced > DDNS
Users who have a Dynamic DDNS account may use this feature on the DI-524.
Provider-
Select from the list of DDNS servers available.
Host Name-
Enter your DDNS account host name.
Username/Email-
Enter your DDNS account username.
Password/Key-
Enter your DDNS account password.
28
Using the Configuration Menu (continued)
Advanced > DMZ
If you have a client PC that cannot run Internet applications properly from behind the DI524, then you can set the client up for unrestricted Internet access. It allows a computer
to be exposed to the Internet. This feature is useful for gaming purposes. Enter the IP
address of the internal computer that will be the DMZ host. Adding a client to the DMZ
(Demilitarized Zone) may expose your local network to a variety of security risks, so
only use this option as a last resort.
DMZ-
Enable or Disable the DMZ. The DMZ (Demilitarized Zone)
allows a single computer to be exposed to the internet. By
default the DMZ is disabled.
IP Address-
Enter the IP Address of the computer to be in the DMZ
29
Using the Configuration Menu (continued)
Advanced > Performance
Beacon Interval-
Beacons are packets sent by an Access Point to synchronize
a wireless network. Specify a value. 100 is the default setting
and is recommended.
RTS Threshold-
This value should remain at its default setting of 2432. If inconsistent data flow is a problem, only a minor modification should
be made.
The fragmentation threshold, which is specified in bytes, determines whether packets will be fragmented. Packets exceeding
the 2346 byte setting will be fragmented before transmission.2346 is the default setting
Fragmentation-
DTIM Interval-
(Delivery Traffic Indication Message) 3 is the default setting. A
DTIM is a countdown informing clients of the next window for
listening to broadcast and multicast messages.
Wireless Mode-
Select Short or Long Preamble. The Preamble defines the
length of the CRC block (Cyclic Redundancy Check is a common technique for detecting data transmission errors) for
communication between the wireless router and the roaming
wireless network adapters. Note: High network traffic areas
should use the shorter preamble type.
TX Rates-
Auto is the default selection. Selct from the drop down menu.
SSID Broadcast-
Choose Enabled to broadcast the SSID across the network.
All devices on a network must share the same SSID (Service
Set Identifier) to establish communication. Choose Disabled
if you do not wish to broadcast the SSID over the network.
30

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Fill forms, Extract, Assemble, Print high-res
Create Date                     : 2007:08:03 13:38:29+08:00
Creator                         : Adobe InDesign CS2 (4.0.4)
Modify Date                     : 2008:08:22 17:11:59+08:00
About                           : bf313837-3167-11da-929a-e18394d868a8
Producer                        : Adobe PDF Library 7.0
Trapped                         : False
Creation Date                   : 2007:08:03 13:38:29+08:00
Mod Date                        : 2008:08:22 17:11:59+08:00
Metadata Date                   : 2008:08:22 17:11:59+08:00
Creator Tool                    : Adobe InDesign CS2 (4.0.4)
Thumbnail Format                : JPEG
Thumbnail Width                 : 256
Thumbnail Height                : 256
Thumbnail Image                 : (Binary data 4804 bytes, use -b option to extract)
Document ID                     : adobe:docid:indd:a0711cfd-1bf7-11d9-99fd-c2314391268a
Instance ID                     : uuid:fef420ad-5bbe-4329-a9b1-85a65881d2bf
Rendition Class                 : proof:pdf
Derived From Instance ID        : a0711cfc-1bf7-11d9-99fd-c2314391268a
Derived From Document ID        : adobe:docid:indd:14de6317-1b63-11d9-a71b-89de299fac8f
Manifest Link Form              : ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream, ReferenceStream
Manifest Placed X Resolution    : 300.00, 72.00, 72.00, 72.00, 72.00, 300.00
Manifest Placed Y Resolution    : 300.00, 72.00, 72.00, 72.00, 72.00, 300.00
Manifest Placed Resolution Unit : Inches, Inches, Inches, Inches, Inches, Inches
Manifest Reference Instance ID  : uuid:D32410E0FE3FDC118683F47C1EE0249F
Manifest Reference Document ID  : uuid:D22410E0FE3FDC118683F47C1EE0249F, adobe:docid:photoshop:abb0fcf0-c664-11d6-af3f-848b6ec0aea5, adobe:docid:photoshop:974db314-c664-11d6-af3f-848b6ec0aea5, adobe:docid:photoshop:974db312-c664-11d6-af3f-848b6ec0aea5, adobe:docid:photoshop:974db313-c664-11d6-af3f-848b6ec0aea5, adobe:docid:photoshop:bd845e25-3162-11da-a271-d081ac36f64f
Format                          : application/pdf
Page Count                      : 10
Has XFA                         : No
EXIF Metadata provided by EXIF.tools
FCC ID Filing: KA2DI524G2

Navigation menu