D Link DI624MA1 802.11g WLAN Mini-PCI Module User Manual 1

D Link Corporation 802.11g WLAN Mini-PCI Module 1

Contents

User Manual 2 of 2 for Access Poiint

Download: D Link DI624MA1 802.11g WLAN Mini-PCI Module User Manual 1
Mirror Download [FCC.gov]D Link DI624MA1 802.11g WLAN Mini-PCI Module User Manual 1
Document ID503696
Application IDTvUbvY+r7XEahc4aqw3lOg==
Document DescriptionUser Manual 2 of 2 for Access Poiint
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize85.02kB (1062740 bits)
Date Submitted2005-01-05 00:00:00
Date Available2005-01-05 00:00:00
Creation Date2005-01-05 18:32:06
Producing SoftwareAdobe PDF Library 6.0
Document Lastmod2005-01-05 18:32:29
Document TitleUntitled-1
Document CreatorAdobe InDesign CS (3.0)

DI-624M User’s Manual
Frequently Asked Questions
8 How do I open a range of ports on my DI-624M using
Firewall rules?
Step 1: Access the router’s Web configuration by entering the router’s IP Address in
your Web browser. The default IP Address is 192.168.0.1. Login using your password.
The default username is “admin” and the password is blank.
If you are having difficulty accessing Web management, please see the first question
in this section.
Step 2: From the Web management Home page, click the Advanced tab then click
the Firewall button.
Step 3: Click on Enabled and type in a name for the new rule.
Step 4: Choose WAN as the Source and enter a range of IP Addresses out on the
internet that you would like this rule applied to. If you would like this rule to allow all
internet users to be able to access these ports, then put an Asterisk in the first box
and leave the second box empty.
Step 5: Select LAN as the Destination and enter the IP Address of the computer on
your local network that you want to allow the incoming service to. This will not work
with a range of IP Addresses.
D-Link Systems, Inc.
91
Frequently Asked Questions
DI-624M User’s Manual
Step 6: Enter the port or range of ports that are required to be open for the incoming
service.
Step 7: Click Apply and then click Continue.
Note: Make sure DMZ host is disabled.
Because our routers use NAT (Network Address Translation), you can only open a
specific port to one computer at a time. For example: If you have 2 web servers on
your network, you cannot open port 80 to both computers. You will need to configure 1
of the web servers to use port 81. Now you can open port 80 to the first computer and
then open port 81 to the other computer.
9 What are virtual servers?
A Virtual Server is defined as a service port, and all requests to this port will be redirected
to the computer specified by the server IP. For example, if you have an FTP Server
(port 21) at 192.168.0.5, a Web server (port 80) at 192.168.0.6, and a VPN server at
192.168.0.7, then you need to specify the following virtual server mapping table:
Server IP
Enable
21
192.168.0.5
80
192.168.0.6
1723
192.168.0.7
Server Port
10 How do I use PC Anywhere with my DI-624M
router?
You will need to open 3 ports in the Virtual Server section of your D-Link router.
Step 1: Open your web browser and enter the IP Address of the router
(192.168.0.1).
D-Link Systems, Inc.
92
DI-624M User’s Manual
Frequently Asked Questions
Step 3: Enter the information as seen below. The Private IP is the IP Address of the
computer on your local network that you want to connect to.
Step 4: The first entry will read as shown above.
Step 5: Click Apply and then click Continue.
Step 6: Create a second entry as shown below:
D-Link Systems, Inc.
93
DI-624M User’s Manual
Frequently Asked Questions
Step 7: Click Apply and then click Continue.
Step 8: Create a third and final entry as shown below:
Step 9: Click Apply and then click Continue.
Step 10: Run PCAnywhere from the remote site and use the WAN IP Address of the
router, not your computer´s IP Address.
11 How can I use eDonkey behind my D-Link
Router?
You must open ports on your router to allow incoming traffic while using eDonkey.
eDonkey uses three ports (4 if using CLI):
4661 (TCP) To connect with a server
4662 (TCP) To connect with other clients
4665 (UDP) To communicate with servers other than the one you are connected to.
4663 (TCP) *Used with the command line (CLI) client when it is configured to allow
remote connections. This is the case when using a Graphical Interface (such as the
Java Interface) with the client.
Step 1: Open your web browser and enter the IP Address of your router (192.168.0.1).
Enter username (admin) and your password (leave blank).
D-Link Systems, Inc.
94
DI-624M User’s Manual
Frequently Asked Questions
Step 2: Click on Advanced and then click Firewall.
Step 3: Create a new firewall rule:
Click Enabled. Enter a name (edonkey). Click Allow. Next to Source, select WAN
under interface. In the first box, enter an *. Leave the second box empty. Next to
Destination, select LAN under interface. Enter the IP Address of the computer you are
running eDonkey from. Leave the second box empty. Under Protocol, select *. In the
port range boxes, enter 4661 in the first box and then 4665 in the second box. Click
Always or set a schedule.
Step 4: Click Apply and then Continue.
12 How do I set up my router for SOCOM on my
Playstation 2?
To allow you to play SOCOM and hear audio, you must download the latest firmware
for the router (if needed), enable Game Mode, and open port 6869 to the IP Address
of your Playstation.
Step 1: Upgrade firmware (follow link above).
D-Link Systems, Inc.
95
Frequently Asked Questions
DI-624M User’s Manual
Step 2: Open your web browser and enter the IP Address of the router (192.168.0.1).
Enter username (admin) and your password (blank by default).
Step 3: Click on the Advanced tab and then click on Virtual Server on the left side.
socom
192.168.0.100
Both
6869
6869
Step 4: You will now create a new Virtual Server entry. Click Enabled and enter a name
(socom). Enter the IP Address of your Playstation for Private IP.
Step 5: For Protocol Type select Both. Enter 6869 for both the Private Port and Public
Port. Click Always. Click Apply to save changes and then Continue.
Step 6: Click on the Tools tab and then Misc on the left side.
Step 7: Make sure Gaming Mode is Enabled. If not, click Enabled. Click Apply and
then Continue.
13 How can I use Gamespy behind my D-Link
router?
Step 1: Open your web browser and enter the IP Address of the router (192.168.0.1).
Enter admin for the username and your password (blank by default).
D-Link Systems, Inc.
96
Frequently Asked Questions
DI-624M User’s Manual
gamespy1
192.168.0.100
Both
3783
3783
Step 3: You will create 2 entries.
Step 4: Click Enabled and enter Settings:
NAME - Gamespy1
PRIVATE IP - The IP Address of your computer that you are running Gamespy from.
PROTOCOL TYPE - Both
PRIVATE PORT - 3783
PUBLIC PORT - 3783
SCHEDULE - Always.
Click Apply and then continue..
D-Link Systems, Inc.
97
Frequently Asked Questions
DI-624M User’s Manual
gamespy2
192.168.0.100
Both
6500
6500
Step 5: Enter 2nd entry:
Click Enabled.
Enter the following information:
NAME - Gamespy2
PRIVATE IP - The IP Address of your computer that you are running Gamespy from.
PROTOCOL TYPE - Both
PRIVATE PORT - 6500
PUBLIC PORT - 6500
SCHEDULE - Always.
Click Apply and then continue.
D-Link Systems, Inc.
98
DI-624M User’s Manual
Frequently Asked Questions
14 How do I configure my router for KaZaA and
Grokster?
The following is for KaZaA, Grokster, and others using the FastTrack P2P file sharing
system.
In most cases, you do not have to configure anything on the router or on the Kazaa
software. If you are having problems, please follow steps below:
Step 1: Enter the IP Address of your router in a web browser (192.168.0.1).
Step 2: Enter your username (admin) and your password (blank by default).
Step 3: Click on Advanced and then click Virtual Server.
Step 4: Click Enabled and then enter a Name (kazaa for example).
Step 5: Enter the IP Address of the computer you are running KaZaA from in the Private
IP box. Select TCP for the Protocol Type.
Step 6: Enter 1214 in the Private and Public Port boxes. Click Always under schedule
or set a time range. Click Apply.
Make sure that you did not enable proxy/firewall in the KaZaA software.
D-Link Systems, Inc.
99
Frequently Asked Questions
DI-624M User’s Manual
15 How do I configure my router to play Warcraft 3?
You must open ports on your router to allow incoming traffic while hosting a game in
Warcraft 3. To play a game, you do not have to configure your router.
Warcraft 3 (Battlenet) uses port 6112.
Step 1: Open your web browser and enter the IP Address of your router (192.168.0.1).
Enter username (admin) and your password (leave blank).
Step 2: Click on Advanced and then click Virtual Server.
Step 3: Create a new entry: Click Enabled. Enter a name (warcraft3). Private IP - Enter
the IP Address of the computer you want to host the game. Select Both for Protocol
Type Enter 6112 for both Private Port and Public Port Click Always or set a schedule.
warcraft3
192.168.0.100
Both
6112
6112
Step 4 Click Apply and then Continue.
Note: If you want multiple computers from you LAN to play in the same game that
you are hosting, then repeat the steps above and enter the IP Addresses of the other
computers. You will need to change ports. Computer #2 can use port 6113, computer
#3 can use 6114, and so on.
D-Link Systems, Inc.
100
DI-624M User’s Manual
Frequently Asked Questions
You will need to change the port information within the Warcraft 3 software for computers
#2 and up.
Configure the Game Port information on each computer:
Start Warcraft 3 on each computer, click Options > Gameplay. Scroll down and you
should see Game Port. Enter the port number as you entered in the above steps.
16 How do I use NetMeeting with my D-Link Router?
Unlike most TCP/IP applications, NetMeeting uses DYNAMIC PORTS instead of STATIC
PORTS. That means that each NetMeeting connection is somewhat different than the
last. For instance, the HTTP web site application uses port 80. NetMeeting can use
any of over 60,000 different ports.
All broadband routers using (only) standard NAT and all internet sharing programs like
Microsoft ICS that use (only) standard NAT will NOT work with NetMeeting or other
h.323 software packages.
The solution is to put the router in DMZ.
Note: A few hardware manufacturers have taken it on themselves to actually provide
H.323 compatibility. This is not an easy task since the router must search each incoming
packet for signs that it might be a netmeeting packet. This is a whole lot more work
than a router normally does and may actually be a weak point in the firewall. D-Link
is not one of the manufacturers.
To read more on this visit http://www.HomenetHelp.com.
17 How do I set up my router to use iChat? -for
Macintosh usersYou must open ports on your router to allow incoming traffic while using iChat.
iChat uses the following ports: 5060 (UDP) 5190 (TCP) File Sharing 16384-16403
(UDP) To video conference with other clients.
Step 1: Open your web browser and enter the IP Address of your router (192.168.0.1).
Enter username (admin) and your password (leave blank).
Step 2: Click on Advanced and then click Firewall.
Step 3: Create a new firewall rule:
Click Enabled.
Enter a name (ichat1).
Click Allow.
D-Link Systems, Inc.
101
Frequently Asked Questions
DI-624M User’s Manual
Next to Source, select WAN under interface.
In the first box, enter an *.
Leave the second box empty.
Next to Destination, select LAN under interface.
Enter the IP Address of the computer you are running iChat from.
Leave the second box empty. Under Protocol, select UDP. In the port range boxes,
enter 5060 in the first box and leave the second box empty.
Click Always or set a schedule.
ichat1
D-Link Systems, Inc.
WAN
LAN
192.168.0.100
UDP
5060
102
Frequently Asked Questions
DI-624M User’s Manual
Step 4: Click Apply and then Continue.
Step 5: Repeat steps 3 and 4 enter ichat2 and open ports 16384-16403 (UDP).
ichat2
WAN
LAN
192.168.0.100
UDP
16384
16403
For File Sharing:
Step 1: Click on Advanced and then Virtual Server.
Step 2: Check Enabled to activate entry.
Step 3: Enter a name for your virtual server entry (ichat3).
Step 4: Next to Private IP, enter the IP Address of the computer on your local network
that you want to allow the incoming service to.
Step 5: Select TCP for Protocol Type.
Step 6: Enter 5190 next to Private Port and Public Port.
Step 7: Click Always or configure a schedule.
Ste p
D-Link Systems, Inc.
8 :
C l i c k
A p p l y
a n d
t h e n
C o n t inue .
103
Frequently Asked Questions
DI-624M User’s Manual
ichat3
192.168.0.100
5190
5190
If using Mac OS X Firewall, you may need to temporarily turn off the firewall in the
Sharing preference pane on both computers.
To use the Mac OS X Firewall, you must open the same ports as in the router:
Step 1: Choose Apple menu > System Preferences.
Step 2: Choose View > Sharing.
Step 3: Click the Firewall tab.
Step 4: Click New.
Step 5: Choose Other from the Port Name pop-up menu.
Step 6: In the Port Number, Range or Series field, type in: 5060, 16384-16403.
Step 7: In the Description field type in: iChat AV
Step 8: Click OK.
D-Link Systems, Inc.
104
DI-624M User’s Manual
Frequently Asked Questions
17 How do I send or receive a file via iChat when the
Mac OSX firewall is active? -for Macintosh users- Mac
OS X 10.2 and later
The following information is from the online Macintosh AppleCare knowledge base:
“iChat cannot send or receive a file when the Mac OS X firewall is active in its default
state. If you have opened the AIM port, you may be able to receive a file but not send
them.
In its default state, the Mac OS X firewall blocks file transfers using iChat or America
Online AIM software. If either the sender or receiver has turned on the Mac OS X
firewall, the transfer may be blocked.
The simplest workaround is to temporarily turn off the firewall in the Sharing preference
pane on both computers. This is required for the sender. However, the receiver may
keep the firewall on if the AIM port is open. To open the AIM port:
Step 1: Choose Apple menu > System Preferences.
Step 2: Choose View > Sharing.
Step 3: Click the Firewall tab.
Step 4: Click New.
Step 5: Choose AOL IM from the Port Name pop-up menu. The number 5190 should
already be filled in for you.
Step 6: Click OK.
If you do not want to turn off the firewall at the sending computer, a different file sharing
service may be used instead of iChat. The types of file sharing available in Mac OS X
are outlined in technical document 106461, “Mac OS X: File Sharing” in the AppleCare
Knowledge base online.
Note: If you use a file sharing service when the firewall is turned on, be sure to click
the Firewall tab and select the service you have chosen in the “Allow” list. If you do not
do this, the firewall will also block the file sharing service.
D-Link Systems, Inc.
105
DI-624M User’s Manual
Frequently Asked Questions
18 What is NAT?
NAT stands for Network Address Translator. It is proposed and described in RFC1631 and is used for solving the IP Address depletion problem. Basically, each NAT box
has a table consisting of pairs of local IP Addresses and globally unique addresses, by
which the box can “translate” the local IP Addresses to global address and vice versa.
Simply put, it is a method of connecting multiple computers to the Internet (or any other
IP network) using one IP Address.
D-Link´s broadband routers (ie: DI-624M) support NAT. With proper configuration,
multiple users can access the Internet using a single account via the NAT device.
For more information on RFC-1631: The IP Network Address Translator (NAT), visit
http://www.faqs.org/rfcs/rfc1631.html.
D-Link Systems, Inc.
106
Appendix
DI-624M User’s Manual
Appendix
Securing Your Network
1. Change Admin Password
Changing the password to access your new router is the first step in securing your
network. This can done through the Wizard or on the Admin Page of the Tools tab.
There is no password by default and hackers will know this when trying to access
your network. Make sure that the password you choose is not commonly known or
something that is easy to guess such as your last name or your pet’s name. Try using
a combination of letters and numbers to deter intruders from hacking into your network.
Your private information should be kept private.
2. Disable DHCP and use Static IP addresses or Use Static DHCP and limit
scope to the amount of users on your network.
In the event that an intruder manages to gain access to your network, having DHCP
enabled makes it easier for the intruder to access other computers on your network.
There are two methods for getting around this. One is to disable DHCP and use static
IP addressing on all the devices connected to your network. This would mean that the
intruder would have to know what IP network your devices are on in order to access
them. The second way is to change the scope of the DHCP server to only include
enough IP addresses for the devices in your network. You can then use the Static
DHCP feature of the router to assign an IP address to each device on your network.
Static DHCP still dynamically assigns an IP address to your network devices but only
allows for those defined devices to obtain an IP address.
3. Change the default LAN IP address
Change the default LAN IP address from 192.168.0.1 to an alternate IP address. There
are 3 ranges of IP addresses that have been reserved for use on Private Networks.
10.0.0.0
10.255.255.255 (10.0.0.0/8)
172.16.0.0 -
172.31.255.255 (172.16.0.0/12)
192.168.0.0 -
192.168.255.255 (192.168.0.0/16)
D-Link routers use 192.168.0.1 as their default LAN IP address. Choosing an alternate
IP address lessens the probabilty of an intruders knowing what IP network your devices
are on.
4. Set up MAC Filtering
Each networking device (router, network card, etc) on a network contains a unique
hexadecimal number that identifies that specific product. This number is referred to as
a MAC address. MAC filtering allows you to create a list of the MAC address of each
device on your network and only allows these specific devices to associate with your
network. With this feature enabled, devices attempting to connect to your network with
a MAC address that is not in the list you created, will be denied access.
D-Link Systems, Inc.
107
DI-624M User’s Manual
Appendix
Glossary
Access Control List - ACL. Database of network devices that are allowed to access resources on the
network.
Access Point - AP. Device that allows wireless clients to connect to it and access the network
Ad-hoc network - Peer-to-Peer network between wireless clients
Address Resolution Protocol - ARP. Used to map MAC addresses to IP addresses so that conversions can
be made in both directions.
ADSL - Asymmetric Digital Subscriber Line
Advanced Encryption Standard - AES. Government encryption standard
Alphanumeric - Characters A-Z and 0-9
Antenna - Used to transmit and receive RF signals.
AppleTalk – A set of Local Area Network protocols developed by Apple for their computer systems
AppleTalk Address Resolution Protocol – AARP. Used to map the MAC addresses of Apple computers to
their AppleTalk network addresses, so that conversions can be made in both directions.
Application layer - 7th Layer of the OSI model. Provides services to applications to ensure that they can
communicate properly with other applications on a network.
ASCII - American Standard Code for Information Interchange. This system of characters is most commonly
used for text files
Attenuation – The loss in strength of digital an analog signals. The loss is greater when the signal is being
transmitted over long distances.
Authentication –To provide credentials, like a Password, in order to verify that the person or device is really
who they are claiming to be
Automatic Private IP Addressing - APIPA. An IP address that a Windows computer will assign itself when it
is configured to obtain an IP address automatically but no DHCP server is available on the network
Backward Compatible - The ability for new devices to communicate and interact with older legacy devices
to guarantee interoperability
Bandwidth - The maximum amount of bytes or bits per second that can be transmitted to and from a network
device
Basic Input/Output System – BIOS. A program that the processor of a computer uses to startup the system
once it is turned on
Baud – Data transmission speed
Bit rate – The amount of bits that pass in given amount of time
bit/sec – bits per second
BOOTP – Bootstrap Protocol. Allows for computers to be booted up and given an IP address with no user
intervention
Bottleneck – A time during processes when something causes the process to slowdown or stop all together
Broadband – A wide band of frequencies available for transmitting data
D-Link Systems, Inc.
108
DI-624M User’s Manual
Appendix
Broadcast – Transmitting data in all directions at once
Browser – A program that allows you to access resources on the web and provides them to you graphically
Cable modem – A device that allows you to connect a computer up to a coaxial cable and receive Internet
access from your Cable provider
CardBus – A newer version of the PC Card or PCMCIA interface. It supports a 32-bit data path, DMA, and
consumes less voltage
Carrier Sense Multiple Access/Collision Avoidance – CSMA/CA
Carrier Sense Multiple Access/Collision Detect – CSMA/CD
CAT 5 – Category 5. Used for 10/100 Mbps or 1Gbps Ethernet connections
Client – A program or user that requests data from a server
Collision – When do two devices on the same Ethernet network try and transmit data at the exact same
time.
Cookie – Information that is stored on the hard drive of your computer that holds your preferences to the site
that gave your computer the cookie
CSMA/CA – Carrier Sense Multiple Access/Collision Avoidance
CSMA/CD – Carrier Sense Multiple Access/Collision Detection
Data – Information that has been translated into binary do that it can be processed or moved to another
device
Data Encryption Standard – Uses a randomly selected 56-bit key that must be known by both the sender and
the receiver when information is exchanged
Data-Link layer – The second layer of the OSI model. Controls the movement of data on the physical link of
a network
Database – Organizes information so that it can be managed updated, as well as easily accessed by users
or applications
DB-25 – A 25 ping male connector for attaching External modems or RS-232 serial devices
DB-9 – A 9 pin connector for RS-232 connections
dBd - decibels related to dipole antenna
dBi - decibels relative to isotropic radiator
dBm - decibels relative to one milliwatt
Decrypt – To unscramble an encrypted message back into plain text
Default – A predetermined value or setting that is used by a program when no user input has been entered
for this value or setting
Demilitarized zone – DMZ. A single computer or group of computers that can be accessed by both users on
the Internet as well as users on the Local Network, but that is not protected by the same security as the Local
Network.
DHCP – Dynamic Host Configuration Protocol. Used to automatically assign IP addresses from a predefined
pool of addresses to computers or devices that requests them
Digital certificate – An electronic method of providing credentials to a server in order to have access to it or
a network
D-Link Systems, Inc.
109
DI-624M User’s Manual
Appendix
Direct Sequence Spread Spectrum – DSSS. Modulation technique used by 802.11b wireless devices
DNS – Domain Name System. Translates Domain Names to IP addresses
DOCSIS – Data Over Cable Service Interface Specifications. The standard interface for cable modems
Domain name – A name that is associated with an IP address
Download – To send a request from one computer to another and have the file transmitted back to the
requesting computer
DSL – Digital Subscriber Line. High bandwidth Internet connection over telephone lines
Duplex – Sending and Receiving data transmissions at the sane time
Dynamic DNS service – DDNS is provided by companies to allow users with Dynamic IP addresses to obtain
a Domain Name that will always by linked to their changing IP address. The IP address is updated by either
client software running on a computer or by a router that supports DDNS, whenever the IP address changes.
Dynamic IP address – IP address that is assigned by a DHCP server and that may change. Cable Internet
providers usually use this method to assign IP addresses to their customers.
EAP – Extensible Authentication Protocol
Email – Electronic Mail is a computer-stored message that is transmitted over the Internet
Encryption – Converting data into cyphertext so that it cannot be easily read
Enterprise – Large organizations that use computers
Ethernet – The most widely used technology for Local Area Networks.
Fiber optic – A way of sending data through light impulses over glass or plastic wire or fiber
File server – A computer on a network that stores data so that the other computers on the network can all
access it
File sharing – Allowing data from computers on a network to be accessed by other computers on the network
will different levels of access rights
Firewall – A device that protects resources of the Local Area Network from unauthorized users outside of the
local network
Firmware – Programming that is inserted into a hardware device that tells it how to function
Fragmentation – Breaking up data into smaller pieces to make it easier to store
FTP – File Transfer Protocol. Easiest way to transfer files between computers on the Internet
Full-duplex – Sending and Receiving data at the same time
Gain – The amount an amplifier boosts the wireless signal
Gateway – A device that connects your network to another, like the internet
Gbps – Gigabits per second
Gigabit Ethernet – Transmission technology that provides a data rate of 1 billion bits per second
Graphical user interface – GUI
D-Link Systems, Inc.
110
DI-624M User’s Manual
Appendix
H.323 – A standard that provides consistency of voice and video transmissions and compatibility for
videoconferencing devices
Half-duplex – Data cannot be transmitted and received at the same time
Hashing – Transforming a string of characters into a shorter string with a predefined length
Hexadecimal – Characters 0-9 and A-F
HomePNA – Networking over telephone lines
HomeRF – Networking standard that combines 802.11b and DECT (digital Enhanced Cordless
Telecommunication) that provides speeds up to 1.6 Mbps and a distance of 150 ft using a Frequency Hopping
transmission method
Hop – The action of data packets being transmitted from one router to another
Host – Computer on a network
HTTP – Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HTTP clients
(web browsers)
HTTPS – HTTP over SSL is used to encrypt and decrypt HTTP transmissions
Hub – A networking device that connects multiple devices together
ICMP – Internet Control Message Protocol
IEEE – Institute of Electrical and Electronics Engineers
IETF – Internet Engineering Task Force
IGMP – Internet Group Management Protocol is used to make sure that computers can report their multicast
group membership to adjacent routers
IIS – Internet Information Server is a WEB server and FTP server provided by Microsoft
IKE – Internet Key Exchange is used to ensure security for VPN connections
Infrastructure – In terms of a wireless network, this is when wireless clients use an Access Point to gain
access to the network
Internet – A system of worldwide networks which use TCP/IP to allow for resources to be accessed from
computers around the world
Internet Explorer – A World Wide Web browser created and provided by Microsoft
Internet Protocol – The method of transferring data from one computer to another on the Internet
Internet Protocol Security – IPsec provides security at the packet processing layer of network
communication
Internet Service Provider – An ISP provides access to the Internet to individuals or companies
Interoperability – The ability for products to interact with other products without much customer interaction
Intranet – A private network
Intrusion Detection – A type of security that scans a network to detect attacks coming from inside and outside
of the network
IP – Internet Protocol
IP address – A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer
that transmits data on the Internet or on an Intranet
D-Link Systems, Inc.
111
DI-624M User’s Manual
Appendix
IPsec – Internet Protocol Security
IPv6 – Internet Protocol Version 6 uses 128-bit addresses and was developed to solve the problem that we
face of running our of IP version 4 addresses
IPX – Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware
clients and servers to communicate
ISP – Internet Service Provider
Java – A programming language used to create programs and applets for web pages
Kbps – Kilobits per second
Kbyte - Kilobyte
Kerberos – A method of securing and authenticating requests for services on a network
LAN – Local Area Network
Latency – The amount of time that it takes a packet to get from the one point to another on a network. Also
referred to as delay
LED - Light Emitting Diode
Legacy – Older devices or technology
Local Area Network – A group of computers in a building that usually access files from a server
MAC address – A unique hardware address for devices on a Local Area Network
MDI – Medium Dependent Interface is an Ethernet port for a connection to a straight-through cable
MDIX - Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable
Megabit - Mb
Megabyte - MB
Megabits per second - Mbps
MIB – Management Information Base is a set of objects that can be managed by using SNMP
Modem – A device that Modulates digital signals from a computer to an analog signal in order to transmit the
signal over phone lines. It also Demodulates the analog signals coming from the phone lines to digital signals
for your computer
MPPE – Microsoft Point-to-Point Encryption is used to secure data transmissions over PPTP connections
MTU – Maximum Transmission Unit is the largest packet that can be transmitted on a packet-based network
like the Internet
Multicast – Sending data from one device to many devices on a network
D-Link Systems, Inc.
112
DI-624M User’s Manual
Appendix
NAT – Network Address Translation allows many private IP addresses to connect to the Internet, or another
network, through one IP address
NetBEUI – NetBIOS Extended User Interface is a Local Area Network communication protocol. This is an
updated version of NetBIOS
NetBIOS – Network Basic Input/Output System
Netmask – Determines what portion of an IP address designates the Network and which part designates the
Host
NetWare – A Server Software developed by Novell
Network Interface Card – A card installed in a computer or built onto the motherboard that allows the computer
to connect to a network
Network later – The third layer of the OSI model which handles the routing of traffic on a network
Network Time Protocol – Used to synchronize the time of all the computers in a network
NIC – Network Interface Card
NTP – Network Time Protocol
OFDM – Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and
802.11g
OSI – Open Systems Interconnection is the reference model for how data should travel between two devices
on a network
OSPF – Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks
because only changes to the routing table are sent to all the other routers in the network as opposed to sending
the entire routing table at a regular interval, which is how RIP functions
Password - A sequence of characters that is used to authenticate requests to resources on a network
Personal Area Network – The interconnection of networking devices within a range of 10 meters
Physical layer – The first layer of the OSI model. Provides the hardware means of transmitting electrical
signals on a data carrier
PoE – Power over Ethernet is the means of transmitting electricity over the unused pairs in a category 5
Ethernet cable
POP 3 – Post Office Protocol 3 is used for receiving email
PPP – Point-to-Point Protocol is used for two computers to communicate with each over a serial interface, like
a phone line
PPPoE – Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote server over
Ethernet
PPTP – Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two
networks
Preamble – Used to synchronize communication timing between devices on a network
D-Link Systems, Inc.
113
DI-624M User’s Manual
Appendix
QoS – Quality of Service
RADIUS – Remote Authentication Dial-In User Service allows for remote users to dial into a central server and
be authenticated in order to access resources on a network
Rendezvous – Apple’s version of UPnP, which allows for devices on a network to discover each other and be
connected without the need to configure any settings
Repeater – Retransmits the signal of an Access Point in order to extend it’s coverage
RIP – Routing Information Protocol is used to synchronize the routing table of all the routers on a network
RJ-11 – The most commonly used connection method for telephones
RJ-45 - The most commonly used connection method for Ethernet
RS-232C – The interface for serial communication between computers and other related devices
RSA – Algorithm used for encryption and authentication
Samba – A freeware program that allows for resources to be shared on a network. Mainly used in Unix based
Operating Systems
Server – A computer on a network that provides services and resources to other computers on the network
Session key – An encryption and decryption key that is generated for every communication session between
two computers
Session layer – The fifth layer of the OSI model which coordinates the connection and communication between
applications on both ends
Simple Mail Transfer Protocol – Used for sending and receiving email
Simple Network Management Protocol – Governs the management and monitoring of network devices
SMTP – Simple Mail Transfer Protocol
SNMP – Simple Network Management Protocol
SOHO – Small Office/Home Office
SPI – Stateful Packet Inspection
SSH – Secure Shell is a command line interface that allows for secure connections to remote computers
SSID – Service Set Identifier is a name for a wireless network
Stateful inspection – A feature of a firewall that monitors outgoing and incoming traffic to make sure that only
valid responses to outgoing requests for incoming packets are allowed to pass though the firewall
Subnet mask – Determines what portion of an IP address designates the Network and which part designates
the Host
TCP – Transmission Control Protocol
TCP/IP – Transmission Control Protocol/Internet Protocol
TFTP – Trivial File Transfer Protocol is a utility used for transferring files that is simpler to use than FTP but
with less features
D-Link Systems, Inc.
114
DI-624M User’s Manual
Appendix
Throughput – The amount of data that can be transferred in a given time period
Traceroute – A utility displays the routes between you computer and specific destination
UDP – User Datagram Protocol
UNC – Universal Naming Convention allows for shares on computers to be identified without having to know
what storage device it’s on
Unicast – Communication between a single sender and receiver
Universal Plug and Play – A standard that allows network devices to discover each other and configure
themselves to be a part of the network
UPnP – Universal Plug and Play
URL – Uniform Resource Locator is a unique address for files accessible on the Internet
UTP – Unshielded Twisted Pair
Virtual LAN Virtual Private Network – A secure tunnel over the Internet to connect remote offices or users to their company’s
network
VLAN – Virtual LAN
Voice over IP – Sending voice information over the Internet as opposed to the PSTN
VoIP – Voice over IP
Wake on LAN – Allows you to power up a computer though it’s Network Interface Card
WAN – Wide Area Network
Web browser – A utility that allows you to view content and interact will all of the information on the World
Wide Web
WEP – Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that
of a wired network
Wi-Fi – Wireless Fidelity
Wi-Fi Protected Access – An updated version of security for wireless networks that provides authentication
as well as encryption
Wide Area Network - A network spanning a large geographical area or consisting of more than one LAN.
Wireless ISP – A company that provides a broadband Internet connection over a wireless connection
Wireless LAN – Connecting to a Local Area Network over one of the 802.11 wireless standards
WISP – Wireless Internet Service Provider
WLAN – Wireless Local Area Network
Yagi antenna – A directional antenna used to concentrate wireless signals on a specific location
D-Link Systems, Inc.
115
DI-624M User’s Manual
Contacting Technical Support
Contacting Technical Support
You can find software updates and user documentation on the D-Link website.
D-Link provides free technical support for customers within the United States and within
Canada for the duration of the warranty period on this product.
U.S. and Canadian customers can contact D-Link technical support through our web
site, or by phone.
Tech Support for customers within the United States:
D-Link Technical Support over the Telephone:
(877) 453-5465
24 hours a day, seven days a week.
D-Link Technical Support over the Internet:
http://support.dlink.com
email:support@dlink.com
Tech Support for customers within Canada:
D-Link Technical Support over the Telephone:
(800) 361-5265
Monday to Friday 8:30am to 9:00pm EST
D-Link Technical Support over the Internet:
http://support.dlink.ca
email:support@dlink.ca
When contacting technical support, please provide the following information:
·
Serial number of the unit
·
Model number or product name
·
Software type and version number
D-Link Systems, Inc.
116
DI-624M User’s Manual
Getting Started
Warranty
Subject to the terms and conditions set forth herein, D-Link Systems, Inc. (“D-Link”) provides this Limited
warranty for its product only to the person or entity that originally purchased the product from:
·
D-Link or its authorized reseller or distributor and
·
Products purchased and delivered within the fifty states of the United States, the District of Columbia,
U.S. Possessions or Protectorates, U.S. Military Installations, addresses with an APO or FPO.
Limited Warranty: D-Link warrants that the hardware portion of the D-Link products described below
will be free from material defects in workmanship and materials from the date of original retail purchase
of the product, for the period set forth below applicable to the product type (“Warranty Period”), except
as otherwise stated herein.
1-Year Limited Warranty for the Product(s) is defined as follows:
·
Hardware (excluding power supplies and fans) One (1) Year
·
Power Supplies and Fans One (1) Year
·
Spare parts and spare kits Ninety (90) days
D-Link’s sole obligation shall be to repair or replace the defective Hardware during the Warranty Period
at no charge to the original owner or to refund at D-Link’s sole discretion. Such repair or replacement
will be rendered by D-Link at an Authorized D-Link Service Office. The replacement Hardware need not
be new or have an identical make, model or part. D-Link may in its sole discretion replace the defective
Hardware (or any part thereof) with any reconditioned product that D-Link reasonably determines is
substantially equivalent (or superior) in all material respects to the defective Hardware. Repaired or
replacement Hardware will be warranted for the remainder of the original Warranty Period from the date
of original retail purchase. If a material defect is incapable of correction, or if D-Link determines in its
sole discretion that it is not practical to repair or replace the defective Hardware, the price paid by the
original purchaser for the defective Hardware will be refunded by D-Link upon return to D-Link of the
defective Hardware. All Hardware (or part thereof) that is replaced by D-Link, or for which the purchase
price is refunded, shall become the property of D-Link upon replacement or refund.
Limited Software Warranty: D-Link warrants that the software portion of the product (“Software”) will
substantially conform to D-Link’s then current functional specifications for the Software, as set forth in the
applicable documentation, from the date of original retail purchase of the Software for a period of ninety
(90) days (“Warranty Period”), provided that the Software is properly installed on approved hardware
and operated as contemplated in its documentation. D-Link further warrants that, during the Warranty
Period, the magnetic media on which D-Link delivers the Software will be free of physical defects. DLink’s sole obligation shall be to replace the non-conforming Software (or defective media) with software
that substantially conforms to D-Link’s functional specifications for the Software or to refund at D-Link’s
sole discretion. Except as otherwise agreed by D-Link in writing, the replacement Software is provided
only to the original licensee, and is subject to the terms and conditions of the license granted by D-Link
for the Software. Software will be warranted for the remainder of the original Warranty Period from the
date or original retail purchase. If a material non-conformance is incapable of correction, or if D-Link
determines in its sole discretion that it is not practical to replace the non-conforming Software, the price
paid by the original licensee for the non-conforming Software will be refunded by D-Link; provided that
the non-conforming Software (and all copies thereof) is first returned to D-Link. The license granted
respecting any Software for which a refund is given automatically terminates.
Non-Applicability of Warranty: The Limited Warranty provided hereunder for hardware and software
of D-Link’s products will not be applied to and does not cover any refurbished product and any product
purchased through the inventory clearance or liquidation sale or other sales in which D-Link, the sellers,
or the liquidators expressly disclaim their warranty obligation pertaining to the product and in that case,
the product is being sold “As-Is” without any warranty whatsoever including, without limitation, the Limited
D-Link Systems, Inc.
117
DI-624M User’s Manual
Warranty
Warranty as described herein, notwithstanding anything stated herein to the contrary.
Submitting A Claim: The customer shall return the product to the original purchase point based on
its return policy. In case the return policy period has expired and the product is within warranty, the
customer shall submit a claim to D-Link as outlined below:
·
The customer must submit with the product as part of the claim a written description of the Hardware
defect or Software nonconformance in sufficient detail to allow D-Link to confirm the same.
·
The original product owner must obtain a Return Material Authorization (“RMA”) number from the
Authorized D-Link Service Office and, if requested, provide written proof of purchase of the product (such
as a copy of the dated purchase invoice for the product) before the warranty service is provided.
·
After an RMA number is issued, the defective product must be packaged securely in the original or
other suitable shipping package to ensure that it will not be damaged in transit, and the RMA number
must be prominently marked on the outside of the package. Do not include any manuals or accessories
in the shipping package. D-Link will only replace the defective portion of the Product and will not ship
back any accessories.
·
The customer is responsible for all in-bound shipping charges to D-Link. No Cash on Delivery
(“COD”) is allowed. Products sent COD will either be rejected by D-Link or become the property of
D-Link. Products shall be fully insured by the customer. D-Link will not be held responsible for any
packages that are lost in transit to D-Link. The repaired or replaced packages will be shipped to the
customer via UPS Ground or any common carrier selected by D-Link, with shipping charges prepaid.
Expedited shipping is available if shipping charges are prepaid by the customer and upon request.
·
Return Merchandise Ship-To Address
USA: 17595 Mt. Herrmann, Fountain Valley, CA 92708
Canada: 2180 Winston Park Drive, Oakville, ON, L6H 5W1 (Visit http://www.dlink.ca for detailed warranty
information within Canada)
D-Link may reject or return any product that is not packaged and shipped in strict compliance with the
foregoing requirements, or for which an RMA number is not visible from the outside of the package. The
product owner agrees to pay D-Link’s reasonable handling and return shipping charges for any product
that is not packaged and shipped in accordance with the foregoing requirements, or that is determined
by D-Link not to be defective or non-conforming.
What Is Not Covered: This limited warranty provided by D-Link does not cover: Products, if in D-Link’s
judgment, have been subjected to abuse, accident, alteration, modification, tampering, negligence,
misuse, faulty installation, lack of reasonable care, repair or service in any way that is not contemplated
in the documentation for the product, or if the model or serial number has been altered, tampered with,
defaced or removed; Initial installation, installation and removal of the product for repair, and shipping
costs; Operational adjustments covered in the operating manual for the product, and normal maintenance;
Damage that occurs in shipment, due to act of God, failures due to power surge, and cosmetic damage;
Any hardware, software, firmware or other products or services provided by anyone other than D-Link;
Products that have been purchased from inventory clearance or liquidation sales or other sales in which
D-Link, the sellers, or the liquidators expressly disclaim their warranty obligation pertaining to the product.
Repair by anyone other than D-Link or an Authorized D-Link Service Office will void this Warranty.
Disclaimer of Other Warranties: EXCEPT FOR THE LIMITED WARRANTY SPECIFIED HEREIN,
THE PRODUCT IS PROVIDED “AS-IS” WITHOUT ANY WARRANTY OF ANY KIND WHATSOEVER
INCLUDING, WITHOUT LIMITATION, ANY WARRANTY OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE AND NON-INFRINGEMENT. IF ANY IMPLIED WARRANTY CANNOT BE
DISCLAIMED IN ANY TERRITORY WHERE A PRODUCT IS SOLD, THE DURATION OF SUCH IMPLIED
WARRANTY SHALL BE LIMITED TO NINETY (90) DAYS. EXCEPT AS EXPRESSLY COVERED UNDER
THE LIMITED WARRANTY PROVIDED HEREIN, THE ENTIRE RISK AS TO THE QUALITY, SELECTION
AND PERFORMANCE OF THE PRODUCT IS WITH THE PURCHASER OF THE PRODUCT.
D-Link Systems, Inc.
118
DI-624M User’s Manual
Warranty
Limitation of Liability: TO THE MAXIMUM EXTENT PERMITTED BY LAW, D-LINK IS NOT LIABLE
UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE
THEORY FOR ANY LOSS OF USE OF THE PRODUCT, INCONVENIENCE OR DAMAGES OF ANY
CHARACTER, WHETHER DIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL (INCLUDING,
BUT NOT LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, LOSS OF REVENUE OR PROFIT,
WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, FAILURE OF OTHER EQUIPMENT
OR COMPUTER PROGRAMS TO WHICH D-LINK’S PRODUCT IS CONNECTED WITH, LOSS OF
INFORMATION OR DATA CONTAINED IN, STORED ON, OR INTEGRATED WITH ANY PRODUCT
RETURNED TO D-LINK FOR WARRANTY SERVICE) RESULTING FROM THE USE OF THE
PRODUCT, RELATING TO WARRANTY SERVICE, OR ARISING OUT OF ANY BREACH OF THIS
LIMITED WARRANTY, EVEN IF D-LINK HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. THE SOLE REMEDY FOR A BREACH OF THE FOREGOING LIMITED WARRANTY IS
REPAIR, REPLACEMENT OR REFUND OF THE DEFECTIVE OR NON-CONFORMING PRODUCT.
THE MAXIMUM LIABILITY OF D-LINK UNDER THIS WARRANTY IS LIMITED TO THE PURCHASE
PRICE OF THE PRODUCT COVERED BY THE WARRANTY. THE FOREGOING EXPRESS WRITTEN
WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ANY OTHER WARRANTIES
OR REMEDIES, EXPRESS, IMPLIED OR STATUTORY.
Governing Law: This Limited Warranty shall be governed by the laws of the State of California. Some
states do not allow exclusion or limitation of incidental or consequential damages, or limitations on how
long an implied warranty lasts, so the foregoing limitations and exclusions may not apply. This limited
warranty provides specific legal rights and the product owner may also have other rights which vary
from state to state.
Trademarks: D-Link is a registered trademark of D-Link Systems, Inc. Other trademarks or registered
trademarks are the property of their respective manufacturers or owners.
Copyright Statement: No part of this publication or documentation accompanying this Product may
be reproduced in any form or by any means or used to make any derivative such as translation,
transformation, or adaptation without permission from D-Link Corporation/D-Link Systems, Inc.,
as stipulated by the United States Copyright Act of 1976. Contents are subject to change without
prior notice. Copyright© 2002 by D-Link Corporation/D-Link Systems, Inc. All rights reserved.
CE Mark Warning: This is a Class B product. In a domestic environment, this product may cause radio
interference, in which case the user may be required to take adequate measures.
FCC Statement: This equipment has been tested and found to comply with the limits for a Class
B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This equipment
generates, uses, and can radiate radio frequency energy and, if not installed and used in
accordance with the instructions, may cause harmful interference to radio communication.
However, there is no guarantee that interference will not occur in a particular installation. If
this equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
·
Reorient or relocate the receiving antenna.
·
Increase the separation between the equipment and receiver.
·
Connect the equipment into an outlet on a circuit different from that to which the receiver is
connected.
·
Consult the dealer or an experienced radio/TV technician for help.
For detailed warranty outside the United States, please contact corresponding local D-Link office.
D-Link Systems, Inc.
119
DI-624M User’s Manual
Warranty
USA-Federal Communications Commission (FCC)
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant
to Part 15 of FCC Rules. These limits are designed to provide reasonable protection against harmful
interference in a residential installation. This equipment generates, uses, and can radiate radio frequency
energy. If not installed and used in accordance with the instructions, it may cause harmful interference
to radio communications. However, there is no guarantee that interference will not occur in a particular
installation.
If this equipment does cause harmful interference to radio or television reception, which can be determined
by tuning the equipment off and on, the user is encouraged to try and correct the interference by one or
more of the following measures:
-Reorient or relocate the receiving antenna
-Increase the distance between the equipment and the receiver.
-Connect the equipment to outlet on a circuit different from that to which the receiver is connected.
-Consult the dealer or an experienced radio/TV technician for help.
Any changes or modifications not expressly approved by the party responsible for compliance could
void the user’s authority to operate the equipment.
Caution: Exposure to Radio Frequency Radiation.
To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must
be maintained between the antenna of this device and all persons. This device must not be co-located
or operating in conjunction with any other antenna or transmitter.
Canada – Industry Canada (IC)
This device complies with RSS 210 of Industry Canada.
Operation is subject to the following two conditions: (1) this device may not cause interference, and (2)
this device must accept any interference, including interference that may cause undesired operation of
this device.
L ‘ utilisation de ce dispositif est autorisée seulement aux conditions suivantes : (1) il ne doit pas produire
de brouillage et (2) l’ utilisateur du dispositif doit étre prêt à accepter tout brouillage radioélectrique reçu,
même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif.
The term “IC” before the equipment certification number only signifies that the Industry Canada technical
specifications were met.
To reduce potential radio interference to other users, the antenna type and its gain should be so chosen
that the equivalent isotropically radiated power (EIRP) is not more than that required for successful
communication.
To prevent radio interference to the licensed service, this device is intended to be operated indoors and
away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed
outdoors is subject to licensing.
Pour empecher que cet appareil cause du brouillage au service faisant l’objet d’une licence, il doit etre
utilize a l’interieur et devrait etre place loin des fenetres afin de Fournier un ecram de blindage maximal.
Si le matriel (ou son antenne d’emission) est installe a l’exterieur, il doit faire l’objet d’une licence.
Caution: Exposure to Radio Frequency Radiation.
The installer of this radio equipment must ensure that the antenna is located or pointed such that it does
not emit RF field in excess of Health Canada limits for the general population; consult Safety Code 6,
obtainable from Health Canada’s website www.hc-sc.gc.ca/rpb.
D-Link Systems, Inc.
120

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Modify Date                     : 2005:01:05 18:32:29-08:00
Create Date                     : 2005:01:05 18:32:06-08:00
Title                           : Untitled-1
Creator                         : Adobe InDesign CS (3.0)
Producer                        : Adobe PDF Library 6.0
Page Count                      : 30
Mod Date                        : 2005:01:05 18:32:29-08:00
Creation Date                   : 2005:01:05 18:32:06-08:00
Metadata Date                   : 2005:01:05 18:32:29-08:00
Tagged PDF                      : Yes
Has XFA                         : No
EXIF Metadata provided by EXIF.tools
FCC ID Filing: KA2DI624MA1

Navigation menu