D Link DIR628A2 RangeBooster N Dual Band Router User Manual 4

D Link Corporation RangeBooster N Dual Band Router 4

User manual 4

Download: D Link DIR628A2 RangeBooster N Dual Band Router User Manual 4
Mirror Download [FCC.gov]D Link DIR628A2 RangeBooster N Dual Band Router User Manual 4
Document ID1222403
Application IDk87k8TY7FWOxm4LG9wH7aQ==
Document DescriptionUser manual 4
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize259.97kB (3249565 bits)
Date Submitted2010-01-04 00:00:00
Date Available2010-04-16 00:00:00
Creation Date2009-12-29 17:18:31
Producing SoftwareAdobe PDF Library 7.0
Document Lastmod2009-12-29 17:18:38
Document TitleUser manual 4
Document CreatorAdobe InDesign CS2 (4.0.5)

Section 3 - Configuration
Inbound Filters
The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you
can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters can be used
with Virtual Server, Port Forwarding, or Remote Administration features.
Name: Enter a name for the inbound filter rule.
Action: Select Allow or Deny.
Enable: Check to enable rule.
Remote IP Start: Enter the starting IP address. Enter 0.0.0.0 if
you do not want to specify an IP range.
Remote IP End: E n t e r t h e e n d i n g I P a d d r e s s. E n t e r
255.255.255.255 if you do not want to specify
and IP range.
Add: Click the Add button to apply your settings.
You must click Save Settings at the top to
save the settings.
Inbound Filter This section will list any rules that are created.
Rules List: You may click the Edit icon to change the
settings or enable/disable the rule, or click the
Delete icon to remove the rule.
D-Link DIR-628 User Manual
47
Section 3 - Configuration
Firewall Settings
A firewall protects your network from the outside world. The D-Link DIR-628 offers a firewall type functionality. The SPI
feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain
types of applications. If you choose to expose a computer, you cam enable DMZ. DMZ is short for Demilitarized Zone.
This option will expose the chosen computer completely to the outside world.
Enable SPI: SPI (Stateful Packet Inspection, also known as dynamic packet
filtering) helps to prevent cyber attacks by tracking more state per
session. It validates that the traffic passing through the session
conforms to the protocol.
NAT Endpoint Select one of the following for TCP and UDP ports:
Filtering: Endpoint Independent - Any incoming traffic sent to an open port
will be forwarded to the application that opened the port. The port will
close if idle for 5 minutes.
Address Restricted - Incoming traffic must match the IP address of
the outgoing connection.
Address + Port Restriction - Incoming traffic must match the IP
address and port of the outgoing connection.
Anti-Spoof Check: Enable this feature to protect your network from certain kinds of
“spoofing” attacks.
Enable DMZ: If an application has trouble working from behind the router, you can
expose one computer to the Internet and run the application on that
computer.
Note: Placing a computer in the DMZ may expose that computer to
a variety of security risks. Use of this option is only recommended
as a last resort.
DMZ IP Address: Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer
obtains it’s IP address automatically using DHCP, be sure to make a static reservation on the Basic > DHCP page so that
the IP address of the DMZ machine does not change.
D-Link DIR-628 User Manual
48
Section 3 - Configuration
Application Level Gateway Configuration
Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to
make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol
or application. A number of ALGs for common applications are enabled by default.
PPTP: Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol.
IPSEC (VPN): Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec
through NAT. This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your
corporate network, try turning this ALG off. Please check with the system adminstrator of your corporate network whether
your VPN client supports NAT traversal.
RTSP: Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and
Real Player are some of the common applications using this protocol.
SIP: Allows devices and applications using VoIP (Voice over IP) to communicate across NAT. Some VoIP applications and devices
have the ability to discover NAT devices and work around them. This ALG may interfere with the operation of such devices.
If you are having trouble making VoIP calls, try turning this ALG off.
D-Link DIR-628 User Manual
49
Section 3 - Configuration
Routing
The Routing option is an advanced method of customizing specific routes of data through your network.
Destination IP: Enter the IP address of packets that will take
this route.
Netmask: Enter the netmask of the route, please note
that the octets must match your destination
IP address.
Gateway: Enter your next hop gateway to be taken if this
route is used.
Metric: The route metric is a value from 1 to 16 that
indicates the cost of using this route. A value 1
is the lowest cost and 15 is the highest cost.
Interface: Select the interface that the IP packet must
use to transit out of the router when this route
is used.
D-Link DIR-628 User Manual
50
Section 3 - Configuration
Advanced Wireless Settings
Transmit Power: Set the transmit power of the antennas.
Beacon Period: Beacons are packets sent by an Access Point to
synchronize a wireless network. Specify a value.
100 is the default setting and is recommended.
RTS Threshold: This value should remain at its default setting of
2432. If inconsistent data flow is a problem, only a
minor modification should be made.
Fragmentation The fragmentation threshold, which is specified
Threshold: in bytes, determines whether packets will be
fragmented. Packets exceeding the 2346 byte
setting will be fragmented before transmission. 2346
is the default setting.
DTIM Interval: (Delivery Traffic Indication Message) 3 is the default
setting. A DTIM is a countdown informing clients
of the next window for listening to broadcast and
multicast messages.
WMM Function: WMM is QoS for your wireless network. This will improve the quality of video and voice applications for your wireless
clients.
Short GI: Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may
create higher data loss.
D-Link DIR-628 User Manual
51
Section 3 - Configuration
Wi-Fi Protected Setup
Wi-Fi Protected Setup (WPS) System is a simplified method for securing your wireless network during the “Initial setup”
as well as the “Add New Device” processes. The Wi-Fi Alliance (WFA) has certified it across different products as well
as manufactures. The process is just as easy, as depressing a button for the Push-Button Method or correctly entering
the 8-digit code for the Pin-Code Method. The time reduction in setup and ease of use are quite beneficial, while the
highest wireless Security setting of WPA2 is automatically used.
Enable: Enable the Wi-Fi Protected Setup feature.
Lock Wireless Locking the wireless security settings prevents the
Security Settings: settings from being changed by the Wi-Fi Protected
Setup feature of the router. Devices can still be
added to the network using Wi-Fi Protected Setup.
However, the settings of the network will not change
once this option is checked.
PIN Settings: A PIN is a unique number that can be used to add
the router to an existing network or to create a
new network. The default PIN may be printed on
the bottom of the router. For extra security, a new
PIN can be generated. You can restore the default
PIN at any time. Only the Administrator (“admin”
account) can change or reset the PIN.
Current PIN: Shows the current value of the router’s PIN.
Reset PIN to
Default: Restore the default PIN of the router.
Generate New PIN: Create a random number that is a valid PIN. This becomes the router’s PIN. You can then copy this PIN to the user interface
of the registrar.
D-Link DIR-628 User Manual
52
Section 3 - Configuration
Add Wireless This Wizard helps you add wireless devices to the wireless network.
Station:
The wizard will either display the wireless network settings to guide you through manual configuration, prompt you to enter
the PIN for the device, or ask you to press the configuration button on the device. If the device supports Wi-Fi Protected Setup
and has a configuration button, you can add it to the network by pressing the configuration button on the device and then
the on the router within 60 seconds. The status LED on the router will flash three times if the device has been successfully
added to the network.
There are several ways to add a wireless device to your network. A “registrar” controls access to the wireless network. A
registrar only allows devices onto the wireless network if you have entered the PIN, or pressed a special Wi-Fi Protected Setup
button on the device. The router acts as a registrar for the network, although other devices may act as a registrar as well.
Add Wireless Start the wizard.
Device Wizard:
D-Link DIR-628 User Manual
53
Section 3 - Configuration
Advanced Network Settings
UPnP: To use the Universal Plug and Play (UPnP™)
feature check the Enabled UPnP box. UPNP
provides compatibility with networking equipment,
software and peripherals.
WAN Ping: Unchecking the box will not allow the DIR-628 to
respond to pings. Blocking the Ping may provide
some extra security from hackers. Check the box
to allow the WAN port to be “pinged”.
Inbound Filter: This section will list any rules that are created. You
may click the Edit icon to change the settings or
enable/disable the rule, or click the Delete icon
to remove the rule.
WAN Port Speed: You may set the port speed of the Internet port
to 10Mbps, 100Mbps, or auto. Some older cable
or DSL modems may require you to set the port
speed to 10Mbps.
Multicast Check the box to allow multicast traffic to pass
streams: through the router from the Internet.
D-Link DIR-628 User Manual
54
Section 3 - Configuration
Administrator Settings
This page will allow you to change the Administrator and User passwords. You can also enable Remote Management.
There are two accounts that can access the management interface through the web browser. The accounts are admin
and user. Admin has read/write access while user has read-only access. User can only view the settings but cannot
make any changes. Only the admin account has the ability to change both admin and user account passwords.
Admin Password: Enter a new password for the Administrator Login Name. The
administrator can make changes to the settings.
User Password: Enter the new password for the User login. If you login as
the User, you can only see the settings, but cannot change
them.
Gateway Name: Enter a name for the DIR-628 router.
Remote Remote management allows the DIR-628 to be configured
Management: from the Internet by a web browser. A username and
password is still required to access the Web-Management
interface. In general, only a member of your network can
browse the built-in web pages to perform Administrator tasks.
This feature enables you to perform Administrator tasks from
the remote (Internet) host.
Remote Admin The port number used to access the DIR-628.
Port: Example: http://x.x.x.x:8080 where x.x.x.x is the Internet IP
address of the DIR-628 and 8080 is the port used for the
Web Management interface.
Inbound Filter: This section will list any rules that are created. You may click
the Edit icon to change the settings or enable/disable the
rule, or click the Delete icon to remove the rule.
D-Link DIR-628 User Manual
55
Section 3 - Configuration
Time Settings
The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system
clock. From this section you can set the time zone that you are in and set the Time Server. Daylight Saving can also
be configured to automatically adjust the time when needed.
Time Zone: Select the Time Zone from the drop-down
menu.
Daylight Saving: To select Daylight Saving time manually, select
enabled or disabled, and enter a start date and
an end date for daylight saving time.
Enable NTP NTP is short for Network Time Protocol. NTP
Server: synchronizes computer clock times in a network
of computers. Check this box to use a NTP
server. This will only connect to a server on the
Internet, not a local server.
NTP Server Used: Enter the NTP server or select one from the
drop-down menu.
Manual: To manually input the time, enter the values
in these fields for the Year, Month, Day, Hour,
Minute, and Second and then click Set Time.
You can also click Copy Your Computer’s Time
Settings.
D-Link DIR-628 User Manual
56
Section 3 - Configuration
SysLog
The Broadband Router keeps a running log of events and activities occurring on the Router. You may send these logs
to a SysLog server on your network.
Enable Logging to Check this box to send the router logs to a
SysLog Server: SysLog Server.
SysLog Server IP The address of the SysLog server that will be
Address: used to send the logs. You may also select
your computer from the drop-down menu (only
if receiving an IP address from the router via
DHCP).
D-Link DIR-628 User Manual
57

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Copy, Extract, Print high-res
Tagged PDF                      : Yes
XMP Toolkit                     : 3.1-701
Modify Date                     : 2009:12:29 17:18:38+08:00
Create Date                     : 2009:12:29 17:18:31+08:00
Metadata Date                   : 2009:12:29 17:18:38+08:00
Creator Tool                    : Adobe InDesign CS2 (4.0.5)
Format                          : application/pdf
Document ID                     : uuid:cac609cc-8cac-41ec-a2bd-983135913fb8
Instance ID                     : uuid:cad8d486-fbd8-4e76-a45d-d1bedde2f2e7
Producer                        : Adobe PDF Library 7.0
Page Count                      : 11
Creator                         : Adobe InDesign CS2 (4.0.5)
EXIF Metadata provided by EXIF.tools
FCC ID Filing: KA2DIR628A2

Navigation menu