D Link DIR825B1 Xtreme N DUAL BAND GIGABIT ROUTER User Manual UserMan 3 KA2DIR825B1
D Link Corporation Xtreme N DUAL BAND GIGABIT ROUTER UserMan 3 KA2DIR825B1
D Link >
Contents
Manual Part 3 Part 2
Section 3 » Configuration Firewall Settings A firewall protects your network from the outside world. The DIR-825 offers a firewall type functionality. The SPI feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone.This option will expose the chosen computercompletely to the outside world. Enable SPI: NAT Endpoint Filtering: Anti-Spoof Check: Enable DMZ: DMZ IP Address: SPI (Stateful Packet Inspection, also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol. Select one of the following for TCP and UDP ports: ‘— Endpoint Independent - Any incoming traffic sent to an open port will be forwarded to the application that opened the port. The port ; will close if idle for 5 minutes. mmmtm. . Address Restricted - Incoming traffic must match the IP address I ”W“ “i of the outgoing connection. . . ”mum: ‘"W””"“°*"E"' Address + Port Restriction — Incoming traffic must match the IP address and port of the outgoing connection. Enable this feature to protect your network from certain kinds of “spoofing” attacks. If an application has trouble working from behind the router, you ”a...“ . can expose one computer to the Internet and run the application WNW on that computer. Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort. Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer obtains its IP address automatically using DHCP, be sure to make a static reservation on the Setup > Network Settings page so that the IP address of the DMZ machine does not change. D-Link DIR—825 User Manual 46 Section 3 » Configuration Roufing The Routing option is an advanced method of customizing specific routes of data through your network. Destination IP: Enter the IP address of packets that will take this route. Nelmask: Enter the netmask of the route, please note that the octets must match your destination _ mmwmxmmmwm“"’“‘“*‘”“""“"“W"“”m“ ip address, [E Mi Gateway: Enter your next hop gateway to be taken if this route is used. Metric: The route metric is a value from 1 to 16 that indicates the cost of using this route. A value 1 is the lowest cost and 15 is the highest cost. Intertace: Select the interface that the IP packet must use to transit out of the routerwhen this route is used. D-Link DIR—825 User Manual 47 Section 3 » Configuration Advanced Wireless Settings 802.11n/g (2.4on) Transmit Power: Set the transmit power of the antennas. ADVANCED WIRELESS SETTINGS Beacon Period: Beacons are packets sent by an Access Point to Wire‘s Band: 2mm Band synchronize a wireless network. Specify a value. Transmit Power: High - 100 is the default setting and is recommended. Beam" w: m (20.4000) RI’S mist-old: 2346 (0.2347) HTS Threshold: This value should remain at its default setting of 2432. If inconsistent data flow is a problem, only "mum“ ”mm“: (255-1345) 3 minor modification should be made. 011" We've" (1.255) WlAlI m Fragmentation The fragmentation threshold, which is specified vmn Emma Threshold: in bytes, determines whether packets will be sham“ fragmented. Packets exceeding the 2346 byte setting will be fragmented before transmission. 2346 is the default setting. DTIM Interval: (Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. WLAN Partition: Enable this option to prevent associated wireless clients from communicating with each other. WMM Function: WMM is 008 for your wireless network. This will improve the quality of video and voice applications for your wireless clients. Short GI: Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may create higher data loss. D-Link DIR—825 User Manual 48 Section 3 » Configuration Advanced Wireless Settings 802.11n/a (SGHz) Transmit Power: Set the transmit power of the antennas. ADVANCED WIRELESS SETTINGS Beacon Period: Beacons are packets sent by an Access Point to Widfis Band: 56m Band synchronize a wireless network. Specify a value. Tnnsmit Power: mph - 100 is the default setting and is recommended. m" w; m (2001000) - - - - n'rs “WW“ 1 2346 (0.1347) RTS Threshold: Thls value should remain at its default settlng of . 2432. If inconsistent data flow is a problem, only anm mm‘“: 23“ (2554346) a minor modification should be made. “mine-"3“ 1 (1.255) WW Puffin" : ’ Fragmentation The fragmentation threshold, which is specified wrm Enable: 2 Threshold: in bytes, determines whether packets will be sham“: 7 fragmented. Packets exceeding the 2346 byte setting will be fragmented before transmission. 2346 is the default setting. DTIM Interval: (Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. WLAN Partition: Enable this option to prevent associated wireless clients from communicating with each other. WMM Function: WMM is 008 for your wireless network This will improve the quality of video and voice applications for your wireless clients Short GI: Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may create higher data loss. D-Link DIR—825 User Manual 49 Section 3 » Configuration WISH Settings WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. Enable WISH: Enable this option if you want to allow WISH to prioritize yourtraffic. HTTP: Allows the routerto recognize HTTP transfers M mm.» for many common audio and video streams and prioritize them above other traffic. Such streams are frequently used by digital media players. wrsu (Wares miner: 5mm mar-q) amass m mar: ammo; Wireless apelflmns sm sem- mls-mStfl-l'l wrsn Windows Media Enables the router to recognize certain audio fmm= —7 Center: and video streams generated by a Windows Media Center PC and to prioritize these above other traffic. Such streams are used by systems known as Windows Media Extenders, such as the Xbox 360. wurmn’v rrnscrmnc nm: 1 W-dn-Ku-nhrn-m- 7 “mm 7 (nefaultvfnot matched by awthing ass) .. mm RIFLE) mm: m mmmi Automatic: When enabled, this option causes the router “summits . « . to automatically attempt to prioritize traffic a my”?- “5m“; z°*‘°“;*:;g; streams that it doesn’t otherwise recognize, anrzvmmz mzmw based on the behavrour that the streams N,“ ° My Wm,“ exhibit. This acts to deprioritize streams that ”WWW“ ' << “P ' . . , A VNMIPKIWe HolenRRJW exhibit bulk transfer characteristics, such as i am messzxsesszss v mm: m z ,, me m 2 m M. file transfers, while leaving interactive traffic, such as gaming or VoIP, running at a normal priority. noon to 255255255155 u to 65535 WISH Rules: A WISH Rule identifies a specific messageflow and assigns a priority to that flow. For most applications, the priority classifiers ensure the right priorities and specific WISH Rules are not required. WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest priority will be used. D-Link DIR—825 User Manual 50 Section 3 » Configuration Priority: Protocol: Host IP Range: Host Port Range: Create a name for the rule that is meaningful Name pm,“ proud to you. Best Effort Lou/(BE LO) v << rcp v The priority of the message flow is entered g ”m 1 1» Range “m 1 pm ”We . . . . 00.00 to 255255155255 0 to 65535 here. The four priorities are defined as: Host 2 1? Range Hm 2 Port Range BK: Background (least urgent) 00.040 to 255.255.255.255 0 to 55535 BE: Best Effort. VI: Video V0: Voice (most urgent) The protocol used by the messages. The rule applies to a flow of messages for which one computer’s IP address falls within the range set here. The rule applies to a flow of messages for which host’s port number is within the range set here. D-Link DIR—825 User Manual 51 Section 3 » Configuration Wi-Fi Protected Setup (WPS) Wi-Fi Protected Setup (WPS) System is a simplified method for securing your wireless network during the “Initial setup” as well as the “Add New Device” processes. The Wi-Fi Alliance (WFA) has certified it across different products as well as manufactures. The process is just as easy, as depressing a button for the Push-Button Method or correctly entering the 8-digit code for the Pin-Code Method. The time reduction in setup and ease of use are quite beneficial, while the highest wireless Security setting of WPA2 is automatically used. Enable: Enable the Wi-Fi Protected Setup feature. Lock Wireless Locking the wireless security settings prevents the Security Settings: settings from being changed by the Wi—Fi Protected Setup feature ofthe router. Devices can still be added to the network using Wi-Fi Protected Setup. However. the settings of the network will not change once this option is checked. PIN Settings: A PIN is a unique numberthat can be used to add the router to an existing network or to create a new network. The default PIN may be printed on the bottom of the router. For extra security, a new PIN can be generated.You can restore the default PIN at any time. Only the Administrator (“admin“ account) can change or reset the PIN. Current PIN: Shows the current value of the routers PIN. Reset PIN tn Default: Restore the default PIN of the router. m Pkultum sfluv Wm rammed saw mm m meme 49mm 1 network mg a m of mm. m Dev-(E mm slum: W muted 9mm n ordertv Be mowed by the united. mm m chums um newt?!" wlbq used a folowmg Wm mm same Dmmss. mm on man saw my button u moment Stew". unwmn. m.- new um . m and, xwl gut m MW the device mbmts or use: anw. s." 5am; ”mesa-es m—umvuim auuv mug. g man-assault“ Serums: l mwumw‘wm out “HINGE um: um: alums athINhD-hult can-awn» . mm mmmnmnum l Amwrusmwnwmwfls mm Generate New PIN: Create a random numberthat is a valid PIN.This becomes the router‘s PIN.You can then copythis PIN to the user interface of the registrar. D-Link DIR—825 User Manual 52 Section 3 » Configuration Add Wireless This Wizard helps you add wireless devices to the wireless network Station: The wizard will either display the wireless network settings to guide you through manual configuration, prompt you to enter the PIN for the device, or ask you to press the configuration button on the device. Ifthe device supports Wi-Fi Protected Setup and has a configuration button, you can add it to the network by pressing the configuration button on the device and then the on the router within 60 seconds. The status LED on the router will flash three times if the device has been successfully added to the network. There are several ways to add a wireless device to your network. A “registrar' controls access to the wireless network. A registrar only allows devices onto the wireless network if you have entered the PIN, or pressed a special Wi-Fi Protected Setup button on the device The router acts as a registrar for the network, although other devices may act as a registrar as well. Add Wireless Start the wizard. Device Wilard: D-Link DIR—825 User Manual 53 Section 3 , Configuration Advanced Network Settings Enable UPnP: To use the Universal Plug and Play (UPnP"‘) feature click on Enabled. UPNP provides compatibility with networking equipment, software and peripherals. WAN Ping: Unchecking the box will not allow the DIR-825 to respond to pings. Blocking the Ping may provide before mwmahfvvflfilfim em some extra security from hackers. Check the box [M M] to allow the internet port to be “pinged"- _ mm nu; ma Play (imp) suvwrb user mm vine and Vlav lmnliuiuilv rm dens. WAN Ping Inbound Select from the drop-down menu if you would "EM“ Filler: like to apply the Inbound Filter to the WAN ping. - llvw m rm huh um ms- Admud «mm new, pl. um m m mam Emblemv: 4 Refer l° Page 45 f°f "we ‘"f°""a“°" regarding lnbwnd Fl'tef- _ ,.......M.....mmnw..............m....mm lmmemmnetmtnemtmmwmwmdm. WAN Port Speed: You may set the port speed of the Internet port mam mummy-am" , to 10Mbps. 100Mbps, or auto. Some older cable ”New; ' or DSL modems may require you to set the port m' "M" speed to ioMbps. mmw : m, mums, . Multicast streams: Check the box to allow multicast traffic to pass through the router from the Internet. mum-mam: . D-Link DIR—825 User Manual 54 Section 3 » Configuration Guest Zone The Guest Zone feature will allow you to create temporary zones that can be used by guests to access the Internet. These zones will be separate from your main wireless network. You may configure different zones for the 2.4GHz and 5.0GHz wireless bands. Enable Guest Zone: Check to enable the Guest Zone feature. Schedule: The schedule of time when the Guest Zone will be active. The schedule may be set to Always, mm" which will allow the particular sen/ice to always be enabledYou can create your own times in the Tools > Schedules section. Ilse “imam" m ("figure um oust mug “mas Mvmv renter m ms: mne pvwde a sepm "mm m: rnrgum m site’s mm. 5m sum; mum sent-s cum [out attullull Wireless NElWDTk Enter a wireless network name (SSID) that is mmlflfl: —. m v -m Name: different from your main wireless network. T N VS mas and : 2mm and Kahuna-ml m. mum (Ase area we SSIDl [name mm mum- Inns Enable Routing Check to allow network connectivity between the ”mum. w Between Zones: different zones created. cuzsr mug sEtEcnou sun-Mm: 1) MM v mm“ mus um : 56m and mum-m m: dukjnsiiljuzst (m alien m 55m) Enable lint-m m Jules k...“ und- - w. v Security MDdB! Select the type of security or encryption you would like to enable for the guest zone. D-Link DIR—825 User Manual 55
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Modify Date : 2008:11:12 15:45:23-05:00 Create Date : 2008:11:12 15:45:06-05:00 Title : UserMan-3_KA2DIR825B1.pdf Author : yfaziloglu Creator : PrimoPDF http://www.primopdf.com Producer : PrimoPDF Page Count : 10 Mod Date : 2008:11:12 15:45:23-05:00 Creation Date : 2008:11:12 15:45:06-05:00 Metadata Date : 2008:11:12 15:45:23-05:00EXIF Metadata provided by EXIF.tools