D Link DIR825B1 Xtreme N DUAL BAND GIGABIT ROUTER User Manual UserMan 3 KA2DIR825B1

D Link Corporation Xtreme N DUAL BAND GIGABIT ROUTER UserMan 3 KA2DIR825B1

Manual Part 3 Part 2

Download: D Link DIR825B1 Xtreme N DUAL BAND GIGABIT ROUTER User Manual UserMan 3 KA2DIR825B1
Mirror Download [FCC.gov]D Link DIR825B1 Xtreme N DUAL BAND GIGABIT ROUTER User Manual UserMan 3 KA2DIR825B1
Document ID1029601
Application IDC89/4L41a9BTpo14XDMFAA==
Document DescriptionManual Part 3 Part 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize182.96kB (2286951 bits)
Date Submitted2008-11-12 00:00:00
Date Available2008-11-12 00:00:00
Creation Date2008-11-12 15:45:06
Producing SoftwarePrimoPDF
Document Lastmod2008-11-12 15:45:23
Document TitleUserMan-3_KA2DIR825B1.pdf
Document CreatorPrimoPDF http://www.primopdf.com
Document Author: yfaziloglu

Section 3 » Configuration
Firewall Settings
A firewall protects your network from the outside world. The DIR-825 offers a firewall type functionality. The SPI feature
helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of
applications. If you choose to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone.This option
will expose the chosen computercompletely to the outside world.
Enable SPI:
NAT Endpoint
Filtering:
Anti-Spoof Check:
Enable DMZ:
DMZ IP Address:
SPI (Stateful Packet Inspection, also known as dynamic packet
filtering) helps to prevent cyber attacks by tracking more state per
session. It validates that the traffic passing through the session
conforms to the protocol.
Select one of the following for TCP and UDP ports: ‘—
Endpoint Independent - Any incoming traffic sent to an open port
will be forwarded to the application that opened the port. The port ;
will close if idle for 5 minutes.
mmmtm. .
Address Restricted - Incoming traffic must match the IP address I ”W“ “i
of the outgoing connection. . . ”mum: ‘"W””"“°*"E"'
Address + Port Restriction — Incoming traffic must match the IP
address and port of the outgoing connection.
Enable this feature to protect your network from certain kinds of
“spoofing” attacks.
If an application has trouble working from behind the router, you ”a...“ .
can expose one computer to the Internet and run the application WNW
on that computer.
Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only
recommended as a last resort.
Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this
computer obtains its IP address automatically using DHCP, be sure to make a static reservation on the Setup > Network
Settings page so that the IP address of the DMZ machine does not change.
D-Link DIR—825 User Manual 46
Section 3 » Configuration
Roufing
The Routing option is an advanced method of customizing specific routes of data through your network.
Destination IP: Enter the IP address of packets that will take
this route.
Nelmask: Enter the netmask of the route, please note
that the octets must match your destination _ mmwmxmmmwm“"’“‘“*‘”“""“"“W"“”m“
ip address, [E Mi
Gateway: Enter your next hop gateway to be taken if this
route is used.
Metric: The route metric is a value from 1 to 16 that
indicates the cost of using this route. A value 1
is the lowest cost and 15 is the highest cost.
Intertace: Select the interface that the IP packet must
use to transit out of the routerwhen this route
is used.
D-Link DIR—825 User Manual 47
Section 3 » Configuration
Advanced Wireless Settings
802.11n/g (2.4on)
Transmit Power: Set the transmit power of the antennas.
ADVANCED WIRELESS SETTINGS
Beacon Period: Beacons are packets sent by an Access Point to Wire‘s Band: 2mm Band
synchronize a wireless network. Specify a value. Transmit Power: High -
100 is the default setting and is recommended. Beam" w: m (20.4000)
RI’S mist-old: 2346 (0.2347)
HTS Threshold: This value should remain at its default setting of
2432. If inconsistent data flow is a problem, only "mum“ ”mm“: (255-1345)
3 minor modification should be made. 011" We've" (1.255)
WlAlI m
Fragmentation The fragmentation threshold, which is specified vmn Emma
Threshold: in bytes, determines whether packets will be sham“
fragmented. Packets exceeding the 2346 byte
setting will be fragmented before transmission.
2346 is the default setting.
DTIM Interval: (Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window
for listening to broadcast and multicast messages.
WLAN Partition: Enable this option to prevent associated wireless clients from communicating with each other.
WMM Function: WMM is 008 for your wireless network. This will improve the quality of video and voice applications for your wireless
clients.
Short GI: Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may
create higher data loss.
D-Link DIR—825 User Manual 48
Section 3 » Configuration
Advanced Wireless Settings
802.11n/a (SGHz)
Transmit Power: Set the transmit power of the antennas.
ADVANCED WIRELESS SETTINGS
Beacon Period: Beacons are packets sent by an Access Point to Widfis Band: 56m Band
synchronize a wireless network. Specify a value. Tnnsmit Power: mph -
100 is the default setting and is recommended. m" w; m (2001000)
- - - - n'rs “WW“ 1 2346 (0.1347)
RTS Threshold: Thls value should remain at its default settlng of .
2432. If inconsistent data flow is a problem, only anm mm‘“: 23“ (2554346)
a minor modification should be made. “mine-"3“ 1 (1.255)
WW Puffin" : ’
Fragmentation The fragmentation threshold, which is specified wrm Enable: 2
Threshold: in bytes, determines whether packets will be sham“: 7
fragmented. Packets exceeding the 2346 byte
setting will be fragmented before transmission.
2346 is the default setting.
DTIM Interval: (Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window
for listening to broadcast and multicast messages.
WLAN Partition: Enable this option to prevent associated wireless clients from communicating with each other.
WMM Function: WMM is 008 for your wireless network This will improve the quality of video and voice applications for your wireless
clients
Short GI: Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may
create higher data loss.
D-Link DIR—825 User Manual 49
Section 3 » Configuration
WISH Settings
WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using
a wireless network by prioritizing the traffic of different applications.
Enable WISH: Enable this option if you want to allow WISH
to prioritize yourtraffic.
HTTP: Allows the routerto recognize HTTP transfers M mm.»
for many common audio and video streams
and prioritize them above other traffic. Such
streams are frequently used by digital media
players.
wrsu (Wares miner: 5mm mar-q) amass m mar: ammo; Wireless
apelflmns
sm sem- mls-mStfl-l'l
wrsn
Windows Media Enables the router to recognize certain audio fmm= —7
Center: and video streams generated by a Windows
Media Center PC and to prioritize these above
other traffic. Such streams are used by systems
known as Windows Media Extenders, such as
the Xbox 360.
wurmn’v rrnscrmnc
nm: 1
W-dn-Ku-nhrn-m- 7
“mm 7 (nefaultvfnot matched by awthing ass)
.. mm RIFLE)
mm: m mmmi
Automatic: When enabled, this option causes the router
“summits . « .
to automatically attempt to prioritize traffic a my”?- “5m“; z°*‘°“;*:;g;
streams that it doesn’t otherwise recognize, anrzvmmz mzmw
based on the behavrour that the streams N,“ ° My Wm,“
exhibit. This acts to deprioritize streams that ”WWW“ ' << “P '
. . , A VNMIPKIWe HolenRRJW
exhibit bulk transfer characteristics, such as i am messzxsesszss v mm:
m z ,, me m 2 m M.
file transfers, while leaving interactive traffic,
such as gaming or VoIP, running at a normal
priority.
noon to 255255255155 u to 65535
WISH Rules: A WISH Rule identifies a specific messageflow and assigns a priority to that flow. For most applications, the priority classifiers
ensure the right priorities and specific WISH Rules are not required.
WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest
priority will be used.
D-Link DIR—825 User Manual 50
Section 3 » Configuration
Priority:
Protocol:
Host IP Range:
Host Port Range:
Create a name for the rule that is meaningful Name pm,“ proud
to you. Best Effort Lou/(BE LO) v << rcp v
The priority of the message flow is entered g ”m 1 1» Range “m 1 pm ”We
. . . . 00.00 to 255255155255 0 to 65535
here. The four priorities are defined as:
Host 2 1? Range Hm 2 Port Range
BK: Background (least urgent) 00.040 to 255.255.255.255 0 to 55535
BE: Best Effort.
VI: Video
V0: Voice (most urgent)
The protocol used by the messages.
The rule applies to a flow of messages for which one computer’s IP address falls within the range set here.
The rule applies to a flow of messages for which host’s port number is within the range set here.
D-Link DIR—825 User Manual
51
Section 3 » Configuration
Wi-Fi Protected Setup (WPS)
Wi-Fi Protected Setup (WPS) System is a simplified method for securing your wireless network during the “Initial setup”
as well as the “Add New Device” processes. The Wi-Fi Alliance (WFA) has certified it across different products as well
as manufactures. The process is just as easy, as depressing a button for the Push-Button Method or correctly entering
the 8-digit code for the Pin-Code Method. The time reduction in setup and ease of use are quite beneficial, while the
highest wireless Security setting of WPA2 is automatically used.
Enable: Enable the Wi-Fi Protected Setup feature.
Lock Wireless Locking the wireless security settings prevents the
Security Settings: settings from being changed by the Wi—Fi Protected
Setup feature ofthe router. Devices can still be added
to the network using Wi-Fi Protected Setup. However.
the settings of the network will not change once this
option is checked.
PIN Settings: A PIN is a unique numberthat can be used to add
the router to an existing network or to create a new
network. The default PIN may be printed on the
bottom of the router. For extra security, a new PIN
can be generated.You can restore the default PIN at
any time. Only the Administrator (“admin“ account)
can change or reset the PIN.
Current PIN: Shows the current value of the routers PIN.
Reset PIN tn
Default: Restore the default PIN of the router.
m Pkultum
sfluv
Wm rammed saw mm m meme 49mm 1 network mg a m of mm. m
Dev-(E mm slum: W muted 9mm n ordertv Be mowed by the united.
mm m chums um newt?!" wlbq used a folowmg Wm mm same Dmmss.
mm on man saw my button u moment Stew".
unwmn. m.- new um . m and, xwl gut m MW the device mbmts or use: anw.
s." 5am; ”mesa-es
m—umvuim auuv
mug. g
man-assault“
Serums:
l mwumw‘wm
out “HINGE
um: um: alums
athINhD-hult can-awn» .
mm mmmnmnum
l Amwrusmwnwmwfls
mm
Generate New PIN: Create a random numberthat is a valid PIN.This becomes the router‘s PIN.You can then copythis PIN to the user interface
of the registrar.
D-Link DIR—825 User Manual
52
Section 3 » Configuration
Add Wireless This Wizard helps you add wireless devices to the wireless network
Station:
The wizard will either display the wireless network settings to guide you through manual configuration, prompt you to enter
the PIN for the device, or ask you to press the configuration button on the device. Ifthe device supports Wi-Fi Protected Setup
and has a configuration button, you can add it to the network by pressing the configuration button on the device and then
the on the router within 60 seconds. The status LED on the router will flash three times if the device has been successfully
added to the network.
There are several ways to add a wireless device to your network. A “registrar' controls access to the wireless network. A
registrar only allows devices onto the wireless network if you have entered the PIN, or pressed a special Wi-Fi Protected Setup
button on the device The router acts as a registrar for the network, although other devices may act as a registrar as well.
Add Wireless Start the wizard.
Device Wilard:
D-Link DIR—825 User Manual 53
Section 3 , Configuration
Advanced Network Settings
Enable UPnP: To use the Universal Plug and Play (UPnP"‘) feature
click on Enabled. UPNP provides compatibility with
networking equipment, software and peripherals.
WAN Ping: Unchecking the box will not allow the DIR-825 to
respond to pings. Blocking the Ping may provide before mwmahfvvflfilfim em
some extra security from hackers. Check the box [M M]
to allow the internet port to be “pinged"- _
mm nu; ma Play (imp) suvwrb user mm vine and Vlav lmnliuiuilv rm
dens.
WAN Ping Inbound Select from the drop-down menu if you would "EM“
Filler: like to apply the Inbound Filter to the WAN ping. -
llvw m rm huh um ms- Admud «mm new, pl. um m m mam
Emblemv: 4
Refer l° Page 45 f°f "we ‘"f°""a“°" regarding
lnbwnd Fl'tef- _ ,.......M.....mmnw..............m....mm
lmmemmnetmtnemtmmwmwmdm.
WAN Port Speed: You may set the port speed of the Internet port mam mummy-am" ,
to 10Mbps. 100Mbps, or auto. Some older cable ”New; '
or DSL modems may require you to set the port m' "M"
speed to ioMbps.
mmw : m, mums, .
Multicast streams: Check the box to allow multicast traffic to pass
through the router from the Internet.
mum-mam: .
D-Link DIR—825 User Manual 54
Section 3 » Configuration
Guest Zone
The Guest Zone feature will allow you to create temporary zones that can be used by guests to access the Internet.
These zones will be separate from your main wireless network. You may configure different zones for the 2.4GHz and
5.0GHz wireless bands.
Enable Guest Zone: Check to enable the Guest Zone feature.
Schedule: The schedule of time when the Guest Zone will
be active. The schedule may be set to Always, mm"
which will allow the particular sen/ice to always
be enabledYou can create your own times in the
Tools > Schedules section.
Ilse “imam" m ("figure um oust mug “mas Mvmv renter m ms: mne pvwde a
sepm "mm m: rnrgum m site’s mm.
5m sum; mum sent-s
cum [out attullull
Wireless NElWDTk Enter a wireless network name (SSID) that is
mmlflfl: —. m v -m
Name: different from your main wireless network. T N VS
mas and : 2mm and
Kahuna-ml m. mum (Ase area we SSIDl
[name mm mum- Inns
Enable Routing Check to allow network connectivity between the ”mum. w
Between Zones: different zones created.
cuzsr mug sEtEcnou
sun-Mm: 1) MM v mm“
mus um : 56m and
mum-m m: dukjnsiiljuzst (m alien m 55m)
Enable lint-m m Jules
k...“ und- - w. v
Security MDdB! Select the type of security or encryption you would
like to enable for the guest zone.
D-Link DIR—825 User Manual 55

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Modify Date                     : 2008:11:12 15:45:23-05:00
Create Date                     : 2008:11:12 15:45:06-05:00
Title                           : UserMan-3_KA2DIR825B1.pdf
Author                          : yfaziloglu
Creator                         : PrimoPDF http://www.primopdf.com
Producer                        : PrimoPDF
Page Count                      : 10
Mod Date                        : 2008:11:12 15:45:23-05:00
Creation Date                   : 2008:11:12 15:45:06-05:00
Metadata Date                   : 2008:11:12 15:45:23-05:00
EXIF Metadata provided by EXIF.tools
FCC ID Filing: KA2DIR825B1

Navigation menu