D Link DIR855A1 Xtreme N DUO Media Router User Manual Manual Part 2

D Link Corporation Xtreme N DUO Media Router Manual Part 2

Contents

Manual Part 2

39D-Link DIR-855 User ManualSection 3 - ConfigurationNetwork FiltersSelect Turn MAC Filtering Off, Allow MAC addresses  listed  below,  or  Deny  MAC addresses listed below from the drop-down menu. Enter  the  MAC  address  you  would  like  to filter.To  find  the  MAC  address  on  a  computer, please refer to the Networking Basics section in this manual. Select a DHCP client from the drop-down menu and click << to copy that MAC Address. Click to remove the MAC address.Configure MAC Filtering:MAC Address:DHCP Client:Clear:Use MAC (Media Access Control) Filters to allow or deny LAN (Local Area Network) computers by their MAC addresses from accessing the Network. You can either manually add a MAC address or select the MAC address from the list of clients that are currently connected to the Broadband Router.
40D-Link DIR-855 User ManualSection 3 - ConfigurationAccess ControlClick the Add Policy button to start the Access Control Wizard. Add Policy:The Access Control section allows you to control access in and out of your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications like P2P utilities or games.Click Next to continue with the wizard.Access Control Wizard
41D-Link DIR-855 User ManualSection 3 - ConfigurationEnter a name for the policy and then click Next to continue.Access Control Wizard (continued)Select a schedule (I.E. Always)  from  the  drop-down menu and then click Next to continue.Enter  the  following  information  and  then  click  Next  to continue.• Address Type - Select IP address, MAC address, or Other Machines.• IP Address - Enter the IP address of the computer you want to apply the rule to.
42D-Link DIR-855 User ManualSection 3 - ConfigurationSelect the filtering method and then click Next to continue.Access Control Wizard (continued)Enter the rule: Enable - Check to enable the rule. Name - Enter a name for your rule. Dest IP Start - Enter the starting IP address. Dest IP End - Enter the ending IP address. Protocol - Select the protocol. Dest Port Start - Enter the starting port number. Dest Port End - Enter the ending port number.To enable web logging, click Enable.Click Save to save the access control rule.
43D-Link DIR-855 User ManualSection 3 - ConfigurationAdd Website Filtering Rule:Website URL/Domain:Website FiltersSelect Allow or Deny.Enter the keywords or URLs that you want to allow or block. Click Save Settings.Website Filters are used to allow you to set up a list of allowed Web sites that can be used by multiple users through the network. To use this feature select to Allow or Deny, enter the domain or website and click Save Settings. You must also select Apply Web Filter under the Access Control section (page 40).
44D-Link DIR-855 User ManualSection 3 - ConfigurationEnter a name for the inbound filter rule.Select Allow or Deny.Check to enable rule.Enter the starting IP address. Enter 0.0.0.0 if you do not want to specify an IP range.Enter  the  ending  IP  address.  Enter 255.255.255.255  if  you  do  not  want  to specify and IP range.Click the Add button to apply your settings. You must click Save Settings at the top to save the settings.This section will list any rules that are created. You may click the Edit icon to change the settings or enable/disable the rule, or click the Delete icon to remove the rule.Name:Action:Enable:Remote IP Start:Remote IP End:Add:Inbound Filter Rules List:The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range.  Inbound Filters can be used with Virtual Server, Port Forwarding, or Remote Administration features.Inbound Filters
45D-Link DIR-855 User ManualSection 3 - ConfigurationSPI  (Stateful  Packet  Inspection,  also  known  as  dynamic  packet filtering) helps to prevent cyber attacks by tracking more state per session.  It  validates  that  the  traffic  passing  through  the  session conforms to the protocol.Select one of the following for TCP and UDP ports:Endpoint Independent - Any incoming traffic sent to an open port will be forwarded to the application that opened the port. The port will close if idle for 5 minutes.Address Restricted - Incoming traffic must match the IP address of the outgoing connection.Address + Port Restriction - Incoming traffic must match the IP address and port of the outgoing connection.Enable this feature to protect your network from certain kinds of “spoofing” attacks. If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer.Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort.Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer obtains it’s IP address automatically using DHCP, be sure to make a static reservation on the Basic > DHCP page so that the IP address of the DMZ machine does not change.Enable SPI:NAT Endpoint Filtering:Anti-Spoof Check:Enable DMZ:DMZ IP Address:Firewall SettingsA firewall protects your network from the outside world. The DIR-855 offers a firewall type functionality. The SPI feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world.
46D-Link DIR-855 User ManualSection 3 - ConfigurationApplication Level Gateway (ALG) ConfigurationHere you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol or application. A number of ALGs for common applications are enabled by default.Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol. Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec through NAT. This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your corporate network, try turning this ALG off. Please check with the system adminstrator of your corporate network whether your VPN client supports NAT traversal.PPTP:IPSEC (VPN):
47D-Link DIR-855 User ManualSection 3 - ConfigurationSet the transmit power of the antennas.Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value. 100 is the default setting and is recommended. This value should remain at its default setting of 2432. If inconsistent data flow is a problem, only a minor modification should be made.The fragmentation threshold, which is specified in  bytes,  determines  whether  packets  will  be fragmented.  Packets  exceeding  the  2346  byte setting will be fragmented before transmission. 2346 is the default setting. (Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages.This enables 802.11d operation. 802.11d is a wireless specification developed to allow implementation of wireless networks in countries that cannot use the 802.11 standard. This feature should only be enabled if you are in a country that requires it.When checked, it will disable the ability for computers on the wireless network from seeing each other, but will allow you to see computers on the wired network.WMM  is  QoS for your wireless  network. This  will  improve  the  quality  of  video  and  voice applications  for  your wireless clients.Aggregated-MAC Packet Data Unit, is a group of MPDUs which built an PSDU (Physical Service Data Unit). It has lower overhead and provides robust recovery in case of loss.Check this box to reduce the guard interval time therefore increasing the data capacity.  However, it’s less reliable and may create higher data loss.Transmit Power:Beacon Period:RTS Threshold:Fragmentation Threshold:DTIM Interval:802.11d:Wireless Isolation:WMM Function:A-MPDU Aggregation:Short GI:Advanced Wireless Settings802.11n/g (2.4GHz)
48D-Link DIR-855 User ManualSection 3 - ConfigurationAdvanced Wireless Settings802.11n/a (5GHz)Set the transmit power of the antennas.Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value. 100 is the default setting and is recommended. This value should remain at its default setting of 2432. If inconsistent data flow is a problem, only a minor modification should be made.The fragmentation threshold, which is specified in  bytes,  determines  whether  packets  will  be fragmented.  Packets  exceeding  the  2346  byte setting  will  be  fragmented  before  transmission. 2346 is the default setting. (Delivery Traffic  Indication  Message)  3  is  the default  setting.  A  DTIM  is  a  countdown  informing  clients  of  the  next  window  for  listening  to  broadcast  and  multicast messages.This enables 802.11d opration. 802.11d is a wireless specification developed to allow implementation of wireless networks in countries that cannot use the 802.11 standard. This feature should only be enabled if you are in a country that requires it.When checked, it will disable the ability for computers on the wireless network from seeing each other, but will allow you to see computers on the wired network.WMM  is  QoS for your wireless  network. This  will  improve  the  quality  of  video  and  voice applications  for  your wireless clients.Aggregated-MAC Packet Data Unit, is a group of MPDUs which built an PSDU (Physical Service Data Unit). It will lower overhead and provides robust recovery in case of loss.Check this box to reduce the guard interval time therefore increasing the data capacity.  However, it’s less reliable and may create higher data loss.Transmit Power:Beacon Period:RTS Threshold:Fragmentation Threshold:DTIM Interval:802.11d:Wireless Isolation:WMM Function:A-MPDU Aggregation:Short GI:
49D-Link DIR-855 User ManualSection 3 - ConfigurationWISH SettingsWISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. Enable this option if you want to allow WISH to prioritize your traffic. Enable WISH:Allows the router to recognize HTTP transfers for  many  common  audio  and  video  streams and  prioritize them  above other  traffic. Such streams are frequently used by digital media players. HTTP:Enables the router to recognize certain audio and video streams generated by a Windows Media Center PC and to prioritize these above other traffic. Such streams are used by systems known as Windows Media Extenders, such as the Xbox 360. Windows Media Center:When enabled, this option causes the router to  automatically  attempt  to  prioritize  traffic streams  that  it  doesn’t  otherwise  recognize, based  on  the  behaviour that  the  streams exhibit. This  acts to deprioritize streams that exhibit  bulk  transfer  characteristics,  such  as file transfers, while  leaving interactive  traffic, such as gaming or VoIP, running at a normal priority.Automatic:WISH Rules: A WISH Rule identifies a specific message flow and assigns a priority to that flow. For most applications, the priority classifiers ensure the right priorities and specific WISH Rules are not required. WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest priority will be used.
50D-Link DIR-855 User ManualSection 3 - ConfigurationCreate a name for the rule that is meaningful to you.Name:The  priority  of  the  message  flow  is  entered here. The four priorities are defined as:BK: Background (least urgent)BE: Best Effort.VI: VideoVO: Voice (most urgent)Priority:The protocol used by the messages. Protocol:The rule applies to a flow of messages for which one computer’s IP address falls within the range set here.  Host IP Range:The rule applies to a flow of messages for which host’s port number is within the range set here. Host Port Range:
51D-Link DIR-855 User ManualSection 3 - ConfigurationUPnPInternet Ping BlockInternet Port SpeedMulticast StreamsTo use the Universal Plug and Play (UPnP™) feature click on Enabled. UPNP provides compatibility with networking equipment, software and peripherals.Unchecking the box will not allow the DIR-855 to respond to pings. Blocking the Ping may provide some extra security from hackers. Check the box to allow the Internet port to be “pinged”.Select  from  the  drop-down  menu  if  you  would like to apply the Inbound Filter to the WAN ping. Refer to page 44 for more information regarding Inbound Filter.You  may set  the  port speed of the Internet port to 10Mbps, 100Mbps, or auto. Some older cable or DSL modems may require you to set the port speed to 10Mbps.Check the  box  to  allow  multicast  traffic  to  pass through the router from the Internet.Enable UPnP:WAN Ping:WAN Ping Inbound Filter:WAN Port Speed:Multicast streams:Advanced Network Settings
52D-Link DIR-855 User ManualSection 3 - ConfigurationChange PasswordRemote ManagementEnter a new password for the Administrator Login Name. The administrator can make changes to the settings.Enter the new password for the User login. If you login as the User, you can only see the settings, but cannot change them.Enter a name for the DIR-855 router.Remote management allows the DIR-855 to be configured from  the  Internet  by  a  web  browser.  A  username  and password is still required to access the Web-Management interface. In general, only a member of your network can browse  the  built-in  web  pages  to  perform  Administrator tasks. This feature enables you to perform Administrator tasks from the remote (Internet) host.The port number used to access the DIR-855.Example: http://x.x.x.x:8080 whereas x.x.x.x is the Internet  IP address of the DIR-855 and 8080 is the port used for the Web Management interface.This section will list any rules that are created. You may click the Edit icon to change the settings or enable/disable the rule, or click the Delete icon to remove the rule.Admin Password:User Password:System Name:Remote Management:Remote Admin Port:Inbound Filter:Administrator SettingsThis page will allow you to change the Administrator and User passwords. You can also enable Remote Management.  There are two accounts that can access the management interface through the web browser. The accounts are admin and user. Admin has read/write access while user has read-only access. User can only view the settings but cannot make any changes. Only the admin account has the ability to change both admin and user account passwords.
53D-Link DIR-855 User ManualSection 3 - ConfigurationTime SettingsSelect  the Time  Zone  from  the  drop-down menu.To select Daylight Saving time manually, select enabled or disabled, and enter a start date and an end date for daylight saving time.NTP  is  short  for  Network Time  Protocol. NTP synchronizes computer clock times in a network of computers. Check this box to use a NTP server. This will only connect to a server on the Internet, not a local server.Enter the NTP server or select one from the drop-down menu.To manually input the time, enter the values in these fields for the Year, Month, Day, Hour, Minute, and Second and then click Set Time. You  can  also  click  Copy Your  Computer’s Time Settings.Time Zone:Daylight Saving:Enable NTP Server:NTP Server Used:Manual:The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight Saving can also be configured to automatically adjust the time when needed.
54D-Link DIR-855 User ManualSection 3 - ConfigurationSysLogThe Broadband Router keeps a running log of events and activities occurring on the Router. You may send these logs to a SysLog server on your network.Enable Logging to SysLog Server:SysLog Server IP Address:Check this box  to send  the  router  logs to  a SysLog Server.The address of the SysLog server that will be used  to  send  the  logs. You  may also  select your computer from the drop-down menu (only if receiving an IP address from the router via DHCP).
55D-Link DIR-855 User ManualSection 3 - ConfigurationEmail SettingsThe Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Enable Email Notification: From Email Address:To Email Address:SMTP Server Address:Enable Authentication:Account Name:Password:On Log Full:On Schedule:Schedule:When this option is enabled, router activity logs are e-mailed to a designated email address.This email address will appear as the sender when you receive a log file or firmware upgrade notification via email.Enter the  email  address  where you want the email sent. Enter the SMTP server address for sending email. If  your  SMTP  server  requires  authentication, select this option.Check this  box if your SMTP server requires authentication. Enter your account for sending email.Enter  the  password  associated  with  the account. Re-type the password associated with the account.When this option is selected, logs will be sent via email when the log is full.Selecting this option will send the logs via email according to schedule.This option is enabled when On Schedule is selected. You can select a schedule from the list of defined schedules. To create a schedule, go to Tools > Schedules.
56D-Link DIR-855 User ManualSection 3 - ConfigurationUse  this  option  to  save  the  current  router configuration settings to a file on the hard disk of the computer you are using. First, click the Save button. You will then  see  a file  dialog, where you can select a location and file name for the settings. Use  this  option  to  load  previously  saved router  configuration  settings.  First,  use  the Browse  control  to  find  a  previously  save file  of  configuration  settings. Then,  click the Load button to transfer those settings to the router. This  option  will  restore  all  configuration settings back to the settings that were in effect at the time the router was shipped from the factory. Any settings that have not been saved will be lost, including any rules that you have created. If you want to save the current router configuration  settings,  use  the  Save  button above. Click to reboot the router.Save Settings to Local Hard Drive:Load Settings from Local Hard Drive:Restore to Factory Default Settings:Reboot Device:System SettingsThis section allows you to manage the router’s configuration settings, reboot the router, and restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that you’ve created.
57D-Link DIR-855 User ManualSection 3 - ConfigurationClick on Check Now to find out if there is an updated  firmware;  if  so,  download  the  new firmware to your hard drive.After you have downloaded the new firmware, click Browse to locate the firmware update on your hard drive.  Click Upload to complete the firmware upgrade.Check Automatically  Check Online  for Latest Firmware Version to have the router check automatically  to  see  if  there  is  a  new firmware upgrade.Check Email Notification of Newer Firmware Version to have the router send an email when there is a new firmware available.Firmware Upgrade:Browse:Notifications Options:Update FirmwareYou can upgrade the firmware of the Router here. Make sure the firmware you want to use is on the local hard drive of the computer. Click on Browse to locate the firmware file to be used for the update. Please check the D-Link support site for firmware updates at http://support.dlink.com. You can download firmware upgrades to your hard drive from the D-Link support site.
58D-Link DIR-855 User ManualSection 3 - ConfigurationDynamic Domain Name System is a method of keeping a domain name linked to a changing IP Address. Check the box to enable DDNS.Choose  your  DDNS  provider  from  the  drop down menu.Enter the Host Name that you registered with your DDNS service provider.Enter the Username for your DDNS account.Enter the Password for your DDNS account.Enter a time (in hours).Enable Dynamic DNS:Server Address:Host Name:Username or Key:Password or Key:Timeout:DDNSThe DDNS feature allows you to host a server (Web, FTP, Game Server, etc…) using a domain name that you have purchased  (www.whateveryournameis.com)  with  your  dynamically  assigned  IP  address.  Most  broadband  Internet Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in your domain name to connect to your server no matter what your IP address is.
59D-Link DIR-855 User ManualSection 3 - ConfigurationThe  Ping Test  is  used  to  send  Ping  packets  to  test  if  a computer is on the Internet. Enter the IP Address that you wish to Ping, and click Ping.The results of your ping attempts will be displayed here.System CheckPing Test:Ping Results:
60D-Link DIR-855 User ManualSection 3 - ConfigurationEnter a name for your new schedule.Select  a  day,  a  range  of  days, or  All Week  to include every day.Check All Day - 24hrs or enter a start and end time for your schedule.Click Save to save your schedule. You must click Save Settings at the top for your schedules to go into effect.The list of schedules will be listed here. Click the Edit icon to make changes or click the Delete icon to remove the schedule.Name:Days:Time:Save:Schedule Rules List:SchedulesSchedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm.
61D-Link DIR-855 User ManualSection 3 - ConfigurationThis  page  displays  the  current  information  for  the  DIR-855.  It  will  display  the  LAN, WAN  (Internet),  and Wireless information. If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button will be displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP. If your Internet connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed. Use Disconnect to drop the PPPoE connection and use Connect to establish the PPPoE connection.Displays the router’s time and firmware version.Displays the MAC address and the public IP settings for the router.Displays  the  MAC  address  and  the  private  (local)  IP  settings  for  the router.Displays  the  wireless  MAC  address  and  your wireless  settings  such  as SSID and Channel.Displays computers and devices that are connected to the router via Ethernet and that are receiving an IP address assigned by the router (DHCP). Displays the Multicast Group IP Address.General:WAN:LAN:Wireless LAN:LAN Computers:IGMP Multicast Memberships:Device Information
62D-Link DIR-855 User ManualSection 3 - ConfigurationLogWhat to View:View Levels:Apply Log Settings:Refresh:Clear:Email Now:Save Log:You can select the types of messages that you want to display from the log. Firewall & Security, System, and Router Status messages can be selected.There  are  three  levels  of  message  importance: Informational, Warning,  and  Critical.  Select  the levels that you want displayed in the log.Will filter the log results  so that only the selected options appear.Updates the log details on the screen so it displays any recent activity.Clears all of the log contents.This  option  will  send  a  copy  of  the  router  log  to the email address configured in the Tools > Email screen.This option will save the router to a log file on your computer.The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of the events to view. This router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility.
63D-Link DIR-855 User ManualSection 3 - ConfigurationStatsThe screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-855 on both the Internet, LAN ports and both the 802.11n/g and 802.11a wireless bands. The traffic counter will reset if the device is rebooted.
64D-Link DIR-855 User ManualSection 3 - ConfigurationInternet SessionsThe Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer.
65D-Link DIR-855 User ManualSection 3 - ConfigurationThe wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless clients.WirelessThe WISH details page displays full details of wireless clients that are connected when WISH is enabled.WISH
66D-Link DIR-855 User ManualSection 3 - ConfigurationSupport
67D-Link DIR-855 User ManualSection 4 - SecurityWireless SecurityThis section will show you the different levels of security you can use to protect your data from intruders. The DIR-855 offers the following types of security:• WPA2 (Wi-Fi Protected Access 2)     • WPA2-PSK (Pre-Shared Key)• WPA (Wi-Fi Protected Access)      • WPA-PSK (Pre-Shared Key)What is WPA?WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy).  The 2 major improvements over WEP: • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP.• User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP  regulates  access  to  a  wireless  network  based  on  a  computer’s  hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network.WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your wireless router or access point.WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public key encryption system to ensure that only authorized network users can access the network.
68D-Link DIR-855 User ManualSection 4 - SecurityWireless Security Setup WizardTo run the security wizard, click on Setup at the top and then click Launch Wireless Security Setup Wizard.Check the Manually  set  5GHz  band  Network Name...  box to manually set your desired wireless network name for the 5GHz band.Type your desired wireless network name (SSID). Automatically: Select this option to automatically generate the router’s network key and click Next.Manually: Select this option to manually enter your network key and click Next.Check the “Use WPA encryption...” box to use WPA.
69D-Link DIR-855 User ManualSection 4 - SecurityIf  you  selected  Automatically,  the  summary  window  will display  your  settings. Write  down  the  security  key  and enter this on your wireless clients. Click Save to save your settings.
70D-Link DIR-855 User ManualSection 4 - SecurityFrom the Basic > Wizard screen, click Add Wireless Device with WPS.Add Wireless Device with WPS WizardPIN: Select this option to use PIN method. In order to use this method you must know the  wireless  client’s 8 digit PIN and click Connect.PBC: Select this option to use PBC (Push Button) method to add a wireless client. Click Connect.Select Auto to add a wireless client using WPS (Wi-Fi Protected Setup). Once you select Auto and click Connect, you will have a 120 second time limit to apply the settings to your wireless client(s) and successfully establish a connection. If you select Manual, a settings summary screen will appear. Write down the security key and enter this on your wireless clients.
71D-Link DIR-855 User ManualSection 4 - SecurityConfigure WPA-Personal (PSK)It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead.1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1).  Click on Setup and then click Wireless Settings on the left side.2. Next to Security Mode, select WPA-Personal.3. Next to WPA Mode, select Auto, WPA2 Only, or WPA Only. Use Auto if you have wireless clients using both WPA and WPA2.4. Next to Cypher Type, select TKIP and AES, TKIP, or AES.5. Next to Group Key Update Interval, enter the amount of time before the group key used for broadcast and multicast data is changed (3600 is default).6. Next to Pre-Shared Key, enter a key (passphrase). The key is entered as a pass-phrase in ASCII format at both ends of the wireless connection. The pass-phrase must be between 8-63 characters. 7. Click Save Settings to save your settings. If you are configuring the router with a wireless adapter, you will lose connectivity until you enable WPA-PSK on your adapter and enter the same passphrase as you did on the router.
72D-Link DIR-855 User ManualSection 4 - SecurityIt is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead.1.  Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1).  Click on Setup and then click Wireless Settings on the left side.2.  Next to Security Mode, select WPA-Enterprise.3.  Next to WPA Mode, select Auto, WPA2 Only, or WPA Only. Use Auto if you have wireless clients using both WPA and WPA2.4.  Next to Cypher Type, select TKIP and AES, TKIP, or AES.5.  Next to Group Key Update Interval, enter the amount of time before the group key used for broadcast and multicast data is changed (3600 is default).6.  Next to Authentication Timeout, enter the amount of time before a client is required to re-authenticate (60 minutes is default). 7.  Next to RADIUS Server IP Address enter the IP Address of your RADIUS server.Configure WPA-Enterprise (RADIUS)
73D-Link DIR-855 User ManualSection 4 - Security8. Next to RADIUS Server Port, enter the port you are using with your RADIUS server. 1812 is the default port.9. Next  to  RADIUS  Server  Shared  Secret,  enter  the  security key.10. If the MAC Address Authentication box is selected then the user will need to connect from the same computer whenever logging into the wireless network.11. Click Advanced to enter settings for a secondary RADIUS Server.12. Click Apply Settings to save your settings.
74D-Link DIR-855 User ManualSection 4 - SecurityConnect to a Wireless NetworkUsing Windows® Vista™Windows® Vista™ users may use the built-in wireless utility. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows® Vista™ utility as seen below.Right-click  on  the  wireless  computer  icon  in  your system  tray (lower-right  corner  next  to  the  time).  Select  Connect  to  a network.If you receive the Wireless Networks Detected bubble, click on the center of the bubble to access the utility.     orThe utility will display  any available wireless networks  in  your area. Click on a network (displayed using the SSID) and click the Connect button.If you get a good signal but cannot access the Internet, check you TCP/IP settings for your wireless adapter. Refer to the Networking Basics section in this manual for more information.
75D-Link DIR-855 User ManualSection 5 - Connecting to a Wireless NetworkConfigure Wireless SecurityIt is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the security key or passphrase being used.2.  Highlight  the  wireless  network  (SSID)  you  would  like  to connect to and click Connect.1.  Open the Windows® Vista™ Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower right corner of screen). Select Connect to a network.
76D-Link DIR-855 User ManualSection 5 - Connecting to a Wireless Network3.  Enter the same security key or passphrase that is on your router and click Connect.It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the security settings are correct. The key or passphrase must be exactly the same as on the wireless router.
77D-Link DIR-855 User ManualSection 5 - Connecting to a Wireless NetworkConnect Using WCN 2.0 in Windows Vista™ The router supports Wi-Fi protection, referred to as WCN 2.0 in Windows Vista™. The following instructions for setting this up depends on whether you are using Windows Vista™ to configure the router or third party software.        When you first set up the router, Wi-Fi protection is disabled and unconfigured. To enjoy the benefits of Wi-Fi protection, the router must be both enabled and configured. There are three basic methods to accomplish this: use Windows Vista’s built-in support for WCN 2.0, use software provided by a third party, or manually configure. If you are running Windows Vista™, log into the router and click the Enable checkbox in the Basic > Wireless section. Use the Current PIN that is displayed on the Advanced > Wi-Fi Protected Setup section or choose to click the Generate New PIN button or Reset PIN to Default button. For additional information, please refer to page 47.If you are using third party software to set up Wi-Fi Protection, carefully follow the directions. When you are finished, proceed to the next section to set up the newly-configured router.
78D-Link DIR-855 User ManualSection 5 - Connecting to a Wireless NetworkConnect to a Wireless NetworkUsing Windows® XPWindows® XP users may use the built-in wireless utility (Zero Configuration Utility). The following instructions are for Service Pack 2 users.  If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows® XP utility as seen below.Right-click  on  the  wireless  computer  icon  in  your  system  tray (lower-right  corner  next  to  the  time).  Select  View  Available Wireless Networks.If you receive the Wireless Networks Detected bubble, click on the center of the bubble to access the utility.     orThe  utility  will  display  any  available  wireless  networks  in  your area. Click on a network (displayed using the SSID) and click the Connect button.If you get a good signal but cannot access the Internet, check you TCP/IP settings for your wireless adapter. Refer to the Networking Basics section in this manual for more information.
79D-Link DIR-855 User ManualSection 5 - Connecting to a Wireless NetworkConfigure WPA-PSKIt is recommended to enable WPA on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the WPA key being used.2.  Highlight the wireless network (SSID) you would like to connect to and click Connect.1.  Open the Windows® XP Wireless Utility by right-clicking on  the  wireless  computer  icon  in  your  system  tray  (lower-right  corner  of  screen).  Select  View  Available Wireless Networks.
80D-Link DIR-855 User ManualSection 5 - Connecting to a Wireless Network3.  The  Wireless  Network  Connection  box  will  appear.  Enter  the WPA-PSK passphrase and click Connect.It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WPA-PSK settings are correct. The WPA-PSK  passphrase  must  be  exactly  the  same  as  on  the wireless router.

Navigation menu