D Link DIR855A1 Xtreme N DUO Media Router User Manual Manual Part 2
D Link Corporation Xtreme N DUO Media Router Manual Part 2
  
    D Link   >  
Contents
- 1. Manual Part 1
 - 2. Manual Part 2
 - 3. Manual Part 3
 
Manual Part 2

39D-Link DIR-855 User Manual
Section 3 - Configuration
Network Filters
Select Turn MAC Filtering Off, Allow MAC 
addresses  listed  below,  or  Deny  MAC 
addresses listed below from the drop-down 
menu. 
Enter  the  MAC  address  you  would  like  to 
filter.
To  find  the  MAC  address  on  a  computer, 
please refer to the Networking Basics section 
in this manual. 
Select a DHCP client from the drop-down menu 
and click << to copy that MAC Address. 
Click to remove the MAC address.
Configure MAC 
Filtering:
MAC Address:
DHCP Client:
Clear:
Use MAC (Media Access Control) Filters to allow or deny LAN (Local Area Network) computers by their MAC addresses 
from accessing the Network. You can either manually add a MAC address or select the MAC address from the list of 
clients that are currently connected to the Broadband Router.

40D-Link DIR-855 User Manual
Section 3 - Configuration
Access Control
Click the Add Policy button to start the Access 
Control Wizard. 
Add Policy:
The Access Control section allows you to control access in and out of your network. Use this feature as Parental Controls 
to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications 
like P2P utilities or games.
Click Next to continue with the wizard.
Access Control Wizard

41D-Link DIR-855 User Manual
Section 3 - Configuration
Enter a name for the policy and then click Next to continue.
Access Control Wizard (continued)
Select a schedule (I.E. Always)  from  the  drop-down menu 
and then click Next to continue.
Enter  the  following  information  and  then  click  Next  to 
continue.
• Address Type - Select IP address, MAC address, or 
Other Machines.
• IP Address - Enter the IP address of the computer 
you want to apply the rule to.

42D-Link DIR-855 User Manual
Section 3 - Configuration
Select the filtering method and then click Next to continue.
Access Control Wizard (continued)
Enter the rule:
 Enable - Check to enable the rule.
 Name - Enter a name for your rule.
 Dest IP Start - Enter the starting IP address.
 Dest IP End - Enter the ending IP address.
 Protocol - Select the protocol.
 Dest Port Start - Enter the starting port number.
 Dest Port End - Enter the ending port number.
To enable web logging, click Enable.
Click Save to save the access control rule.

43D-Link DIR-855 User Manual
Section 3 - Configuration
Add Website 
Filtering Rule:
Website URL/
Domain:
Website Filters
Select Allow or Deny.
Enter the keywords or URLs that you want to 
allow or block. Click Save Settings.
Website Filters are used to allow you to set up a list of allowed Web sites that can be used by multiple users through 
the network. To use this feature select to Allow or Deny, enter the domain or website and click Save Settings. You 
must also select Apply Web Filter under the Access Control section (page 40).

44D-Link DIR-855 User Manual
Section 3 - Configuration
Enter a name for the inbound filter rule.
Select Allow or Deny.
Check to enable rule.
Enter the starting IP address. Enter 0.0.0.0 
if you do not want to specify an IP range.
Enter  the  ending  IP  address.  Enter 
255.255.255.255  if  you  do  not  want  to 
specify and IP range.
Click the Add button to apply your settings. 
You must click Save Settings at the top to 
save the settings.
This section will list any rules that are created. 
You may click the Edit icon to change the 
settings or enable/disable the rule, or click 
the Delete icon to remove the rule.
Name:
Action:
Enable:
Remote IP Start:
Remote IP End:
Add:
Inbound Filter 
Rules List:
The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you 
can configure inbound data filtering rules that control data based on an IP address range.  Inbound Filters can be used 
with Virtual Server, Port Forwarding, or Remote Administration features.
Inbound Filters

45D-Link DIR-855 User Manual
Section 3 - Configuration
SPI  (Stateful  Packet  Inspection,  also  known  as  dynamic  packet 
filtering) helps to prevent cyber attacks by tracking more state per 
session.  It  validates  that  the  traffic  passing  through  the  session 
conforms to the protocol.
Select one of the following for TCP and UDP ports:
Endpoint Independent - Any incoming traffic sent to an open port 
will be forwarded to the application that opened the port. The port 
will close if idle for 5 minutes.
Address Restricted - Incoming traffic must match the IP address 
of the outgoing connection.
Address + Port Restriction - Incoming traffic must match the IP 
address and port of the outgoing connection.
Enable this feature to protect your network from certain kinds of 
“spoofing” attacks. 
If an application has trouble working from behind the router, you 
can expose one computer to the Internet and run the application 
on that computer.
Note: Placing a computer in the DMZ may expose that computer to 
a variety of security risks. Use of this option is only recommended 
as a last resort.
Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer 
obtains it’s IP address automatically using DHCP, be sure to make a static reservation on the Basic > DHCP page so that 
the IP address of the DMZ machine does not change.
Enable SPI:
NAT Endpoint 
Filtering:
Anti-Spoof Check:
Enable DMZ:
DMZ IP Address:
Firewall Settings
A firewall protects your network from the outside world. The DIR-855 offers a firewall type functionality. The SPI feature 
helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of 
applications. If you choose to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone. This option 
will expose the chosen computer completely to the outside world.

46D-Link DIR-855 User Manual
Section 3 - Configuration
Application Level Gateway (ALG) Configuration
Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to 
make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol 
or application. A number of ALGs for common applications are enabled by default.
Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol. 
Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec 
through NAT. This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your 
corporate network, try turning this ALG off. Please check with the system adminstrator of your corporate network whether 
your VPN client supports NAT traversal.
PPTP:
IPSEC (VPN):

47D-Link DIR-855 User Manual
Section 3 - Configuration
Set the transmit power of the antennas.
Beacons are packets sent by an Access Point to 
synchronize a wireless network. Specify a value. 
100 is the default setting and is recommended. 
This value should remain at its default setting of 
2432. If inconsistent data flow is a problem, only 
a minor modification should be made.
The fragmentation threshold, which is specified 
in  bytes,  determines  whether  packets  will  be 
fragmented.  Packets  exceeding  the  2346  byte 
setting will be fragmented before transmission. 
2346 is the default setting. 
(Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window 
for listening to broadcast and multicast messages.
This enables 802.11d operation. 802.11d is a wireless specification developed to allow implementation of wireless networks in 
countries that cannot use the 802.11 standard. This feature should only be enabled if you are in a country that requires it.
When checked, it will disable the ability for computers on the wireless network from seeing each other, but will allow you to 
see computers on the wired network.
WMM  is  QoS for your wireless  network. This  will  improve  the  quality  of  video  and  voice applications  for  your wireless 
clients.
Aggregated-MAC Packet Data Unit, is a group of MPDUs which built an PSDU (Physical Service Data Unit). It has lower 
overhead and provides robust recovery in case of loss.
Check this box to reduce the guard interval time therefore increasing the data capacity.  However, it’s less reliable and may 
create higher data loss.
Transmit Power:
Beacon Period:
RTS Threshold:
Fragmentation 
Threshold:
DTIM Interval:
802.11d:
Wireless Isolation:
WMM Function:
A-MPDU 
Aggregation:
Short GI:
Advanced Wireless Settings
802.11n/g (2.4GHz)

48D-Link DIR-855 User Manual
Section 3 - Configuration
Advanced Wireless Settings
802.11n/a (5GHz)
Set the transmit power of the antennas.
Beacons are packets sent by an Access Point to 
synchronize a wireless network. Specify a value. 
100 is the default setting and is recommended. 
This value should remain at its default setting of 
2432. If inconsistent data flow is a problem, only 
a minor modification should be made.
The fragmentation threshold, which is specified 
in  bytes,  determines  whether  packets  will  be 
fragmented.  Packets  exceeding  the  2346  byte 
setting  will  be  fragmented  before  transmission. 
2346 is the default setting. 
(Delivery Traffic  Indication  Message)  3  is  the 
default  setting.  A  DTIM  is  a  countdown  informing  clients  of  the  next  window  for  listening  to  broadcast  and  multicast 
messages.
This enables 802.11d opration. 802.11d is a wireless specification developed to allow implementation of wireless networks in 
countries that cannot use the 802.11 standard. This feature should only be enabled if you are in a country that requires it.
When checked, it will disable the ability for computers on the wireless network from seeing each other, but will allow you to 
see computers on the wired network.
WMM  is  QoS for your wireless  network. This  will  improve  the  quality  of  video  and  voice applications  for  your wireless 
clients.
Aggregated-MAC Packet Data Unit, is a group of MPDUs which built an PSDU (Physical Service Data Unit). It will lower 
overhead and provides robust recovery in case of loss.
Check this box to reduce the guard interval time therefore increasing the data capacity.  However, it’s less reliable and may 
create higher data loss.
Transmit Power:
Beacon Period:
RTS Threshold:
Fragmentation 
Threshold:
DTIM Interval:
802.11d:
Wireless Isolation:
WMM Function:
A-MPDU 
Aggregation:
Short GI:

49D-Link DIR-855 User Manual
Section 3 - Configuration
WISH Settings
WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using 
a wireless network by prioritizing the traffic of different applications. 
Enable this option if you want to allow WISH 
to prioritize your traffic. 
Enable WISH:
Allows the router to recognize HTTP transfers 
for  many  common  audio  and  video  streams 
and  prioritize them  above other  traffic. Such 
streams are frequently used by digital media 
players. 
HTTP:
Enables the router to recognize certain audio 
and video streams generated by a Windows 
Media Center PC and to prioritize these above 
other traffic. Such streams are used by systems 
known as Windows Media Extenders, such as 
the Xbox 360. 
Windows Media 
Center:
When enabled, this option causes the router 
to  automatically  attempt  to  prioritize  traffic 
streams  that  it  doesn’t  otherwise  recognize, 
based  on  the  behaviour that  the  streams 
exhibit. This  acts to deprioritize streams that 
exhibit  bulk  transfer  characteristics,  such  as 
file transfers, while  leaving interactive  traffic, 
such as gaming or VoIP, running at a normal 
priority.
Automatic:
WISH Rules: A WISH Rule identifies a specific message flow and assigns a priority to that flow. For most applications, the priority classifiers 
ensure the right priorities and specific WISH Rules are not required. 
WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest 
priority will be used. 

50D-Link DIR-855 User Manual
Section 3 - Configuration
Create a name for the rule that is meaningful 
to you.
Name:
The  priority  of  the  message  flow  is  entered 
here. The four priorities are defined as:
BK: Background (least urgent)
BE: Best Effort.
VI: Video
VO: Voice (most urgent)
Priority:
The protocol used by the messages. 
Protocol:
The rule applies to a flow of messages for which one computer’s IP address falls within the range set here.  
Host IP Range:
The rule applies to a flow of messages for which host’s port number is within the range set here. 
Host Port Range:

51D-Link DIR-855 User Manual
Section 3 - Configuration
UPnP
Internet Ping Block
Internet Port Speed
Multicast Streams
To use the Universal Plug and Play (UPnP™) feature 
click on Enabled. UPNP provides compatibility with 
networking equipment, software and peripherals.
Unchecking the box will not allow the DIR-855 to 
respond to pings. Blocking the Ping may provide 
some extra security from hackers. Check the box 
to allow the Internet port to be “pinged”.
Select  from  the  drop-down  menu  if  you  would 
like to apply the Inbound Filter to the WAN ping. 
Refer to page 44 for more information regarding 
Inbound Filter.
You  may set  the  port speed of the Internet port 
to 10Mbps, 100Mbps, or auto. Some older cable 
or DSL modems may require you to set the port 
speed to 10Mbps.
Check the  box  to  allow  multicast  traffic  to  pass 
through the router from the Internet.
Enable UPnP:
WAN Ping:
WAN Ping Inbound 
Filter:
WAN Port Speed:
Multicast streams:
Advanced Network Settings

52D-Link DIR-855 User Manual
Section 3 - Configuration
Change Password
Remote Management
Enter a new password for the Administrator Login Name. 
The administrator can make changes to the settings.
Enter the new password for the User login. If you login as 
the User, you can only see the settings, but cannot change 
them.
Enter a name for the DIR-855 router.
Remote management allows the DIR-855 to be configured 
from  the  Internet  by  a  web  browser.  A  username  and 
password is still required to access the Web-Management 
interface. In general, only a member of your network can 
browse  the  built-in  web  pages  to  perform  Administrator 
tasks. This feature enables you to perform Administrator 
tasks from the remote (Internet) host.
The port number used to access the DIR-855.
Example: http://x.x.x.x:8080 whereas x.x.x.x is the Internet  
IP address of the DIR-855 and 8080 is the port used for 
the Web Management interface.
This section will list any rules that are created. You may 
click the Edit icon to change the settings or enable/disable 
the rule, or click the Delete icon to remove the rule.
Admin Password:
User Password:
System Name:
Remote 
Management:
Remote Admin Port:
Inbound Filter:
Administrator Settings
This page will allow you to change the Administrator and User passwords. You can also enable Remote Management.  
There are two accounts that can access the management interface through the web browser. The accounts are admin 
and user. Admin has read/write access while user has read-only access. User can only view the settings but cannot 
make any changes. Only the admin account has the ability to change both admin and user account passwords.

53D-Link DIR-855 User Manual
Section 3 - Configuration
Time Settings
Select  the Time  Zone  from  the  drop-down 
menu.
To select Daylight Saving time manually, select 
enabled or disabled, and enter a start date and 
an end date for daylight saving time.
NTP  is  short  for  Network Time  Protocol. 
NTP synchronizes computer clock times in a 
network of computers. Check this box to use a 
NTP server. This will only connect to a server 
on the Internet, not a local server.
Enter the NTP server or select one from the 
drop-down menu.
To manually input the time, enter the values 
in these fields for the Year, Month, Day, Hour, 
Minute, and Second and then click Set Time. 
You  can  also  click  Copy Your  Computer’s 
Time Settings.
Time Zone:
Daylight Saving:
Enable NTP Server:
NTP Server Used:
Manual:
The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system 
clock. From this section you can set the time zone that you are in and set the Time Server. Daylight Saving can also 
be configured to automatically adjust the time when needed.

54D-Link DIR-855 User Manual
Section 3 - Configuration
SysLog
The Broadband Router keeps a running log of events and activities occurring on the Router. You may send these logs 
to a SysLog server on your network.
Enable Logging to 
SysLog Server:
SysLog Server IP 
Address:
Check this box  to send  the  router  logs to  a 
SysLog Server.
The address of the SysLog server that will be 
used  to  send  the  logs. You  may also  select 
your computer from the drop-down menu (only 
if receiving an IP address from the router via 
DHCP).

55D-Link DIR-855 User Manual
Section 3 - Configuration
Email Settings
The Email feature can be used to send the system log files, router alert messages, and firmware update notification 
to your email address. 
Enable Email 
Notification: 
From Email 
Address:
To Email Address:
SMTP Server 
Address:
Enable 
Authentication:
Account Name:
Password:
On Log Full:
On Schedule:
Schedule:
When this option is enabled, router activity logs 
are e-mailed to a designated email address.
This email address will appear as the sender 
when you receive a log file or firmware upgrade 
notification via email.
Enter the  email  address  where you want the 
email sent. 
Enter the SMTP server address for sending email. 
If  your  SMTP  server  requires  authentication, 
select this option.
Check this  box if your SMTP server requires 
authentication. 
Enter your account for sending email.
Enter  the  password  associated  with  the 
account. Re-type the password associated with 
the account.
When this option is selected, logs will be sent 
via email when the log is full.
Selecting this option will send the logs via email 
according to schedule.
This option is enabled when On Schedule is selected. You can select a schedule from the list of defined schedules. To create 
a schedule, go to Tools > Schedules.

56D-Link DIR-855 User Manual
Section 3 - Configuration
Use  this  option  to  save  the  current  router 
configuration settings to a file on the hard disk 
of the computer you are using. First, click the 
Save button. You will then  see  a file  dialog, 
where you can select a location and file name 
for the settings. 
Use  this  option  to  load  previously  saved 
router  configuration  settings.  First,  use  the 
Browse  control  to  find  a  previously  save 
file  of  configuration  settings. Then,  click the 
Load button to transfer those settings to the 
router. 
This  option  will  restore  all  configuration 
settings back to the settings that were in effect 
at the time the router was shipped from the 
factory. Any settings that have not been saved 
will be lost, including any rules that you have 
created. If you want to save the current router 
configuration  settings,  use  the  Save  button 
above. 
Click to reboot the router.
Save Settings to 
Local Hard Drive:
Load Settings from 
Local Hard Drive:
Restore to Factory 
Default Settings:
Reboot Device:
System Settings
This section allows you to manage the router’s configuration settings, reboot the router, and restore the router to the 
factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that 
you’ve created.

57D-Link DIR-855 User Manual
Section 3 - Configuration
Click on Check Now to find out if there is an 
updated  firmware;  if  so,  download  the  new 
firmware to your hard drive.
After you have downloaded the new firmware, 
click Browse to locate the firmware update on 
your hard drive.  Click Upload to complete the 
firmware upgrade.
Check Automatically  Check Online  for 
Latest Firmware Version to have the router 
check automatically  to  see  if  there  is  a  new 
firmware upgrade.
Check Email Notification of Newer Firmware 
Version to have the router send an email when 
there is a new firmware available.
Firmware Upgrade:
Browse:
Notifications 
Options:
Update Firmware
You can upgrade the firmware of the Router here. Make sure the firmware you want to use is on the local hard drive of 
the computer. Click on Browse to locate the firmware file to be used for the update. Please check the D-Link support 
site for firmware updates at http://support.dlink.com. You can download firmware upgrades to your hard drive from the 
D-Link support site.

58D-Link DIR-855 User Manual
Section 3 - Configuration
Dynamic Domain Name System is a method of 
keeping a domain name linked to a changing 
IP Address. Check the box to enable DDNS.
Choose  your  DDNS  provider  from  the  drop 
down menu.
Enter the Host Name that you registered with 
your DDNS service provider.
Enter the Username for your DDNS account.
Enter the Password for your DDNS account.
Enter a time (in hours).
Enable Dynamic 
DNS:
Server Address:
Host Name:
Username or Key:
Password or Key:
Timeout:
DDNS
The DDNS feature allows you to host a server (Web, FTP, Game Server, etc…) using a domain name that you have 
purchased  (www.whateveryournameis.com)  with  your  dynamically  assigned  IP  address.  Most  broadband  Internet 
Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in 
your domain name to connect to your server no matter what your IP address is.

59D-Link DIR-855 User Manual
Section 3 - Configuration
The  Ping Test  is  used  to  send  Ping  packets  to  test  if  a 
computer is on the Internet. Enter the IP Address that you 
wish to Ping, and click Ping.
The results of your ping attempts will be displayed here.
System Check
Ping Test:
Ping Results:

60D-Link DIR-855 User Manual
Section 3 - Configuration
Enter a name for your new schedule.
Select  a  day,  a  range  of  days, or  All Week  to 
include every day.
Check All Day - 24hrs or enter a start and end 
time for your schedule.
Click Save to save your schedule. You must click 
Save Settings at the top for your schedules to 
go into effect.
The list of schedules will be listed here. Click the 
Edit icon to make changes or click the Delete 
icon to remove the schedule.
Name:
Days:
Time:
Save:
Schedule Rules 
List:
Schedules
Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 
3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and 
End Time of 8pm. 

61D-Link DIR-855 User Manual
Section 3 - Configuration
This  page  displays  the  current  information  for  the  DIR-855.  It  will  display  the  LAN, WAN  (Internet),  and Wireless 
information. If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button 
will be displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP. 
If your Internet connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed. Use 
Disconnect to drop the PPPoE connection and use Connect to establish the PPPoE connection.
Displays the router’s time and firmware version.
Displays the MAC address and the public IP settings for the router.
Displays  the  MAC  address  and  the  private  (local)  IP  settings  for  the 
router.
Displays  the  wireless  MAC  address  and  your wireless  settings  such  as 
SSID and Channel.
Displays computers and devices that are connected to the router via Ethernet 
and that are receiving an IP address assigned by the router (DHCP). 
Displays the Multicast Group IP Address.
General:
WAN:
LAN:
Wireless LAN:
LAN Computers:
IGMP Multicast 
Memberships:
Device Information

62D-Link DIR-855 User Manual
Section 3 - Configuration
Log
What to View:
View Levels:
Apply Log Settings:
Refresh:
Clear:
Email Now:
Save Log:
You can select the types of messages that you want 
to display from the log. Firewall & Security, System, 
and Router Status messages can be selected.
There  are  three  levels  of  message  importance: 
Informational, Warning,  and  Critical.  Select  the 
levels that you want displayed in the log.
Will filter the log results  so that only the selected 
options appear.
Updates the log details on the screen so it displays 
any recent activity.
Clears all of the log contents.
This  option  will  send  a  copy  of  the  router  log  to 
the email address configured in the Tools > Email 
screen.
This option will save the router to a log file on your 
computer.
The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal 
memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows 
you to view the router logs. You can define what types of events you want to view and the level of the events to view. 
This router also has external Syslog Server support so you can send the log files to a computer on your network that 
is running a Syslog utility.

63D-Link DIR-855 User Manual
Section 3 - Configuration
Stats
The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-855 on 
both the Internet, LAN ports and both the 802.11n/g and 802.11a wireless bands. The traffic counter will reset if the 
device is rebooted.

64D-Link DIR-855 User Manual
Section 3 - Configuration
Internet Sessions
The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a 
conversation between a program or application on a LAN-side computer and a program or application on a WAN-side 
computer. 

65D-Link DIR-855 User Manual
Section 3 - Configuration
The wireless client table displays a list of current connected wireless clients. This table also displays the connection 
time and MAC address of the connected wireless clients.
Wireless
The WISH details page displays full details of wireless clients that are connected when WISH is enabled.
WISH

66D-Link DIR-855 User Manual
Section 3 - Configuration
Support

67D-Link DIR-855 User Manual
Section 4 - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The 
DIR-855 offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2)     • WPA2-PSK (Pre-Shared Key)
• WPA (Wi-Fi Protected Access)      • WPA-PSK (Pre-Shared Key)
What is WPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired 
Equivalent Privacy).  
The 2 major improvements over WEP: 
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys 
using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t 
been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead 
of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol 
(EAP). WEP  regulates  access  to  a  wireless  network  based  on  a  computer’s  hardware-specific MAC 
address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key 
encryption system to ensure that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric 
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must 
be the exact same key entered on your wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a 
more secure public key encryption system to ensure that only authorized network users can access the network.

68D-Link DIR-855 User Manual
Section 4 - Security
Wireless Security Setup Wizard
To run the security wizard, click on Setup at the top and then 
click Launch Wireless Security Setup Wizard.
Check the Manually  set  5GHz  band  Network Name...  box to 
manually set your desired wireless network name for the 5GHz 
band.
Type your desired wireless network name (SSID). 
Automatically: Select this option to automatically generate 
the router’s network key and click Next.
Manually: Select this option to manually enter your network 
key and click Next.
Check the “Use WPA encryption...” box to use WPA.

69D-Link DIR-855 User Manual
Section 4 - Security
If  you  selected  Automatically,  the  summary  window  will 
display  your  settings. Write  down  the  security  key  and 
enter this on your wireless clients. Click Save to save your 
settings.

70D-Link DIR-855 User Manual
Section 4 - Security
From the Basic > Wizard screen, click Add Wireless Device 
with WPS.
Add Wireless Device with WPS Wizard
PIN: Select this option to use PIN method. In order to use this 
method you must know the  wireless  client’s 8 digit PIN and 
click Connect.
PBC: Select this option to use PBC (Push Button) method to 
add a wireless client. Click Connect.
Select Auto to add a wireless client using WPS (Wi-Fi Protected 
Setup). Once you select Auto and click Connect, you will have 
a 120 second time limit to apply the settings to your wireless 
client(s) and successfully establish a connection. 
If you select Manual, a settings summary screen will appear. 
Write down the security key and enter this on your wireless 
clients. 

71D-Link DIR-855 User Manual
Section 4 - Security
Configure WPA-Personal (PSK)
It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish 
wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to 
the added overhead.
1. Log into the web-based configuration by opening a web browser 
and entering the IP address of the router (192.168.0.1).  Click 
on Setup and then click Wireless Settings on the left side.
2. Next to Security Mode, select WPA-Personal.
3. Next to WPA Mode, select Auto, WPA2 Only, or WPA Only. Use 
Auto if you have wireless clients using both WPA and WPA2.
4. Next to Cypher Type, select TKIP and AES, TKIP, or AES.
5. Next to Group Key Update Interval, enter the amount of time 
before the group key used for broadcast and multicast data is 
changed (3600 is default).
6. Next to Pre-Shared Key, enter a key (passphrase). The key is entered as a pass-phrase in ASCII format at both ends 
of the wireless connection. The pass-phrase must be between 8-63 characters. 
7. Click Save Settings to save your settings. If you are configuring the router with a wireless adapter, you will lose 
connectivity until you enable WPA-PSK on your adapter and enter the same passphrase as you did on the router.

72D-Link DIR-855 User Manual
Section 4 - Security
It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish 
wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to 
the added overhead.
1.  Log into the web-based configuration by opening a web browser 
and entering the IP address of the router (192.168.0.1).  Click 
on Setup and then click Wireless Settings on the left side.
2.  Next to Security Mode, select WPA-Enterprise.
3.  Next to WPA Mode, select Auto, WPA2 Only, or WPA Only. Use 
Auto if you have wireless clients using both WPA and WPA2.
4.  Next to Cypher Type, select TKIP and AES, TKIP, or AES.
5.  Next to Group Key Update Interval, enter the amount of time 
before the group key used for broadcast and multicast data is 
changed (3600 is default).
6.  Next to Authentication Timeout, enter the amount of time before 
a client is required to re-authenticate (60 minutes is default). 
7.  Next to RADIUS Server IP Address enter the IP Address of your RADIUS server.
Configure WPA-Enterprise (RADIUS)

73D-Link DIR-855 User Manual
Section 4 - Security
8. Next to RADIUS Server Port, enter the port you are using with 
your RADIUS server. 1812 is the default port.
9. Next  to  RADIUS  Server  Shared  Secret,  enter  the  security 
key.
10. If the MAC Address Authentication box is selected then the 
user will need to connect from the same computer whenever 
logging into the wireless network.
11. Click Advanced to enter settings for a secondary RADIUS 
Server.
12. Click Apply Settings to save your settings.

74D-Link DIR-855 User Manual
Section 4 - Security
Connect to a Wireless Network
Using Windows® Vista™
Windows® Vista™ users may use the built-in wireless utility. If you are using another company’s utility or Windows® 2000, 
please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities 
will have a “site survey” option similar to the Windows® Vista™ utility as seen below.
Right-click  on  the  wireless  computer  icon  in  your system  tray 
(lower-right  corner  next  to  the  time).  Select  Connect  to  a 
network.
If you receive the Wireless Networks Detected bubble, click on 
the center of the bubble to access the utility.
     or
The utility will display  any available wireless networks  in  your 
area. Click on a network (displayed using the SSID) and click 
the Connect button.
If you get a good signal but cannot access the Internet, check you 
TCP/IP settings for your wireless adapter. Refer to the Networking 
Basics section in this manual for more information.

75D-Link DIR-855 User Manual
Section 5 - Connecting to a Wireless Network
Configure Wireless Security
It is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring 
your wireless adapter. If you are joining an existing network, you will need to know the security key or passphrase 
being used.
2.  Highlight  the  wireless  network  (SSID)  you  would  like  to 
connect to and click Connect.
1.  Open the Windows® Vista™ Wireless Utility by right-clicking 
on the wireless computer icon in your system tray (lower right 
corner of screen). Select Connect to a network. 

76D-Link DIR-855 User Manual
Section 5 - Connecting to a Wireless Network
3.  Enter the same security key or passphrase that is on your router 
and click Connect.
It may take 20-30 seconds to connect to the wireless network. If the 
connection fails, please verify that the security settings are correct. 
The key or passphrase must be exactly the same as on the wireless 
router.

77D-Link DIR-855 User Manual
Section 5 - Connecting to a Wireless Network
Connect Using WCN 2.0 in Windows Vista™ 
The router supports Wi-Fi protection, referred to as WCN 2.0 in Windows Vista™. The following instructions for setting 
this up depends on whether you are using Windows Vista™ to configure the router or third party software.        
When you first set up the router, Wi-Fi protection is disabled and unconfigured. To enjoy the benefits of Wi-Fi protection, 
the router must be both enabled and configured. There are three basic methods to accomplish this: use Windows Vista’s 
built-in support for WCN 2.0, use software provided by a third party, or manually configure. 
If you are running Windows Vista™, log into the router and click the Enable checkbox in the Basic > Wireless section. 
Use the Current PIN that is displayed on the Advanced > Wi-Fi Protected Setup section or choose to click the Generate 
New PIN button or Reset PIN to Default button. 
For additional information, please refer to page 47.
If you are using third party software to set up Wi-Fi Protection, carefully follow the directions. When you are finished, 
proceed to the next section to set up the newly-configured router.

78D-Link DIR-855 User Manual
Section 5 - Connecting to a Wireless Network
Connect to a Wireless Network
Using Windows® XP
Windows® XP users may use the built-in wireless utility (Zero Configuration Utility). The following instructions are for 
Service Pack 2 users.  If you are using another company’s utility or Windows® 2000, please refer to the user manual 
of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option 
similar to the Windows® XP utility as seen below.
Right-click  on  the  wireless  computer  icon  in  your  system  tray 
(lower-right  corner  next  to  the  time).  Select  View  Available 
Wireless Networks.
If you receive the Wireless Networks Detected bubble, click on 
the center of the bubble to access the utility.
     or
The  utility  will  display  any  available  wireless  networks  in  your 
area. Click on a network (displayed using the SSID) and click the 
Connect button.
If you get a good signal but cannot access the Internet, check you 
TCP/IP settings for your wireless adapter. Refer to the Networking 
Basics section in this manual for more information.

79D-Link DIR-855 User Manual
Section 5 - Connecting to a Wireless Network
Configure WPA-PSK
It is recommended to enable WPA on your wireless router or access point before configuring your wireless adapter. If 
you are joining an existing network, you will need to know the WPA key being used.
2.  Highlight the wireless network (SSID) you would like to 
connect to and click Connect.
1.  Open the Windows® XP Wireless Utility by right-clicking 
on  the  wireless  computer  icon  in  your  system  tray  
(lower-right  corner  of  screen).  Select  View  Available 
Wireless Networks. 

80D-Link DIR-855 User Manual
Section 5 - Connecting to a Wireless Network
3.  The  Wireless  Network  Connection  box  will  appear.  Enter  the 
WPA-PSK passphrase and click Connect.
It may take 20-30 seconds to connect to the wireless network. If the 
connection fails, please verify that the WPA-PSK settings are correct. 
The WPA-PSK  passphrase  must  be  exactly  the  same  as  on  the 
wireless router.