D Link DIR855A1 Xtreme N DUO Media Router User Manual Manual Part 2
D Link Corporation Xtreme N DUO Media Router Manual Part 2
D Link >
Contents
- 1. Manual Part 1
- 2. Manual Part 2
- 3. Manual Part 3
Manual Part 2
Section 3 - Configuration Network Filters Use MAC (Media Access Control) Filters to allow or deny LAN (Local Area Network) computers by their MAC addresses from accessing the Network. You can either manually add a MAC address or select the MAC address from the list of clients that are currently connected to the Broadband Router. Configure MAC Select Turn MAC Filtering Off, Allow MAC Filtering: addresses listed below, or Deny MAC addresses listed below from the drop-down menu. MAC Address: Enter the MAC address you would like to filter. To find the MAC address on a computer, please refer to the Networking Basics section in this manual. DHCP Client: Select a DHCP client from the drop-down menu and click << to copy that MAC Address. Clear: Click to remove the MAC address. D-Link DIR-855 User Manual 39 Section 3 - Configuration Access Control The Access Control section allows you to control access in and out of your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications like P2P utilities or games. Add Policy: Click the Add Policy button to start the Access Control Wizard. Access Control Wizard Click Next to continue with the wizard. D-Link DIR-855 User Manual 40 Section 3 - Configuration Access Control Wizard (continued) Enter a name for the policy and then click Next to continue. Select a schedule (I.E. Always) from the drop-down menu and then click Next to continue. Enter the following information and then click Next to continue. • Address Type - Select IP address, MAC address, or Other Machines. • IP Address - Enter the IP address of the computer you want to apply the rule to. D-Link DIR-855 User Manual 41 Section 3 - Configuration Access Control Wizard (continued) Select the filtering method and then click Next to continue. Enter the rule: Enable - Check to enable the rule. Name - Enter a name for your rule. Dest IP Start - Enter the starting IP address. Dest IP End - Enter the ending IP address. Protocol - Select the protocol. Dest Port Start - Enter the starting port number. Dest Port End - Enter the ending port number. To enable web logging, click Enable. Click Save to save the access control rule. D-Link DIR-855 User Manual 42 Section 3 - Configuration Website Filters Website Filters are used to allow you to set up a list of allowed Web sites that can be used by multiple users through the network. To use this feature select to Allow or Deny, enter the domain or website and click Save Settings. You must also select Apply Web Filter under the Access Control section (page 40). Add Website Select Allow or Deny. Filtering Rule: Website URL/ Enter the keywords or URLs that you want to Domain: allow or block. Click Save Settings. D-Link DIR-855 User Manual 43 Section 3 - Configuration Inbound Filters The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters can be used with Virtual Server, Port Forwarding, or Remote Administration features. Name: Enter a name for the inbound filter rule. Action: Select Allow or Deny. Enable: Check to enable rule. Remote IP Start: Enter the starting IP address. Enter 0.0.0.0 if you do not want to specify an IP range. Remote IP End: Enter the ending IP address. Enter 255.255.255.255 if you do not want to specify and IP range. Add: Click the Add button to apply your settings. You must click Save Settings at the top to save the settings. Inbound Filter This section will list any rules that are created. Rules List: You may click the Edit icon to change the settings or enable/disable the rule, or click the Delete icon to remove the rule. D-Link DIR-855 User Manual 44 Section 3 - Configuration Firewall Settings A firewall protects your network from the outside world. The DIR-855 offers a firewall type functionality. The SPI feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world. Enable SPI: SPI (Stateful Packet Inspection, also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol. NAT Endpoint Select one of the following for TCP and UDP ports: Filtering: Endpoint Independent - Any incoming traffic sent to an open port will be forwarded to the application that opened the port. The port will close if idle for 5 minutes. Address Restricted - Incoming traffic must match the IP address of the outgoing connection. Address + Port Restriction - Incoming traffic must match the IP address and port of the outgoing connection. Anti-Spoof Check: Enable this feature to protect your network from certain kinds of “spoofing” attacks. Enable DMZ: If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer. Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort. DMZ IP Address: Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer obtains it’s IP address automatically using DHCP, be sure to make a static reservation on the Basic > DHCP page so that the IP address of the DMZ machine does not change. D-Link DIR-855 User Manual 45 Section 3 - Configuration Application Level Gateway (ALG) Configuration Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol or application. A number of ALGs for common applications are enabled by default. PPTP: Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol. IPSEC (VPN): Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec through NAT. This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your corporate network, try turning this ALG off. Please check with the system adminstrator of your corporate network whether your VPN client supports NAT traversal. D-Link DIR-855 User Manual 46 Section 3 - Configuration Advanced Wireless Settings 802.11n/g (2.4GHz) Transmit Power: Set the transmit power of the antennas. Beacon Period: Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value. 100 is the default setting and is recommended. RTS Threshold: This value should remain at its default setting of 2432. If inconsistent data flow is a problem, only a minor modification should be made. Fragmentation The fragmentation threshold, which is specified Threshold: in bytes, determines whether packets will be fragmented. Packets exceeding the 2346 byte setting will be fragmented before transmission. 2346 is the default setting. DTIM Interval: (Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. 802.11d: This enables 802.11d operation. 802.11d is a wireless specification developed to allow implementation of wireless networks in countries that cannot use the 802.11 standard. This feature should only be enabled if you are in a country that requires it. Wireless Isolation: When checked, it will disable the ability for computers on the wireless network from seeing each other, but will allow you to see computers on the wired network. WMM Function: WMM is QoS for your wireless network. This will improve the quality of video and voice applications for your wireless clients. A-MPDU Aggregated-MAC Packet Data Unit, is a group of MPDUs which built an PSDU (Physical Service Data Unit). It has lower Aggregation: overhead and provides robust recovery in case of loss. Short GI: Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may create higher data loss. D-Link DIR-855 User Manual 47 Section 3 - Configuration Advanced Wireless Settings 802.11n/a (5GHz) Transmit Power: Set the transmit power of the antennas. Beacon Period: Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value. 100 is the default setting and is recommended. RTS Threshold: This value should remain at its default setting of 2432. If inconsistent data flow is a problem, only a minor modification should be made. Fragmentation The fragmentation threshold, which is specified Threshold: in bytes, determines whether packets will be fragmented. Packets exceeding the 2346 byte setting will be fragmented before transmission. 2346 is the default setting. DTIM Interval: (Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. 802.11d: This enables 802.11d opration. 802.11d is a wireless specification developed to allow implementation of wireless networks in countries that cannot use the 802.11 standard. This feature should only be enabled if you are in a country that requires it. Wireless Isolation: When checked, it will disable the ability for computers on the wireless network from seeing each other, but will allow you to see computers on the wired network. WMM Function: WMM is QoS for your wireless network. This will improve the quality of video and voice applications for your wireless clients. A-MPDU Aggregated-MAC Packet Data Unit, is a group of MPDUs which built an PSDU (Physical Service Data Unit). It will lower Aggregation: overhead and provides robust recovery in case of loss. Short GI: Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may create higher data loss. D-Link DIR-855 User Manual 48 Section 3 - Configuration WISH Settings WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using a wireless network by prioritizing the traffic of different applications. Enable WISH: Enable this option if you want to allow WISH to prioritize your traffic. HTTP: Allows the router to recognize HTTP transfers for many common audio and video streams and prioritize them above other traffic. Such streams are frequently used by digital media players. Windows Media Enables the router to recognize certain audio Center: and video streams generated by a Windows Media Center PC and to prioritize these above other traffic. Such streams are used by systems known as Windows Media Extenders, such as the Xbox 360. Automatic: When enabled, this option causes the router to automatically attempt to prioritize traffic streams that it doesn’t otherwise recognize, based on the behaviour that the streams exhibit. This acts to deprioritize streams that exhibit bulk transfer characteristics, such as file transfers, while leaving interactive traffic, such as gaming or VoIP, running at a normal priority. WISH Rules: A WISH Rule identifies a specific message flow and assigns a priority to that flow. For most applications, the priority classifiers ensure the right priorities and specific WISH Rules are not required. WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest priority will be used. D-Link DIR-855 User Manual 49 Section 3 - Configuration Name: Create a name for the rule that is meaningful to you. Priority: The priority of the message flow is entered here. The four priorities are defined as: BK: Background (least urgent) BE: Best Effort. VI: Video VO: Voice (most urgent) Protocol: The protocol used by the messages. Host IP Range: The rule applies to a flow of messages for which one computer’s IP address falls within the range set here. Host Port Range: The rule applies to a flow of messages for which host’s port number is within the range set here. D-Link DIR-855 User Manual 50 Section 3 - Configuration Advanced Network Settings Enable UPnP: To use the Universal Plug and Play (UPnP™) feature click on Enabled. UPNP provides compatibility with networking equipment, software and peripherals. WAN Ping: Unchecking the box will not allow the DIR-855 to respond to pings. Blocking the Ping may provide some extra security from hackers. Check the box to allow the Internet port to be “pinged”. WAN Ping Inbound Select from the drop-down menu if you would Filter: like to apply the Inbound Filter to the WAN ping. Refer to page 44 for more information regarding Inbound Filter. UPnP Internet Ping Block Internet Port Speed Multicast Streams WAN Port Speed: You may set the port speed of the Internet port to 10Mbps, 100Mbps, or auto. Some older cable or DSL modems may require you to set the port speed to 10Mbps. Multicast streams: Check the box to allow multicast traffic to pass through the router from the Internet. D-Link DIR-855 User Manual 51 Section 3 - Configuration Administrator Settings This page will allow you to change the Administrator and User passwords. You can also enable Remote Management. There are two accounts that can access the management interface through the web browser. The accounts are admin and user. Admin has read/write access while user has read-only access. User can only view the settings but cannot make any changes. Only the admin account has the ability to change both admin and user account passwords. Admin Password: Enter a new password for the Administrator Login Name. The administrator can make changes to the settings. User Password: Enter the new password for the User login. If you login as the User, you can only see the settings, but cannot change them. System Name: Enter a name for the DIR-855 router. Remote Remote management allows the DIR-855 to be configured Management: from the Internet by a web browser. A username and password is still required to access the Web-Management interface. In general, only a member of your network can browse the built-in web pages to perform Administrator tasks. This feature enables you to perform Administrator tasks from the remote (Internet) host. Remote Admin Port: The port number used to access the DIR-855. Example: http://x.x.x.x:8080 whereas x.x.x.x is the Internet IP address of the DIR-855 and 8080 is the port used for the Web Management interface. Inbound Filter: This section will list any rules that are created. You may click the Edit icon to change the settings or enable/disable the rule, or click the Delete icon to remove the rule. D-Link DIR-855 User Manual Change Password Remote Management 52 Section 3 - Configuration Time Settings The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system clock. From this section you can set the time zone that you are in and set the Time Server. Daylight Saving can also be configured to automatically adjust the time when needed. Time Zone: Select the Time Zone from the drop-down menu. Daylight Saving: To select Daylight Saving time manually, select enabled or disabled, and enter a start date and an end date for daylight saving time. Enable NTP Server: NTP is short for Network Time Protocol. NTP synchronizes computer clock times in a network of computers. Check this box to use a NTP server. This will only connect to a server on the Internet, not a local server. NTP Server Used: Enter the NTP server or select one from the drop-down menu. Manual: To manually input the time, enter the values in these fields for the Year, Month, Day, Hour, Minute, and Second and then click Set Time. You can also click Copy Your Computer’s Time Settings. D-Link DIR-855 User Manual 53 Section 3 - Configuration SysLog The Broadband Router keeps a running log of events and activities occurring on the Router. You may send these logs to a SysLog server on your network. Enable Logging to Check this box to send the router logs to a SysLog Server: SysLog Server. SysLog Server IP The address of the SysLog server that will be Address: used to send the logs. You may also select your computer from the drop-down menu (only if receiving an IP address from the router via DHCP). D-Link DIR-855 User Manual 54 Section 3 - Configuration Email Settings The Email feature can be used to send the system log files, router alert messages, and firmware update notification to your email address. Enable Email When this option is enabled, router activity logs Notification: are e-mailed to a designated email address. From Email This email address will appear as the sender Address: when you receive a log file or firmware upgrade notification via email. To Email Address: Enter the email address where you want the email sent. SMTP Server Enter the SMTP server address for sending email. Address: If your SMTP server requires authentication, select this option. Enable Check this box if your SMTP server requires Authentication: authentication. Account Name: Enter your account for sending email. Password: Enter the password associated with the account. Re-type the password associated with the account. On Log Full: When this option is selected, logs will be sent via email when the log is full. On Schedule: Selecting this option will send the logs via email according to schedule. Schedule: This option is enabled when On Schedule is selected. You can select a schedule from the list of defined schedules. To create a schedule, go to Tools > Schedules. D-Link DIR-855 User Manual 55 Section 3 - Configuration System Settings This section allows you to manage the router’s configuration settings, reboot the router, and restore the router to the factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that you’ve created. Save Settings to Use this option to save the current router Local Hard Drive: configuration settings to a file on the hard disk of the computer you are using. First, click the Save button. You will then see a file dialog, where you can select a location and file name for the settings. Load Settings from Use this option to load previously saved Local Hard Drive: router configuration settings. First, use the Browse control to find a previously save file of configuration settings. Then, click the Load button to transfer those settings to the router. Restore to Factory This option will restore all configuration Default Settings: settings back to the settings that were in effect at the time the router was shipped from the factory. Any settings that have not been saved will be lost, including any rules that you have created. If you want to save the current router configuration settings, use the Save button above. Reboot Device: Click to reboot the router. D-Link DIR-855 User Manual 56 Section 3 - Configuration Update Firmware You can upgrade the firmware of the Router here. Make sure the firmware you want to use is on the local hard drive of the computer. Click on Browse to locate the firmware file to be used for the update. Please check the D-Link support site for firmware updates at http://support.dlink.com. You can download firmware upgrades to your hard drive from the D-Link support site. Firmware Upgrade: Click on Check Now to find out if there is an updated firmware; if so, download the new firmware to your hard drive. Browse: After you have downloaded the new firmware, click Browse to locate the firmware update on your hard drive. Click Upload to complete the firmware upgrade. Notifications Check Automatically Check Online for Options: Latest Firmware Version to have the router check automatically to see if there is a new firmware upgrade. Check Email Notification of Newer Firmware Version to have the router send an email when there is a new firmware available. D-Link DIR-855 User Manual 57 Section 3 - Configuration DDNS The DDNS feature allows you to host a server (Web, FTP, Game Server, etc…) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in your domain name to connect to your server no matter what your IP address is. Enable Dynamic Dynamic Domain Name System is a method of DNS: keeping a domain name linked to a changing IP Address. Check the box to enable DDNS. Server Address: Choose your DDNS provider from the drop down menu. Host Name: Enter the Host Name that you registered with your DDNS service provider. Username or Key: Enter the Username for your DDNS account. Password or Key: Enter the Password for your DDNS account. Timeout: Enter a time (in hours). D-Link DIR-855 User Manual 58 Section 3 - Configuration System Check Ping Test: The Ping Test is used to send Ping packets to test if a computer is on the Internet. Enter the IP Address that you wish to Ping, and click Ping. Ping Results: The results of your ping attempts will be displayed here. D-Link DIR-855 User Manual 59 Section 3 - Configuration Schedules Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from 3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and End Time of 8pm. Name: Enter a name for your new schedule. Days: Select a day, a range of days, or All Week to include every day. Time: Check All Day - 24hrs or enter a start and end time for your schedule. Save: Click Save to save your schedule. You must click Save Settings at the top for your schedules to go into effect. Schedule Rules The list of schedules will be listed here. Click the List: Edit icon to make changes or click the Delete icon to remove the schedule. D-Link DIR-855 User Manual 60 Section 3 - Configuration Device Information This page displays the current information for the DIR-855. It will display the LAN, WAN (Internet), and Wireless information. If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button will be displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP. If your Internet connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed. Use Disconnect to drop the PPPoE connection and use Connect to establish the PPPoE connection. General: Displays the router’s time and firmware version. WAN: Displays the MAC address and the public IP settings for the router. LAN: Displays the MAC address and the private (local) IP settings for the router. Wireless LAN: Displays the wireless MAC address and your wireless settings such as SSID and Channel. LAN Computers: Displays computers and devices that are connected to the router via Ethernet and that are receiving an IP address assigned by the router (DHCP). IGMP Multicast Displays the Multicast Group IP Address. Memberships: D-Link DIR-855 User Manual 61 Section 3 - Configuration Log The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of the events to view. This router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility. What to View: You can select the types of messages that you want to display from the log. Firewall & Security, System, and Router Status messages can be selected. View Levels: There are three levels of message importance: Informational, Warning, and Critical. Select the levels that you want displayed in the log. Apply Log Settings: Will filter the log results so that only the selected options appear. Refresh: Updates the log details on the screen so it displays any recent activity. Clear: Clears all of the log contents. Email Now: This option will send a copy of the router log to the email address configured in the Tools > Email screen. Save Log: This option will save the router to a log file on your computer. D-Link DIR-855 User Manual 62 Section 3 - Configuration Stats The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-855 on both the Internet, LAN ports and both the 802.11n/g and 802.11a wireless bands. The traffic counter will reset if the device is rebooted. D-Link DIR-855 User Manual 63 Section 3 - Configuration Internet Sessions The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer. D-Link DIR-855 User Manual 64 Section 3 - Configuration Wireless The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless clients. WISH The WISH details page displays full details of wireless clients that are connected when WISH is enabled. D-Link DIR-855 User Manual 65 Section 3 - Configuration Support D-Link DIR-855 User Manual 66 Section 4 - Security Wireless Security This section will show you the different levels of security you can use to protect your data from intruders. The DIR-855 offers the following types of security: • WPA2 (Wi-Fi Protected Access 2) • WPA (Wi-Fi Protected Access) • WPA2-PSK (Pre-Shared Key) • WPA-PSK (Pre-Shared Key) What is WPA? WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy). The 2 major improvements over WEP: • Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP. • User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network. WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your wireless router or access point. WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public key encryption system to ensure that only authorized network users can access the network. D-Link DIR-855 User Manual 67 Section 4 - Security Wireless Security Setup Wizard To run the security wizard, click on Setup at the top and then click Launch Wireless Security Setup Wizard. Check the Manually set 5GHz band Network Name... box to manually set your desired wireless network name for the 5GHz band. Type your desired wireless network name (SSID). Automatically: Select this option to automatically generate the router’s network key and click Next. Manually: Select this option to manually enter your network key and click Next. Check the “Use WPA encryption...” box to use WPA. D-Link DIR-855 User Manual 68 Section 4 - Security If you selected Automatically, the summary window will display your settings. Write down the security key and enter this on your wireless clients. Click Save to save your settings. D-Link DIR-855 User Manual 69 Section 4 - Security Add Wireless Device with WPS Wizard From the Basic > Wizard screen, click Add Wireless Device with WPS. Select Auto to add a wireless client using WPS (Wi-Fi Protected Setup). Once you select Auto and click Connect, you will have a 120 second time limit to apply the settings to your wireless client(s) and successfully establish a connection. If you select Manual, a settings summary screen will appear. Write down the security key and enter this on your wireless clients. PIN: Select this option to use PIN method. In order to use this method you must know the wireless client’s 8 digit PIN and click Connect. PBC: Select this option to use PBC (Push Button) method to add a wireless client. Click Connect. D-Link DIR-855 User Manual 70 Section 4 - Security Configure WPA-Personal (PSK) It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Setup and then click Wireless Settings on the left side. 2. Next to Security Mode, select WPA-Personal. 3. Next to WPA Mode, select Auto, WPA2 Only, or WPA Only. Use Auto if you have wireless clients using both WPA and WPA2. 4. Next to Cypher Type, select TKIP and AES, TKIP, or AES. 5. Next to Group Key Update Interval, enter the amount of time before the group key used for broadcast and multicast data is changed (3600 is default). 6. Next to Pre-Shared Key, enter a key (passphrase). The key is entered as a pass-phrase in ASCII format at both ends of the wireless connection. The pass-phrase must be between 8-63 characters. 7. Click Save Settings to save your settings. If you are configuring the router with a wireless adapter, you will lose connectivity until you enable WPA-PSK on your adapter and enter the same passphrase as you did on the router. D-Link DIR-855 User Manual 71 Section 4 - Security Configure WPA-Enterprise (RADIUS) It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to the added overhead. 1. Log into the web-based configuration by opening a web browser and entering the IP address of the router (192.168.0.1). Click on Setup and then click Wireless Settings on the left side. 2. Next to Security Mode, select WPA-Enterprise. 3. Next to WPA Mode, select Auto, WPA2 Only, or WPA Only. Use Auto if you have wireless clients using both WPA and WPA2. 4. Next to Cypher Type, select TKIP and AES, TKIP, or AES. 5. Next to Group Key Update Interval, enter the amount of time before the group key used for broadcast and multicast data is changed (3600 is default). 6. Next to Authentication Timeout, enter the amount of time before a client is required to re-authenticate (60 minutes is default). 7. Next to RADIUS Server IP Address enter the IP Address of your RADIUS server. D-Link DIR-855 User Manual 72 Section 4 - Security 8. Next to RADIUS Server Port, enter the port you are using with your RADIUS server. 1812 is the default port. 9. Next to RADIUS Server Shared Secret, enter the security key. 10. If the MAC Address Authentication box is selected then the user will need to connect from the same computer whenever logging into the wireless network. 11. Click Advanced to enter settings for a secondary RADIUS Server. 12. Click Apply Settings to save your settings. D-Link DIR-855 User Manual 73 Section 4 - Security Connect to a Wireless Network Using Windows® Vista™ Windows® Vista™ users may use the built-in wireless utility. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows® Vista™ utility as seen below. If you receive the Wireless Networks Detected bubble, click on the center of the bubble to access the utility. or Right-click on the wireless computer icon in your system tray (lower-right corner next to the time). Select Connect to a network. The utility will display any available wireless networks in your area. Click on a network (displayed using the SSID) and click the Connect button. If you get a good signal but cannot access the Internet, check you TCP/IP settings for your wireless adapter. Refer to the Networking Basics section in this manual for more information. D-Link DIR-855 User Manual 74 Section 5 - Connecting to a Wireless Network Configure Wireless Security It is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the security key or passphrase being used. 1. Open the Windows® Vista™ Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower right corner of screen). Select Connect to a network. 2. Highlight the wireless network (SSID) you would like to connect to and click Connect. D-Link DIR-855 User Manual 75 Section 5 - Connecting to a Wireless Network 3. Enter the same security key or passphrase that is on your router and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the security settings are correct. The key or passphrase must be exactly the same as on the wireless router. D-Link DIR-855 User Manual 76 Section 5 - Connecting to a Wireless Network Connect Using WCN 2.0 in Windows Vista™ The router supports Wi-Fi protection, referred to as WCN 2.0 in Windows Vista™. The following instructions for setting this up depends on whether you are using Windows Vista™ to configure the router or third party software. When you first set up the router, Wi-Fi protection is disabled and unconfigured. To enjoy the benefits of Wi-Fi protection, the router must be both enabled and configured. There are three basic methods to accomplish this: use Windows Vista’s built-in support for WCN 2.0, use software provided by a third party, or manually configure. If you are running Windows Vista™, log into the router and click the Enable checkbox in the Basic > Wireless section. Use the Current PIN that is displayed on the Advanced > Wi-Fi Protected Setup section or choose to click the Generate New PIN button or Reset PIN to Default button. For additional information, please refer to page 47. If you are using third party software to set up Wi-Fi Protection, carefully follow the directions. When you are finished, proceed to the next section to set up the newly-configured router. D-Link DIR-855 User Manual 77 Section 5 - Connecting to a Wireless Network Connect to a Wireless Network Using Windows® XP Windows® XP users may use the built-in wireless utility (Zero Configuration Utility). The following instructions are for Service Pack 2 users. If you are using another company’s utility or Windows® 2000, please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option similar to the Windows® XP utility as seen below. If you receive the Wireless Networks Detected bubble, click on the center of the bubble to access the utility. or Right-click on the wireless computer icon in your system tray (lower-right corner next to the time). Select View Available Wireless Networks. The utility will display any available wireless networks in your area. Click on a network (displayed using the SSID) and click the Connect button. If you get a good signal but cannot access the Internet, check you TCP/IP settings for your wireless adapter. Refer to the Networking Basics section in this manual for more information. D-Link DIR-855 User Manual 78 Section 5 - Connecting to a Wireless Network Configure WPA-PSK It is recommended to enable WPA on your wireless router or access point before configuring your wireless adapter. If you are joining an existing network, you will need to know the WPA key being used. 1. Open the Windows® XP Wireless Utility by right-clicking on the wireless computer icon in your system tray (lower-right corner of screen). Select View Available Wireless Networks. 2. Highlight the wireless network (SSID) you would like to connect to and click Connect. D-Link DIR-855 User Manual 79 Section 5 - Connecting to a Wireless Network 3. The Wireless Network Connection box will appear. Enter the WPA-PSK passphrase and click Connect. It may take 20-30 seconds to connect to the wireless network. If the connection fails, please verify that the WPA-PSK settings are correct. The WPA-PSK passphrase must be exactly the same as on the wireless router. D-Link DIR-855 User Manual 80
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No Encryption : Standard V2.3 (128-bit) User Access : Print, Copy, Print high-res Tagged PDF : Yes XMP Toolkit : 3.1-702 Modify Date : 2007:11:28 08:52:01-08:00 Create Date : 2007:11:28 08:50:44-08:00 Metadata Date : 2007:11:28 08:52:01-08:00 Creator Tool : Adobe Illustrator CS3 Format : application/pdf Document ID : uuid:88cb4d35-8818-4cab-b595-9049e13bb86d Instance ID : uuid:3e430fb1-7d44-47db-a28b-c33971e95025 Producer : Adobe PDF Library 7.0 Page Count : 42 Creator : Adobe Illustrator CS3EXIF Metadata provided by EXIF.tools