D Link DIR855A1 Xtreme N DUO Media Router User Manual Manual Part 2

D Link Corporation Xtreme N DUO Media Router Manual Part 2

Contents

Manual Part 2

Download: D Link DIR855A1 Xtreme N DUO Media Router User Manual Manual Part 2
Mirror Download [FCC.gov]D Link DIR855A1 Xtreme N DUO Media Router User Manual Manual Part 2
Document ID873151
Application IDYNOCnMfBrODTMmT9GhA5Kw==
Document DescriptionManual Part 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize247.28kB (3091043 bits)
Date Submitted2007-11-28 00:00:00
Date Available2007-11-28 00:00:00
Creation Date2007-11-28 08:50:44
Producing SoftwareAdobe PDF Library 7.0
Document Lastmod2007-11-28 08:52:01
Document TitleManual Part 2
Document CreatorAdobe Illustrator CS3

Section 3 - Configuration
Network Filters
Use MAC (Media Access Control) Filters to allow or deny LAN (Local Area Network) computers by their MAC addresses
from accessing the Network. You can either manually add a MAC address or select the MAC address from the list of
clients that are currently connected to the Broadband Router.
Configure MAC Select Turn MAC Filtering Off, Allow MAC
Filtering: addresses listed below, or Deny MAC
addresses listed below from the drop-down
menu.
MAC Address: Enter the MAC address you would like to
filter.
To find the MAC address on a computer,
please refer to the Networking Basics section
in this manual.
DHCP Client: Select a DHCP client from the drop-down menu
and click << to copy that MAC Address.
Clear: Click to remove the MAC address.
D-Link DIR-855 User Manual
39
Section 3 - Configuration
Access Control
The Access Control section allows you to control access in and out of your network. Use this feature as Parental Controls
to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications
like P2P utilities or games.
Add Policy: Click the Add Policy button to start the Access
Control Wizard.
Access Control Wizard
Click Next to continue with the wizard.
D-Link DIR-855 User Manual
40
Section 3 - Configuration
Access Control Wizard (continued)
Enter a name for the policy and then click Next to continue.
Select a schedule (I.E. Always) from the drop-down menu
and then click Next to continue.
Enter the following information and then click Next to
continue.
• Address Type - Select IP address, MAC address, or
Other Machines.
• IP Address - Enter the IP address of the computer
you want to apply the rule to.
D-Link DIR-855 User Manual
41
Section 3 - Configuration
Access Control Wizard (continued)
Select the filtering method and then click Next to continue.
Enter the rule:
Enable - Check to enable the rule.
Name - Enter a name for your rule.
Dest IP Start - Enter the starting IP address.
Dest IP End - Enter the ending IP address.
Protocol - Select the protocol.
Dest Port Start - Enter the starting port number.
Dest Port End - Enter the ending port number.
To enable web logging, click Enable.
Click Save to save the access control rule.
D-Link DIR-855 User Manual
42
Section 3 - Configuration
Website Filters
Website Filters are used to allow you to set up a list of allowed Web sites that can be used by multiple users through
the network. To use this feature select to Allow or Deny, enter the domain or website and click Save Settings. You
must also select Apply Web Filter under the Access Control section (page 40).
Add Website Select Allow or Deny.
Filtering Rule:
Website URL/ Enter the keywords or URLs that you want to
Domain: allow or block. Click Save Settings.
D-Link DIR-855 User Manual
43
Section 3 - Configuration
Inbound Filters
The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you
can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters can be used
with Virtual Server, Port Forwarding, or Remote Administration features.
Name: Enter a name for the inbound filter rule.
Action: Select Allow or Deny.
Enable: Check to enable rule.
Remote IP Start: Enter the starting IP address. Enter 0.0.0.0
if you do not want to specify an IP range.
Remote IP End: Enter the ending IP address. Enter
255.255.255.255 if you do not want to
specify and IP range.
Add: Click the Add button to apply your settings.
You must click Save Settings at the top to
save the settings.
Inbound Filter This section will list any rules that are created.
Rules List: You may click the Edit icon to change the
settings or enable/disable the rule, or click
the Delete icon to remove the rule.
D-Link DIR-855 User Manual
44
Section 3 - Configuration
Firewall Settings
A firewall protects your network from the outside world. The DIR-855 offers a firewall type functionality. The SPI feature
helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of
applications. If you choose to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone. This option
will expose the chosen computer completely to the outside world.
Enable SPI: SPI (Stateful Packet Inspection, also known as dynamic packet
filtering) helps to prevent cyber attacks by tracking more state per
session. It validates that the traffic passing through the session
conforms to the protocol.
NAT Endpoint Select one of the following for TCP and UDP ports:
Filtering: Endpoint Independent - Any incoming traffic sent to an open port
will be forwarded to the application that opened the port. The port
will close if idle for 5 minutes.
Address Restricted - Incoming traffic must match the IP address
of the outgoing connection.
Address + Port Restriction - Incoming traffic must match the IP
address and port of the outgoing connection.
Anti-Spoof Check: Enable this feature to protect your network from certain kinds of
“spoofing” attacks.
Enable DMZ: If an application has trouble working from behind the router, you
can expose one computer to the Internet and run the application
on that computer.
Note: Placing a computer in the DMZ may expose that computer to
a variety of security risks. Use of this option is only recommended
as a last resort.
DMZ IP Address: Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer
obtains it’s IP address automatically using DHCP, be sure to make a static reservation on the Basic > DHCP page so that
the IP address of the DMZ machine does not change.
D-Link DIR-855 User Manual
45
Section 3 - Configuration
Application Level Gateway (ALG) Configuration
Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to
make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol
or application. A number of ALGs for common applications are enabled by default.
PPTP: Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol.
IPSEC (VPN): Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec
through NAT. This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your
corporate network, try turning this ALG off. Please check with the system adminstrator of your corporate network whether
your VPN client supports NAT traversal.
D-Link DIR-855 User Manual
46
Section 3 - Configuration
Advanced Wireless Settings
802.11n/g (2.4GHz)
Transmit Power: Set the transmit power of the antennas.
Beacon Period: Beacons are packets sent by an Access Point to
synchronize a wireless network. Specify a value.
100 is the default setting and is recommended.
RTS Threshold: This value should remain at its default setting of
2432. If inconsistent data flow is a problem, only
a minor modification should be made.
Fragmentation The fragmentation threshold, which is specified
Threshold: in bytes, determines whether packets will be
fragmented. Packets exceeding the 2346 byte
setting will be fragmented before transmission.
2346 is the default setting.
DTIM Interval: (Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window
for listening to broadcast and multicast messages.
802.11d: This enables 802.11d operation. 802.11d is a wireless specification developed to allow implementation of wireless networks in
countries that cannot use the 802.11 standard. This feature should only be enabled if you are in a country that requires it.
Wireless Isolation: When checked, it will disable the ability for computers on the wireless network from seeing each other, but will allow you to
see computers on the wired network.
WMM Function: WMM is QoS for your wireless network. This will improve the quality of video and voice applications for your wireless
clients.
A-MPDU Aggregated-MAC Packet Data Unit, is a group of MPDUs which built an PSDU (Physical Service Data Unit). It has lower
Aggregation: overhead and provides robust recovery in case of loss.
Short GI: Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may
create higher data loss.
D-Link DIR-855 User Manual
47
Section 3 - Configuration
Advanced Wireless Settings
802.11n/a (5GHz)
Transmit Power: Set the transmit power of the antennas.
Beacon Period: Beacons are packets sent by an Access Point to
synchronize a wireless network. Specify a value.
100 is the default setting and is recommended.
RTS Threshold: This value should remain at its default setting of
2432. If inconsistent data flow is a problem, only
a minor modification should be made.
Fragmentation The fragmentation threshold, which is specified
Threshold: in bytes, determines whether packets will be
fragmented. Packets exceeding the 2346 byte
setting will be fragmented before transmission.
2346 is the default setting.
DTIM Interval: (Delivery Traffic Indication Message) 3 is the
default setting. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast
messages.
802.11d: This enables 802.11d opration. 802.11d is a wireless specification developed to allow implementation of wireless networks in
countries that cannot use the 802.11 standard. This feature should only be enabled if you are in a country that requires it.
Wireless Isolation: When checked, it will disable the ability for computers on the wireless network from seeing each other, but will allow you to
see computers on the wired network.
WMM Function: WMM is QoS for your wireless network. This will improve the quality of video and voice applications for your wireless
clients.
A-MPDU Aggregated-MAC Packet Data Unit, is a group of MPDUs which built an PSDU (Physical Service Data Unit). It will lower
Aggregation: overhead and provides robust recovery in case of loss.
Short GI: Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may
create higher data loss.
D-Link DIR-855 User Manual
48
Section 3 - Configuration
WISH Settings
WISH is short for Wireless Intelligent Stream Handling, a technology developed to enhance your experience of using
a wireless network by prioritizing the traffic of different applications.
Enable WISH: Enable this option if you want to allow WISH
to prioritize your traffic.
HTTP: Allows the router to recognize HTTP transfers
for many common audio and video streams
and prioritize them above other traffic. Such
streams are frequently used by digital media
players.
Windows Media Enables the router to recognize certain audio
Center: and video streams generated by a Windows
Media Center PC and to prioritize these above
other traffic. Such streams are used by systems
known as Windows Media Extenders, such as
the Xbox 360.
Automatic: When enabled, this option causes the router
to automatically attempt to prioritize traffic
streams that it doesn’t otherwise recognize,
based on the behaviour that the streams
exhibit. This acts to deprioritize streams that
exhibit bulk transfer characteristics, such as
file transfers, while leaving interactive traffic,
such as gaming or VoIP, running at a normal
priority.
WISH Rules: A WISH Rule identifies a specific message flow and assigns a priority to that flow. For most applications, the priority classifiers
ensure the right priorities and specific WISH Rules are not required.
WISH supports overlaps between rules. If more than one rule matches for a specific message flow, the rule with the highest
priority will be used.
D-Link DIR-855 User Manual
49
Section 3 - Configuration
Name: Create a name for the rule that is meaningful
to you.
Priority: The priority of the message flow is entered
here. The four priorities are defined as:
BK: Background (least urgent)
BE: Best Effort.
VI: Video
VO: Voice (most urgent)
Protocol: The protocol used by the messages.
Host IP Range: The rule applies to a flow of messages for which one computer’s IP address falls within the range set here.
Host Port Range: The rule applies to a flow of messages for which host’s port number is within the range set here.
D-Link DIR-855 User Manual
50
Section 3 - Configuration
Advanced Network Settings
Enable UPnP: To use the Universal Plug and Play (UPnP™) feature
click on Enabled. UPNP provides compatibility with
networking equipment, software and peripherals.
WAN Ping: Unchecking the box will not allow the DIR-855 to
respond to pings. Blocking the Ping may provide
some extra security from hackers. Check the box
to allow the Internet port to be “pinged”.
WAN Ping Inbound Select from the drop-down menu if you would
Filter: like to apply the Inbound Filter to the WAN ping.
Refer to page 44 for more information regarding
Inbound Filter.
UPnP
Internet Ping Block
Internet Port Speed
Multicast Streams
WAN Port Speed: You may set the port speed of the Internet port
to 10Mbps, 100Mbps, or auto. Some older cable
or DSL modems may require you to set the port
speed to 10Mbps.
Multicast streams: Check the box to allow multicast traffic to pass
through the router from the Internet.
D-Link DIR-855 User Manual
51
Section 3 - Configuration
Administrator Settings
This page will allow you to change the Administrator and User passwords. You can also enable Remote Management.
There are two accounts that can access the management interface through the web browser. The accounts are admin
and user. Admin has read/write access while user has read-only access. User can only view the settings but cannot
make any changes. Only the admin account has the ability to change both admin and user account passwords.
Admin Password: Enter a new password for the Administrator Login Name.
The administrator can make changes to the settings.
User Password: Enter the new password for the User login. If you login as
the User, you can only see the settings, but cannot change
them.
System Name: Enter a name for the DIR-855 router.
Remote Remote management allows the DIR-855 to be configured
Management: from the Internet by a web browser. A username and
password is still required to access the Web-Management
interface. In general, only a member of your network can
browse the built-in web pages to perform Administrator
tasks. This feature enables you to perform Administrator
tasks from the remote (Internet) host.
Remote Admin Port: The port number used to access the DIR-855.
Example: http://x.x.x.x:8080 whereas x.x.x.x is the Internet
IP address of the DIR-855 and 8080 is the port used for
the Web Management interface.
Inbound Filter: This section will list any rules that are created. You may
click the Edit icon to change the settings or enable/disable
the rule, or click the Delete icon to remove the rule.
D-Link DIR-855 User Manual
Change Password
Remote Management
52
Section 3 - Configuration
Time Settings
The Time Configuration option allows you to configure, update, and maintain the correct time on the internal system
clock. From this section you can set the time zone that you are in and set the Time Server. Daylight Saving can also
be configured to automatically adjust the time when needed.
Time Zone: Select the Time Zone from the drop-down
menu.
Daylight Saving: To select Daylight Saving time manually, select
enabled or disabled, and enter a start date and
an end date for daylight saving time.
Enable NTP Server: NTP is short for Network Time Protocol.
NTP synchronizes computer clock times in a
network of computers. Check this box to use a
NTP server. This will only connect to a server
on the Internet, not a local server.
NTP Server Used: Enter the NTP server or select one from the
drop-down menu.
Manual: To manually input the time, enter the values
in these fields for the Year, Month, Day, Hour,
Minute, and Second and then click Set Time.
You can also click Copy Your Computer’s
Time Settings.
D-Link DIR-855 User Manual
53
Section 3 - Configuration
SysLog
The Broadband Router keeps a running log of events and activities occurring on the Router. You may send these logs
to a SysLog server on your network.
Enable Logging to Check this box to send the router logs to a
SysLog Server: SysLog Server.
SysLog Server IP The address of the SysLog server that will be
Address: used to send the logs. You may also select
your computer from the drop-down menu (only
if receiving an IP address from the router via
DHCP).
D-Link DIR-855 User Manual
54
Section 3 - Configuration
Email Settings
The Email feature can be used to send the system log files, router alert messages, and firmware update notification
to your email address.
Enable Email When this option is enabled, router activity logs
Notification: are e-mailed to a designated email address.
From Email This email address will appear as the sender
Address: when you receive a log file or firmware upgrade
notification via email.
To Email Address: Enter the email address where you want the
email sent.
SMTP Server Enter the SMTP server address for sending email.
Address: If your SMTP server requires authentication,
select this option.
Enable Check this box if your SMTP server requires
Authentication: authentication.
Account Name: Enter your account for sending email.
Password: Enter the password associated with the
account. Re-type the password associated with
the account.
On Log Full: When this option is selected, logs will be sent
via email when the log is full.
On Schedule: Selecting this option will send the logs via email
according to schedule.
Schedule: This option is enabled when On Schedule is selected. You can select a schedule from the list of defined schedules. To create
a schedule, go to Tools > Schedules.
D-Link DIR-855 User Manual
55
Section 3 - Configuration
System Settings
This section allows you to manage the router’s configuration settings, reboot the router, and restore the router to the
factory default settings. Restoring the unit to the factory default settings will erase all settings, including any rules that
you’ve created.
Save Settings to Use this option to save the current router
Local Hard Drive: configuration settings to a file on the hard disk
of the computer you are using. First, click the
Save button. You will then see a file dialog,
where you can select a location and file name
for the settings.
Load Settings from Use this option to load previously saved
Local Hard Drive: router configuration settings. First, use the
Browse control to find a previously save
file of configuration settings. Then, click the
Load button to transfer those settings to the
router.
Restore to Factory This option will restore all configuration
Default Settings: settings back to the settings that were in effect
at the time the router was shipped from the
factory. Any settings that have not been saved
will be lost, including any rules that you have
created. If you want to save the current router
configuration settings, use the Save button
above.
Reboot Device: Click to reboot the router.
D-Link DIR-855 User Manual
56
Section 3 - Configuration
Update Firmware
You can upgrade the firmware of the Router here. Make sure the firmware you want to use is on the local hard drive of
the computer. Click on Browse to locate the firmware file to be used for the update. Please check the D-Link support
site for firmware updates at http://support.dlink.com. You can download firmware upgrades to your hard drive from the
D-Link support site.
Firmware Upgrade: Click on Check Now to find out if there is an
updated firmware; if so, download the new
firmware to your hard drive.
Browse: After you have downloaded the new firmware,
click Browse to locate the firmware update on
your hard drive. Click Upload to complete the
firmware upgrade.
Notifications Check Automatically Check Online for
Options: Latest Firmware Version to have the router
check automatically to see if there is a new
firmware upgrade.
Check Email Notification of Newer Firmware
Version to have the router send an email when
there is a new firmware available.
D-Link DIR-855 User Manual
57
Section 3 - Configuration
DDNS
The DDNS feature allows you to host a server (Web, FTP, Game Server, etc…) using a domain name that you have
purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet
Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in
your domain name to connect to your server no matter what your IP address is.
Enable Dynamic Dynamic Domain Name System is a method of
DNS: keeping a domain name linked to a changing
IP Address. Check the box to enable DDNS.
Server Address: Choose your DDNS provider from the drop
down menu.
Host Name: Enter the Host Name that you registered with
your DDNS service provider.
Username or Key: Enter the Username for your DDNS account.
Password or Key: Enter the Password for your DDNS account.
Timeout: Enter a time (in hours).
D-Link DIR-855 User Manual
58
Section 3 - Configuration
System Check
Ping Test: The Ping Test is used to send Ping packets to test if a
computer is on the Internet. Enter the IP Address that you
wish to Ping, and click Ping.
Ping Results: The results of your ping attempts will be displayed here.
D-Link DIR-855 User Manual
59
Section 3 - Configuration
Schedules
Schedules can be created for use with enforcing rules. For example, if you want to restrict web access to Mon-Fri from
3pm to 8pm, you could create a schedule selecting Mon, Tue, Wed, Thu, and Fri and enter a Start Time of 3pm and
End Time of 8pm.
Name: Enter a name for your new schedule.
Days: Select a day, a range of days, or All Week to
include every day.
Time: Check All Day - 24hrs or enter a start and end
time for your schedule.
Save: Click Save to save your schedule. You must click
Save Settings at the top for your schedules to
go into effect.
Schedule Rules The list of schedules will be listed here. Click the
List: Edit icon to make changes or click the Delete
icon to remove the schedule.
D-Link DIR-855 User Manual
60
Section 3 - Configuration
Device Information
This page displays the current information for the DIR-855. It will display the LAN, WAN (Internet), and Wireless
information. If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button
will be displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP.
If your Internet connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed. Use
Disconnect to drop the PPPoE connection and use Connect to establish the PPPoE connection.
General: Displays the router’s time and firmware version.
WAN: Displays the MAC address and the public IP settings for the router.
LAN: Displays the MAC address and the private (local) IP settings for the
router.
Wireless LAN: Displays the wireless MAC address and your wireless settings such as
SSID and Channel.
LAN Computers: Displays computers and devices that are connected to the router via Ethernet
and that are receiving an IP address assigned by the router (DHCP).
IGMP Multicast Displays the Multicast Group IP Address.
Memberships:
D-Link DIR-855 User Manual
61
Section 3 - Configuration
Log
The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal
memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows
you to view the router logs. You can define what types of events you want to view and the level of the events to view.
This router also has external Syslog Server support so you can send the log files to a computer on your network that
is running a Syslog utility.
What to View: You can select the types of messages that you want
to display from the log. Firewall & Security, System,
and Router Status messages can be selected.
View Levels: There are three levels of message importance:
Informational, Warning, and Critical. Select the
levels that you want displayed in the log.
Apply Log Settings: Will filter the log results so that only the selected
options appear.
Refresh: Updates the log details on the screen so it displays
any recent activity.
Clear: Clears all of the log contents.
Email Now: This option will send a copy of the router log to
the email address configured in the Tools > Email
screen.
Save Log: This option will save the router to a log file on your
computer.
D-Link DIR-855 User Manual
62
Section 3 - Configuration
Stats
The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-855 on
both the Internet, LAN ports and both the 802.11n/g and 802.11a wireless bands. The traffic counter will reset if the
device is rebooted.
D-Link DIR-855 User Manual
63
Section 3 - Configuration
Internet Sessions
The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a
conversation between a program or application on a LAN-side computer and a program or application on a WAN-side
computer.
D-Link DIR-855 User Manual
64
Section 3 - Configuration
Wireless
The wireless client table displays a list of current connected wireless clients. This table also displays the connection
time and MAC address of the connected wireless clients.
WISH
The WISH details page displays full details of wireless clients that are connected when WISH is enabled.
D-Link DIR-855 User Manual
65
Section 3 - Configuration
Support
D-Link DIR-855 User Manual
66
Section 4 - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The
DIR-855 offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2) 		
• WPA (Wi-Fi Protected Access)			
• WPA2-PSK (Pre-Shared Key)
• WPA-PSK (Pre-Shared Key)
What is WPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired
Equivalent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys
using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t
been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead
of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol
(EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC
address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key
encryption system to ensure that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric
password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must
be the exact same key entered on your wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a
more secure public key encryption system to ensure that only authorized network users can access the network.
D-Link DIR-855 User Manual
67
Section 4 - Security
Wireless Security Setup Wizard
To run the security wizard, click on Setup at the top and then
click Launch Wireless Security Setup Wizard.
Check the Manually set 5GHz band Network Name... box to
manually set your desired wireless network name for the 5GHz
band.
Type your desired wireless network name (SSID).
Automatically: Select this option to automatically generate
the router’s network key and click Next.
Manually: Select this option to manually enter your network
key and click Next.
Check the “Use WPA encryption...” box to use WPA.
D-Link DIR-855 User Manual
68
Section 4 - Security
If you selected Automatically, the summary window will
display your settings. Write down the security key and
enter this on your wireless clients. Click Save to save your
settings.
D-Link DIR-855 User Manual
69
Section 4 - Security
Add Wireless Device with WPS Wizard
From the Basic > Wizard screen, click Add Wireless Device
with WPS.
Select Auto to add a wireless client using WPS (Wi-Fi Protected
Setup). Once you select Auto and click Connect, you will have
a 120 second time limit to apply the settings to your wireless
client(s) and successfully establish a connection.
If you select Manual, a settings summary screen will appear.
Write down the security key and enter this on your wireless
clients.
PIN: Select this option to use PIN method. In order to use this
method you must know the wireless client’s 8 digit PIN and
click Connect.
PBC: Select this option to use PBC (Push Button) method to
add a wireless client. Click Connect.
D-Link DIR-855 User Manual
70
Section 4 - Security
Configure WPA-Personal (PSK)
It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish
wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to
the added overhead.
1. Log into the web-based configuration by opening a web browser
and entering the IP address of the router (192.168.0.1). Click
on Setup and then click Wireless Settings on the left side.
2. Next to Security Mode, select WPA-Personal.
3. Next to WPA Mode, select Auto, WPA2 Only, or WPA Only. Use
Auto if you have wireless clients using both WPA and WPA2.
4. Next to Cypher Type, select TKIP and AES, TKIP, or AES.
5. Next to Group Key Update Interval, enter the amount of time
before the group key used for broadcast and multicast data is
changed (3600 is default).
6. Next to Pre-Shared Key, enter a key (passphrase). The key is entered as a pass-phrase in ASCII format at both ends
of the wireless connection. The pass-phrase must be between 8-63 characters.
7. Click Save Settings to save your settings. If you are configuring the router with a wireless adapter, you will lose
connectivity until you enable WPA-PSK on your adapter and enter the same passphrase as you did on the router.
D-Link DIR-855 User Manual
71
Section 4 - Security
Configure WPA-Enterprise (RADIUS)
It is recommended to enable encryption on your wireless router before your wireless network adapters. Please establish
wireless connectivity before enabling encryption. Your wireless signal may degrade when enabling encryption due to
the added overhead.
1. Log into the web-based configuration by opening a web browser
and entering the IP address of the router (192.168.0.1). Click
on Setup and then click Wireless Settings on the left side.
2. Next to Security Mode, select WPA-Enterprise.
3. Next to WPA Mode, select Auto, WPA2 Only, or WPA Only. Use
Auto if you have wireless clients using both WPA and WPA2.
4. Next to Cypher Type, select TKIP and AES, TKIP, or AES.
5. Next to Group Key Update Interval, enter the amount of time
before the group key used for broadcast and multicast data is
changed (3600 is default).
6. Next to Authentication Timeout, enter the amount of time before
a client is required to re-authenticate (60 minutes is default).
7. Next to RADIUS Server IP Address enter the IP Address of your RADIUS server.
D-Link DIR-855 User Manual
72
Section 4 - Security
8. Next to RADIUS Server Port, enter the port you are using with
your RADIUS server. 1812 is the default port.
9. Next to RADIUS Server Shared Secret, enter the security
key.
10. If the MAC Address Authentication box is selected then the
user will need to connect from the same computer whenever
logging into the wireless network.
11. Click Advanced to enter settings for a secondary RADIUS
Server.
12. Click Apply Settings to save your settings.
D-Link DIR-855 User Manual
73
Section 4 - Security
Connect to a Wireless Network
Using Windows® Vista™
Windows® Vista™ users may use the built-in wireless utility. If you are using another company’s utility or Windows® 2000,
please refer to the user manual of your wireless adapter for help with connecting to a wireless network. Most utilities
will have a “site survey” option similar to the Windows® Vista™ utility as seen below.
If you receive the Wireless Networks Detected bubble, click on
the center of the bubble to access the utility.
or
Right-click on the wireless computer icon in your system tray
(lower-right corner next to the time). Select Connect to a
network.
The utility will display any available wireless networks in your
area. Click on a network (displayed using the SSID) and click
the Connect button.
If you get a good signal but cannot access the Internet, check you
TCP/IP settings for your wireless adapter. Refer to the Networking
Basics section in this manual for more information.
D-Link DIR-855 User Manual
74
Section 5 - Connecting to a Wireless Network
Configure Wireless Security
It is recommended to enable wireless security (WPA/WPA2) on your wireless router or access point before configuring
your wireless adapter. If you are joining an existing network, you will need to know the security key or passphrase
being used.
1. Open the Windows® Vista™ Wireless Utility by right-clicking
on the wireless computer icon in your system tray (lower right
corner of screen). Select Connect to a network.
2. Highlight the wireless network (SSID) you would like to
connect to and click Connect.
D-Link DIR-855 User Manual
75
Section 5 - Connecting to a Wireless Network
3. Enter the same security key or passphrase that is on your router
and click Connect.
It may take 20-30 seconds to connect to the wireless network. If the
connection fails, please verify that the security settings are correct.
The key or passphrase must be exactly the same as on the wireless
router.
D-Link DIR-855 User Manual
76
Section 5 - Connecting to a Wireless Network
Connect Using WCN 2.0 in Windows Vista™
The router supports Wi-Fi protection, referred to as WCN 2.0 in Windows Vista™. The following instructions for setting
this up depends on whether you are using Windows Vista™ to configure the router or third party software.
When you first set up the router, Wi-Fi protection is disabled and unconfigured. To enjoy the benefits of Wi-Fi protection,
the router must be both enabled and configured. There are three basic methods to accomplish this: use Windows Vista’s
built-in support for WCN 2.0, use software provided by a third party, or manually configure.
If you are running Windows Vista™, log into the router and click the Enable checkbox in the Basic > Wireless section.
Use the Current PIN that is displayed on the Advanced > Wi-Fi Protected Setup section or choose to click the Generate
New PIN button or Reset PIN to Default button.
For additional information, please refer to page 47.
If you are using third party software to set up Wi-Fi Protection, carefully follow the directions. When you are finished,
proceed to the next section to set up the newly-configured router.
D-Link DIR-855 User Manual
77
Section 5 - Connecting to a Wireless Network
Connect to a Wireless Network
Using Windows® XP
Windows® XP users may use the built-in wireless utility (Zero Configuration Utility). The following instructions are for
Service Pack 2 users. If you are using another company’s utility or Windows® 2000, please refer to the user manual
of your wireless adapter for help with connecting to a wireless network. Most utilities will have a “site survey” option
similar to the Windows® XP utility as seen below.
If you receive the Wireless Networks Detected bubble, click on
the center of the bubble to access the utility.
or
Right-click on the wireless computer icon in your system tray
(lower-right corner next to the time). Select View Available
Wireless Networks.
The utility will display any available wireless networks in your
area. Click on a network (displayed using the SSID) and click the
Connect button.
If you get a good signal but cannot access the Internet, check you
TCP/IP settings for your wireless adapter. Refer to the Networking
Basics section in this manual for more information.
D-Link DIR-855 User Manual
78
Section 5 - Connecting to a Wireless Network
Configure WPA-PSK
It is recommended to enable WPA on your wireless router or access point before configuring your wireless adapter. If
you are joining an existing network, you will need to know the WPA key being used.
1. Open the Windows® XP Wireless Utility by right-clicking
on the wireless computer icon in your system tray
(lower-right corner of screen). Select View Available
Wireless Networks.
2. Highlight the wireless network (SSID) you would like to
connect to and click Connect.
D-Link DIR-855 User Manual
79
Section 5 - Connecting to a Wireless Network
3. The Wireless Network Connection box will appear. Enter the
WPA-PSK passphrase and click Connect.
It may take 20-30 seconds to connect to the wireless network. If the
connection fails, please verify that the WPA-PSK settings are correct.
The WPA-PSK passphrase must be exactly the same as on the
wireless router.
D-Link DIR-855 User Manual
80

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Encryption                      : Standard V2.3 (128-bit)
User Access                     : Print, Copy, Print high-res
Tagged PDF                      : Yes
XMP Toolkit                     : 3.1-702
Modify Date                     : 2007:11:28 08:52:01-08:00
Create Date                     : 2007:11:28 08:50:44-08:00
Metadata Date                   : 2007:11:28 08:52:01-08:00
Creator Tool                    : Adobe Illustrator CS3
Format                          : application/pdf
Document ID                     : uuid:88cb4d35-8818-4cab-b595-9049e13bb86d
Instance ID                     : uuid:3e430fb1-7d44-47db-a28b-c33971e95025
Producer                        : Adobe PDF Library 7.0
Page Count                      : 42
Creator                         : Adobe Illustrator CS3
EXIF Metadata provided by EXIF.tools
FCC ID Filing: KA2DIR855A1

Navigation menu