D Link TW1130 Wireless VPN Router User Manual di714P manual 1 31

D Link Corporation Wireless VPN Router di714P manual 1 31

User Manual Part 2

Download: D Link TW1130 Wireless VPN Router User Manual di714P  manual 1 31
Mirror Download [FCC.gov]D Link TW1130 Wireless VPN Router User Manual di714P  manual 1 31
Document ID399292
Application IDfZPUnxOobWbyid6TWXysNw==
Document DescriptionUser Manual Part 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize273.03kB (3412852 bits)
Date Submitted2004-02-26 00:00:00
Date Available2004-02-24 00:00:00
Creation Date2003-10-20 16:56:17
Producing SoftwareAcrobat Distiller 5.0.5 (Windows)
Document Lastmod2004-02-06 11:47:18
Document Titledi714P+_manual_1.31
Document CreatorAdobe PageMaker 7.0
Document Author: jnavarrete

Using the Configuration Menu
Home > VPN Settings > Tunnel > Manual
Tunnel Name
Current tunnel name.
Aggressive Mode
Enabling this mode will accelerate establishing tunnel, but
the device will have less security.
Local Subnet
The subnet of the VPN gateway’s local network. It can be a
host, a partial subnet, or a whole subnet.
Local Netmask
Local netmask combined with local subnet to form a subnet
domain.
Remote Subnet
The subnet of the remote VPN gateway’s local network. It
can be a host, a partial subnet, or a whole subnet.
Remote Netmask
The subnet of the remote VPN gateway’s local network.
It can be a host, a partial subnet, or a whole subnet.
Remote Gateway
The WAN IP address of remote VPN gateway.
Method
The set of rules applied when connecting to the VPN gateway.
Local SPI
The value of the local SPI should be set in hex format.
Remote SPI
The value of the remote SPI should be set in hex format.
29
Using the Configuration Menu
Home > VPN Settings > Tunnel > Manual Continued...
Encapsulation
Protocol
There are two protocols that can be selected: ESP and AH.
Encryption
Algorithm
There are two algorithms that can be selected: 3DES and DES.
Encryption Key
For DES, the encryption key is 8 bytes (16 Char.). For 3DES,
the encryption key is 24 bytes (48 Char.).
Authentication
Algorithm
There are two algorithms that can be selected: SHA1 and MD5.
Authentication Key
For MD5, the authentication algorithm is16 bytes (32 Char.).
For SHA1, the authentication algorithm is 20 bytes.(40 Char.).
Life Time
Enter in the life time value.
Life Time Unit
There are two units that can be selected: Second and KB.
30
Using the Configuration Menu
Home > VPN Settings > Dynamic VPN Tunnel
VPN Settings - IKE
There are three parts that are necessary to setup the
configuration of IKE for the dedicated tunnel: basic setup, IKE
proposal setup, and IPSec proposal setup. Basic setup
includes the setting of following items: local subnet, local
netmask, remote subnet, remote netmask, remote gateway,
and pre-shared key. The tunnel name is derived from the
previous page of VPN setting. IKE proposal setup includes
the setting of a set of frequent-used IKE proposals and selecting
from the set of IKE proposals.
Tunnel Name
Current tunnel name.
Dynamic VPN
This feature works with a VPN software client so the DI824VUP does not need to know the IP address of the remote
clients.
Aggressive Mode
Enabling this mode will accelerate establishing the tunnel,
but the device will have less security.
Local Subnet
The subnet of the VPN gateway’s local network. It can be a
host, a partial subnet, or a whole subnet.
Local Netmask
The netmask of the VPN gateway’s local network.
31
Using the Configuration Menu
Home > VPN Settings > Dynamic VPN Tunnel Continued...
Preshared Key
The first key that supports IKE mechanism of both VPN
gateways for negotiating further security keys. The preshared key must be the same for both endpoint gateways.
IKE Proposal index
Click the button to setup a set of frequent-used IKE
proposals and select from the set of IKE proposals for the
dedicated tunnel.
IPSec Proposal
index
Click the button to setup a set of frequent-used IPSec
proposals and select from the set of IKE proposals for the
dedicated tunnel.
32
Using the Configuration Menu
Home > VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal
IKE Proposal index
A list of selected proposal indexes from the IKE proposal
pool listed below.
Proposal Name
It indicates which IKE proposal to be focused.
DH Group
There are three groups that can be selected: group 1
(MODP768), group 2 (MODP1024), and group 5
(MODP1536).
Encrypt algorithm
There are two algorithms that can be selected: 3DES and
DES.
Auth algorithm
There are two algorithms that can be selected: SHA1 and
MD5.
33
Using the Configuration Menu
Home > VPN Settings > Dynamic VPN Tunnel > Set IKE Proposal
Continued...
Life Time
Enter in the life time value.
Life Time Unit
There are two units that can be selected: second and KB.
Proposal ID
The identifier of IKE proposal can be chosen for adding the
corresponding proposal to the dedicated tunnel.
Add to
Click it to add the chosen proposal indicated by proposal ID
to IKE Proposal index list.
34
Using the Configuration Menu
Home > VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal
IPSec Proposal
index
A list of selected proposal indexes from the IPSec proposal
pool listed below.
Proposal Name
This is the name used to classify the IPSec proposal.
DH Group
There are three groups that can be selected: group 1
(MODP768), group 2 (MODP1024), and group 5
(MODP1536).
Encap protocol
There are two protocols that can be selected: ESP and AH.
Encrypt algorithm
There are two algorithms that can be selected: 3DES and
DES.
Auth algorithm
There are two algorithms that can be selected: SHA1 and
MD5.
35
Using the Configuration Menu
Home > VPN Settings > Dynamic VPN Tunnel > Set IPSEC Proposal
Continued...
Life Time
Enter in a life time value.
Life Time Unit
There are two units that can be selected: second and KB.
Proposal ID
The identifier of IPSec proposal can be chosen for adding the
corresponding proposal to the dedicated tunnel.
Add to
Click it to add the chosen proposal indicated by proposal ID
to IPSec Proposal index list.
36
Using the Configuration Menu
Home > VPN Settings > L2TP Server Setting
Enable L2TP
Server
Click to enable the L2TP Server function.
Virtual IP of
L2TP Server
Enter your Virtual IP address to access the L2PT server.
Authentication
Protocol
Select one of the following authentication protocols: PAP,
CHAP, or MSCHAP.
Tunnel Name
Current tunnel name.
User Name
Enter in the username for the L2TP account.
Password
Enter in the password for the L2TP account.
37
Using the Configuration Menu
Home > VPN Settings > PPTP Server Setting
Enable PPTP
Server
Click to enable the PPTP Server function.
Virtual IP of
PPTP Server
Enter your Virtual IP address to access thePPPT server.
Authentication
Protocol
Select one of the following authentication protocols: PAP,
CHAP, or MSCHAP.
Tunnel Name
Current tunnel name.
User Name
Enter in the username for the PPTP account.
Password
Enter in the password for the PPTP account.
38
Using the Configuration Menu
Advanced > Virtual Server
The DI-824VUP can be configured as a virtual server so that remote users accessing
Web or FTP services via the public IP address can be automatically redirected to local
servers in the LAN (Local Area Network).
The DI-824VUP firewall feature filters out unrecognized packets to protect your LAN
network so all computers networked with the DI-824VUP are invisible to the outside
world. If you wish, you can make some of the LAN computers accessible from the
Internet by enabling Virtual Server. Depending on the requested service, the DI-824VUP
redirects the external service request to the appropriate server within the LAN network.
Name
The name referencing the virtual service.
Private IP
The server computer in the LAN network that will be providing
the virtual services.
Protocol Type
The protocol used for the virtual service.
Private Port
The port number of the service used by the Private IP computer.
Public Port
The port number on the WAN side that will be used to access
the virtual service.
Schedule
Select Always, or choose From and enter the time period during which the virtual service will be available.
39
Using the Configuration Menu
Advanced > Application
Some applications require multiple connections, such as Internet gaming, video
conferencing, Internet telephony, and others. These applications have difficulties working
through NAT (Network Address Translation). Special Applications makes some of these
applications work with the DI-824VUP. If you need to run applications that require multiple
connections, specify the port normally associated with an application in the Trigger
field, then enter the public ports associated with the trigger port into the Incoming
Ports field.
At the bottom of the screen, there are already defined special applications. To use them,
select one from the drop down list and select an ID number you want to use. Then click
the “Copy to” button and the router will fill in the appropriate information to the list. You
will then need to enable the service. If the mechanism of Special Applications fails to
make an application work, try using DMZ host instead.
Note! Only one PC can use each Special Application tunnel.
Enabled
Select to activate the policy.
Trigger Port
This is the port used to trigger the application. It can be
either a single port or a range of ports.
Public Ports
This is the port number on the WAN side that will be used to
access the application. You may define a single port or a range
of ports. You can use a comma to add multiple ports or port
ranges.
40
Using the Configuration Menu
Advanced > Filter > IP Filter
Use IP (Internet Protocol)
filters to allow or deny
computers access to the
Internet based on their IP
address.
IP Filter
Use IP Filters to deny LAN IP addresses access to the internet.
Enabled or Disabled
Click Enabled to apply the filter policy or click Disabled to enter an inactive filter policy.
(You can reactivate the policy later.)
IP Address
Enter in the IP address range of the computers that you want the policy to apply to. If it
is only a single computer that you want the policy applied to, then enter the IP address of
that computer in the Start Source IP and leave the End Source IP blank.
Port Range
Enter in the port range of the TCP/UDP ports that you want the policy to apply to. If it is
only a single port that you want the policy applied to, then enter the port number in the
Start Port field and leave the End Port field blank. If you want to use all the ports, you
can leave the port range empty.
Protocol
Select the protocol type to allow or deny certain types of IP addresses.
Schedule
Select Always, or choose From and enter the time period during which the IP filter policy
will be in effect.
41
Using the Configuration Menu
Advanced > Filter > MAC Filters
MAC (Media Access Control) Filters are used to allow or deny LAN (Local Area Network)
computers from accessing the Internet and network by their MAC address.
At the bottom of the screen, there is a list of MAC addresses from the DHCP client
computers connected to the DI-824VUP. To use them, select one from the drop down
list. Then click the “Apply” button and the DI-824VUP will fill in the appropriate information
to the list.
Disabled MAC Filter
Select this option if you do not want to use MAC filters.
Only allow computers with MAC address listed below to access the network
Select this option to only allow computers that are in the list to access the network
and Internet. All other computers will
be denied access to the network and
Internet.
Only deny computers with MAC address listed below to access the network
Select this option to only deny computers that are in the list to access the network
and Internet. All other computers will be allowed access to the network and Internet.
MAC Address
Enter the MAC Address of the client that will be filtered.
42
Using the Configuration Menu
Advanced > Filter > URL Blocking
Use URL Blocking to deny LAN computers from accessing specific web sites by its
URL. A URL is a specially formatted text string that defines a location on the Internet.
If any part of the URL contains the blocked word, the site will not be accessible and
the web page will not display.
Disabled URL Blocking
Select this option if you do not want to use URL Blocking.
43
Using the Configuration Menu
Advanced > Filter > Domain Blocking
Use Domain Blocking to allow or deny computers access to specific Internet domains
whether it is through www, ftp, snmp, etc.
Disabled Domain Blocking
Select this option if you do not want to use Domain Blocking.
Allow users to access all domains except “Blocked Domains”
Select this option to allow users to access the specified Internet domains listed below.
Users will be denied access to all other Internet domains.
Deny users to access all domains except “Permitted Domains”
Select this option to deny users to access the specified Internet domains listed below.
Users will be allowed access to all other Internet domains.
44
Using the Configuration Menu
Advanced > Firewall
Firewall Rules is an advance feature used to allow or deny traffic from passing through
the device. It works in the same way as IP Filters with additional settings. You can
create more detailed rules for the device.
Enabled or Disabled
Click Enabled to apply the filter policy or click Disabled to enter an inactive filter policy
(You can reactivate the policy later).
Name
Enter the name of the Firewall Rule.
Action
Select Allow or Deny to allow or deny traffic to pass through the DI-824VUP.
Source
Choose between a LAN or WAN source. An asterisk signifies the selection of both
sources.
IP Start
The starting IP address for the filter policy. Leaving the field blank selects all IPs.
IP End
The ending IP address for the filter policy. Leaving the field blank sleects all IPs.
Destination
Choose between a LAN or WAN destination. An asterisk signifies the selection of both
destinations.
45
Using the Configuration Menu
Advanced > Firewall Continued
IP Address
Enter in the IP address range of the computers that you want the policy to apply to. If it
is only a single computer that you want the policy applied to, then enter the IP address of
that computer in the Start Source IP and leave the End Source IP blank.
Protocol
Select one of the following protocols: TCP, UDP, or ICMP.
Port Range
Enter in the port range of the TCP/UDP ports that you want the policy to apply to. If it is
only a single port that you want the policy applied to, then enter the port number in the
Start Port field and leave the End Port field blank. If you want to use all the ports, you
can leave the port range empty.
Schedule
Select Always, or choose From and enter the time period during which the virtual service will be available.
46
Using the Configuration Menu
Advanced > SNMP
SNMP (Simple Network Management Protocol) is a widely used network monitoring and
control protocol that reports activity on each network device to the administrator of the
network. SNMP can be used to monitor traffic and statistics of the DI-824VUP. The DI824VUP supports SNMP v1 or v2c.
Enable SNMP
(Simple Network Management Protocol.)
Local
LAN (Local Area Network).
Remote
WAN (Wide Area Network).
Get Community
Enter the password public in this field to allow “Read only” access to network administration using SNMP. You can view the
network, but no configuration is possible wth this setting.
Set Community
Enter the password private in this field to gain “Read and Write”
access to the network using SNMP software. The administrator can configure the network with this setting.
SNMP v1
Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management
information between nework devices.
SNMP v2
Enhanced version of SNMP v1 with additional protocol operations such as UDP, IP, CLNS, DDP, and IPX.
47
Using the Configuration Menu
Advanced > DDNS
DDNS (Dynamic Domain Name System) keeps dynamic IP addresses (e.g., IP
addresses assigned by a DHCP capable router or server) linked to a domain name.
Users who have a Dynamic DNS account may use this feature on the DI-824VUP.
DDNS
When an IP address is automatically assigned by a DHCP
server, DDNS automatically updates the DNS server. Select
Disabled or Enabled.
Provider
Select from the pull-down menu.
Host Name
Enter the Host name.
Username/Email
Enter the username or email address.
Password/Key
Enter the password or key.
48
Using the Configuration Menu
Advanced > Routing
Static routes can be added if
you require specific routes
within your internal network.
These routes will not apply to
the WAN (Internet) network.
Dynamic Routing
Dynamic Routing Settings allow the VPN Router to route IP
packets to another network automatically. The RIP protocol is
applied, and broadcasts the routing information to other routers
on the network regularly.
By default, it is set to disable. Check to enable (RIPv1 / RIPv2)
protocol.
RIP v1
Protocol in which the IP address is routed through the internet.
RIP v2
Enhanced version of RIP v1with added features such as Authentication, Routing Domain, Next Hop Fowarding, and Subnetmask Exchange.
Destination
Enter in the IP of the specified network that you want to
access using the static route.
Subnet Mask
Enter in the subnet mask to be used for the specified net
work.
Gateway
Enter in the gateway IP address to the specified network.
Hop
Enter in the amount of hops it will take to the specified
network.
Enable
Select this option for the specified static route to take effect.
Hop Count - In a transmission path, each link is terminated at a network device
such as a router or gateway. The number of hops equals the number of routers or
gateways that data must pass through before reaching the destination.
49
Using the Configuration Menu
Advanced > DMZ
If you have a computer that cannot run Internet applications properly from behind the DI824VUP, then you can allow that computer to have unrestricted Internet access. Enter
the IP address of that computer as a DMZ (Demilitarized Zone) host with unrestricted
Internet access. Adding a client to the DMZ may expose that computer to a variety of
security risks; so only use this option as a last resort.
50
Using the Configuration Menu
Advanced > Performance
Beacon Interval Beacons are packets sent by an Access Point to synchronize a
wireless network. Specify a value. 100 is the default setting and is
recommended.
DTIM interval
(Delivery Traffic Indication Message) 3 is the default setting. A DTIM
is a countdown informing clients of the next window for listening to
broadcast and multicast messages.
TX Rates
Select the data rate. Default is 1-2-5.5-11-22-54Mbps.
Wireless Mode Select either mix mode or G mode.
Mixed Mode
The DI-824VUP will use either B or G mode depending on which
mode has a stronger frequency.
G Mode
The DI-824VUP will only use G mode.
51
Using the Configuration Menu
Advanced > Performance (Continued)
Authentication
Open System
Shared Key
Both
Select Open system, Shared Key or Both.
The DI-824VUP will be visible to all devices on the network. This is
the default setting.
In this mode, in order to access the DI-824VUP on the network,
the device must be listed in the MAC Address Control List.
In this mode, all devices on the network can access the
DI-824VUP.
SSID Broadcast Enable is the default setting. Choose Enable to broadcast the SSID
across the network. All devices on a network must share the same
SSID (Service Set Identifier) to establish communication. Choose
Disable if you do not wish to broadcast the SSID over the network.
8x
Enable 8X Mode on the wireless client and the DI-824VUP to
increase data transmission speed. 8X Mode will only work with
wireless devices that also support 8X Mode.
52

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Encryption                      : Standard V1.2 (40-bit)
User Access                     : Print, Modify, Copy, Annotate, Fill forms, Extract, Assemble, Print high-res
Create Date                     : 2003:10:20 16:56:17Z
Modify Date                     : 2004:02:06 11:47:18+08:00
Subject                         : di714P+_manual_1.31
Page Count                      : 24
Creation Date                   : 2003:10:20 16:56:17Z
Mod Date                        : 2004:02:06 11:47:18+08:00
Producer                        : Acrobat Distiller 5.0.5 (Windows)
Author                          : jnavarrete
Keywords                        : 
Metadata Date                   : 2004:02:06 11:47:18+08:00
Creator                         : jnavarrete
Title                           : di714P+_manual_1.31
Description                     : di714P+_manual_1.31
Has XFA                         : No
EXIF Metadata provided by EXIF.tools
FCC ID Filing: KA2TW1130

Navigation menu