D Link WL3150A1 802.11g Wireless Bridge User Manual Manual

D Link Corporation 802.11g Wireless Bridge Manual

Manual

2D-Link DWL-3150 User ManualTable of ContentsProduct Overview ........................................................4Package Contents....................................................4Minimum System Requirements ..............................4Introduction ..............................................................5Features ...................................................................7Wireless Installation Considerations .........................8Three Operational Modes ........................................... 9Using the Configuration Menu .................................10Home > Basic Settings ..............................................11Wireless Bridge .....................................................11No Security ......................................................12Open System (64 Bits or 128 Bits) ..................13Shared Key (64 Bits or 128 Bits) ...................... 14WPA & WPA2 Personal .................................... 15Wireless Workgroup Bridge ................................... 16No Security ......................................................17Open System (64 Bits or 128 Bits) ..................18Shared Key (64 Bits or 128 Bits) ...................... 19Wireless WAN ........................................................20Wireless WAN > DHCP Client ............................... 22No Security ......................................................22Open System (64 Bits or 128 Bits) ..................23Shared Key (64 Bits or 128 Bits) ...................... 24WPA & WPA2 Personal .................................... 25WPA & WPA2 Enterprise ..................................26Wireless WAN > Static IP ......................................27No Security ......................................................28Open System (64 Bits or 128 Bits) ..................29Shared Key (64 Bits or 128 Bits) ...................... 30WPA & WPA2 Personal .................................... 31WPA & WPA2 Enterprise ..................................32LAN ........................................................................ 33Home > Advanced Settings ...................................... 35Performance .......................................................... 35Virtual Server .........................................................37Port Forwarding .....................................................38Application Rules ...................................................39Firewall ..................................................................40Advanced Network .................................................41DDNS.....................................................................42Schedule ................................................................ 43Filters .....................................................................44Network Filter ................................................... 44Website Filter ................................................... 45Home > Status ........................................................... 46Device Information ................................................. 46Wireless Information ..............................................47Table of Contents
3D-Link DWL-3150 User ManualTable of ContentsStatistics ................................................................48Log ......................................................................... 49View Log .......................................................... 49Log Settings .....................................................50Tool .............................................................................51Administrator Settings ............................................51Firmware Upgrade .................................................52Configuration File Upload and Download ..............53NTP Settings..........................................................54Configuration ............................................................. 55Save and Activate .................................................. 55System ........................................................................56System Settings ..................................................... 56System Information ................................................ 57Wireless Basics ......................................................... 58Networking Basics .................................................... 63Check your IP Address .......................................... 63Statically Assign an IP Address .............................64Contacting Technical Support .................................. 65GNU/Linux GPL ..........................................................66GNU General Public License ................................. 67Warranty .....................................................................73Registration ................................................................78
4D-Link DWL-3150 User ManualSection 1 - Product Overview• D-Link DWL-3150 802.11g Wireless Bridge• Install Guide• Manual, Install Guide, and warranty on CD• Ethernet (CAT5-UTP/Straight-Through) Cable• Power AdapterIf any of the above items are missing, please contact your reseller.Minimum System Requirements• Computers with Windows®, Macintosh, or Linux-based operating systems with an installed Ethernet Adapter.•  Internet Explorer version 6.0 or Netscape Navigator version 7.0 and above.Product OverviewPackage Contents
5D-Link DWL-3150 User ManualSection 1 - Product OverviewIntroductionAt up to fifteen times the speed* of previous wireless devices you can work faster and more efficiently, increasing productivity. With the DWL-3150, bandwidth-intensive applications like graphics or multimedia will benefit significantly because large files are able to move across the network quickly.Inclusion of all three standards (802.11b and 802.11g) means that the DWL-3150 is versatile enough to allow connection to almost any 802.11 network or device.The DWL-3150 is capable of operating in one of 3 different modes to meet your wireless networking needs. The DWL-3150 can operate as a Wireless Bridge, a Wireless Workgroup Bridge, or a Wireless WAN. An ideal solution for quickly creating and extending a wireless local area network (WLAN) in offices or other workplaces, trade shows and special events, the DWL-3150 provides data transfers at up to 54Mbps* when used with other D-Link Air Premier® or Air Premier AG® products (The 802.11g standard is backwards compatible with 802.11b devices).WPA is offered in two flavors: Enterprise (used for corporations), and Personal (used for home users).WPA-Personal and WPA2-Personal is directed at home users who do not have the server based equipment required for user authentication. The method of authentication is similar to WEP because you define a “Pre-Shared Key” on the wireless router/AP. Once the pre-shared key is confirmed and satisfied on both the client and access point, then access is granted. The encryption method used is referred to as the Temporal Key Integrity Protocol (TKIP), which offers per-packet dynamic hashing. It also includes an integrity checking feature which ensures that the packets were not tampered with during wireless transmission. WPA2-Personal is far superior to WPA-Personal, because the encryption of data is upgraded with the Advanced Encryption Standard (AES).*Maximum wireless signal rate derived from IEEE Standard 802.11g specifications. Actual data throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead lower actual data throughput rate.
6D-Link DWL-3150 User ManualSection 1 - Product OverviewWPA-Enterprise  and WPA2-Enterprise  is  ideal  for  businesses  that  have  existing  security  infrastructures  in  place. Management and security implementation can now be centralized on a server participating on the network. Utilizing 802.1x with a RADIUS (Remote Authentication Dial-in User Service) server, a network administrator can define a list of authorized users who can access the wireless LAN. When attempting to access a wireless LAN with either WPA-Enterprise or WPA2-Enterprise configured, the new client will be challenged with a username and password. If the new client is authorized by the administration, and enters the correct username and password, then access is granted. In a scenario where an employee leaves the company, the network administrator can remove the employee from the authorized list and not have to worry about the network being compromised by a former employee. WPA2-Enterprise is far superior to WPA-Enterprise, because the encryption of data is upgraded with the Advanced Encryption Standard (AES).
7D-Link DWL-3150 User ManualSection 1 - Product Overview• 3 Different Operation modes -  Capable of operating in one of three different operation modes to meet your wireless networking requirements: Wireless Bridge, Wireless Workgroup Bridge, or Wireless WAN.• Faster wireless networking speeds up to 54Mbps*.• Compatible with 802.11b and 802.11g Devices that is fully compatible with the IEEE 802.11b and 802.11g standards, the DWL-3150 can connect with existing 802.11b- or 802.11g-compliant wireless network adapter cards.• Compatible with the 802.11b standard to provide a wireless data rate of up to 11Mbps - that means you can migrate your system to the 802.11g standard on your own schedule without sacrificing connectivity.• Better security with WPA - The DWL-3150 can securely connect wireless clients on the network using WPA (Wi-Fi Protected Access) providing a much higher level of security for your data and communications than has previously been available.• Utilizes OFDM technology (Orthogonal Frequency Division Multiplexing).• Operates in the 2.437GHz frequency range for an 802.11b and 802.11g network.• Web-based interface for managing and configuring.*Maximum wireless signal rate derived from IEEE Standard 802.11g specifications. Actual data throughput will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead lower actual data throughput rate.Features
8D-Link DWL-3150 User ManualSection 2 - InstallationWireless Installation ConsiderationsThe D-Link 802.11g Wireless Bridge lets you access your network using a wireless connection from virtually anywhere within the operating range of your wireless network. Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF (radio frequency) noise in your home or business. The key to maximizing wireless range is to follow these basic guidelines:1. Keep the  number of  walls and ceilings between the  D-Link adapter and  other network devices  to a minimum - each wall or ceiling can reduce your adapter’s range from 3-90 feet (1-30 meters.) Position your devices so that the number of walls or ceilings is minimized.2. Be  aware  of  the  direct  line  between  network  devices.  A  wall  that  is  1.5  feet  thick  (.5  meters),  at  a   45-degree angle appears to be almost 3 feet (1 meter) thick. At a 2-degree angle it looks over 42 feet (14 meters) thick! Position devices so that the signal will travel straight through a wall or ceiling (instead of at an angle) for better reception.3. Building Materials make a difference. A solid metal door or aluminum studs may have a negative effect on range. Try to position access points, wireless routers, and computers so that the signal passes through drywall or open doorways. Materials and objects such as glass, steel, metal, walls with insulation, water (fish tanks), mirrors, file cabinets, brick, and concrete will degrade your wireless signal.4. Keep  your product  away (at  least  3-6  feet  or  1-2  meters)  from  electrical  devices  or  appliances  that generate RF noise.5. If you are using 2.4GHz cordless phones or X-10 (wireless products such as ceiling fans, lights, and home security systems), your wireless connection may degrade dramatically or drop completely. Make sure your 2.4GHz phone base is as far away from your wireless devices as possible. The base transmits a signal even if the phone in not in use.
9D-Link DWL-3150 User ManualSection 3 - ConfigurationThree Operational Modes
10D-Link DWL-3150 User ManualSection 3 - ConfigurationTo configure the DWL-3150, use a computer which is connected to the DWL-3150 with an Ethernet cable (see the Network Layout diagram).First, disable the Access the Internet using a proxy server function. To disable this function, go to Control Panel > Internet Options > Connections > LAN Settings and uncheck the enable box.  Start your web browser program (Internet Explorer, Netscape Navigator). Type  the  IP  address  and  http  port  of  the  DWL-3150  in  the  address  field (http://192.168.0.30) and press Enter. Make sure that the IP addresses of the DWL-3150 and your computer are in the same subnet.After the connection is established, you will see the user identification window as shown. Note: If you have changed the default IP address assigned to the DWL-3150, make sure to enter the correct IP address.         •  Type admin in the User Name field        •  Leave the Password field blank        •  Click OKNote: If you have changed the password, make sure to enter the correct password.Using the Configuration Menu
11D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuWireless BridgeHome > Basic SettingsWireless Bridge - Wirelessly connects Ethernet  devices,  and  provides immediate  connection  for Ethernet devices  without  the  need  for  any drivers.Service  Set  Identifier  (SSID)  is  the name designated for a specific wireless local area network (WLAN). The factory default setting is “dlink”. The SSID can be  easily  changed  to  connect  to  an existing wireless network or to establish a new wireless network.Indicates  the  channel  setting  for  the DWL-3150. The  Channel  can  be changed to fit the channel setting for an  existing  wireless  network  or  to customize the wireless network.For  added  security  on  a  wireless network,  data  encryption  can  be enabled. There  are  several  available Authentications type can be selected. The default value for Authentication is set to “Open System”.Wireless Mode:SSID:Channel:Authentication:
12D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuNo SecurityFor Open System authentication, only  the  wireless  clients  with  the same WEP  key  will  be  able  to communicate  on  the  wireless network. The  Access  Point  will remain visible to all devices on the network.Select Disabled to disable WEP encryption. Authentication:Encryption:
13D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuOpen System (64 Bits or 128 Bits)For Open System authentication, only  the  wireless  clients  with  the same WEP  key  will  be  able  to communicate  on  the  wireless network. The  Access  Point  will remain visible to all devices on the network.Select Enabled to enable WEP encryption. Select HEX or ASCII.Select 64 Bits or 128 Bits.Select the 1st through the 4th key to be the active key.Input up to four keys for encryption. You will select one of these keys in the valid key field.Note: Hexadecimal digits consist of the numbers 0-9 and the letters A-F.ASCII (American Standard Code for Information Interchange) is a code for representing English letters as numbers 0-127.Authentication:Encryption:Key Type:Key Size:Valid Key:First through Fourth Keys:
14D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuShared Key (64 Bits or 128 Bits)For  Shared  Key  authentication, the bridge cannot be seen on the wireless  network  except  to  the wireless  clients  that  share  the same WEP key.Select Enabled to enable WEP encryption. Select HEX or ASCII.Select 64 Bits or 128 Bits.Select the 1st through the 4th key to be the active key.Input up to four keys for encryption. You will select one of these keys in the valid key field.Note: Hexadecimal digits consist of the numbers 0-9 and the letters A-F.ASCII (American Standard Code for Information Interchange) is a code for representing English letters as numbers 0-127.Authentication:Encryption:Key Type:Key Size:Valid Key:First through Fourth Keys:
15D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuWPA & WPA2 PersonalWi-Fi Protected Access authorizes and authenticates users onto the wireless network. WPA and WPA2 uses  different  algorithm.  Auto allows both WPA and WPA2.Select TKIP  or  AES  from  the  pull-down menu.Enter a passphrase. The passphrase is an alpha-numeric password between 8 and 63 characters long. The password can  include  symbols  (!?*&_)  and spaces. Make sure you enter this key exactly the same on all other wireless clients.Re-enter  the  passphrase  once  more for confirmation.Authentication:Cipher Type:PassPhrase:Confirm PassPhrase:
16D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuWireless Workgroup BridgeWireless Workgroup Bridge - Wirelessly connects  multiple  wireless  networks while  still  functioning  as  a  wireless access point.Service  Set  Identifier  (SSID)  is  the name designated for a specific wireless local area network (WLAN). The factory default setting is “dlink”. The SSID can be  easily  changed  to  connect  to  an existing wireless network or to establish a new wireless network.Indicates  the  channel  setting  for  the DWL-3150. The  Channel  can  be changed to fit the channel setting for an  existing  wireless  network  or  to customize the wireless network.Enter up to eight Remote Bridge MAC Addresses.Select your network.For  added security  on  a wireless network, data encryption  can  be enabled. There are  several available Authentications type can be selected. The default value for Authentication is set to “Open System”.Wireless Mode:SSID:Channel:Remote AP MAC Address:Site Survey:Authentication:
17D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuNo SecurityNo Security is selected.Disabled. Authentication:Encryption:
18D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuOpen System (64 Bits or 128 Bits)For Open System authentication, only the wireless clients with the same WEP key will be able to communicate on the wireless  network. The  Access  Point will remain visible to all devices on the network.Select Enabled to enable WEP encryption. Select HEX or ASCII.Select 64 Bits or 128 Bits.Select the 1st through the 4th key to be the active key.Input  up  to  four  keys  for  encryption. You will select one of these keys in the valid key field.Note: Hexadecimal digits consist of the numbers 0-9 and the letters A-F.ASCII (American Standard Code for Information Interchange) is a code for representing English letters as numbers 0-127.Authentication:Encryption:Key Type:Key Size:Valid Key:First through Fourth Key:
19D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuShared Key (64 Bits or 128 Bits)For  Shared  Key  authentication,  the Access  Point  cannot  be  seen  on  the wireless network except to the wireless clients that share the same WEP key.Select Enabled to enable WEP encryption. Select HEX or ASCII.Select 64 Bits or 128 Bits.Select the 1st through the 4th key to be the active key.Input  up  to  four  keys  for  encryption. You will select one of these keys in the valid key field.Note: Hexadecimal digits consist of the numbers 0-9 and the letters A-F.ASCII (American Standard Code for Information Interchange) is a code for representing English letters as numbers 0-127.Authentication:Encryption:Key Type:Key Size:Valid Key:First through Fourth Key:
20D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuWireless WANWireless WAN  -  In  this  mode,  the DWL-3150 will behave just the same as the Wireless Bridge mode for wireless function. However, router functions are added between the wireless WAN side and the Ethernet LAN side. Therefore, the WISP  (Wireless  Internet  Service Provider)  subscriber  can  share  the WISP connection without the need for extra router. Service  Set  Identifier  (SSID)  is  the name designated for a specific wireless ISP. The factory default setting is “dlink”. The  SSID  can  be  easily  changed to  connect  to  an  existing  wireless network.Indicates  the  channel  setting  for  the DWL-3150. The  Channel  can  be changed to fit the channel setting for an existing wireless network.Wireless Mode:SSID:Channel:
21D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuChoose DHCP to obtain an IP Address automatically from a DHCP server in your network. This is allows the DWL-3150 to obtain the DHCP address from WISP.The Hostname of the network device you are configuring DHCP Reservation for.Enter the MAC address of the network device you are configuring a DHCP Reservation for.Copy the MAC address of the network device you are configuring a DHCP Reservation for.  Enter your primary DNS IP address.Enter your secondary DNS IP address.Internet Connection Type:Host Name:MAC Address:Clone MAC Address:Primary DNS Server:Secondary DNS Server:
22D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuNo SecurityWireless WAN > DHCP ClientFor added security on a wireless network, data encryption can be enabled. There are  several  available  Authentications type can be selected. Select Disable  if you choose  to not  have security.Authentication:Encryption:
23D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuOpen System (64 Bits or 128 Bits)For Open System authentication, only the  wireless  clients  with  the  same WEP key will be able to communicate on the wireless network. The Access Point will remain visible to all devices on the network.Select Enabled to enable WEP encryption. Select HEX or ASCII.Select 64 Bits or 128 Bits.Select the 1st through the 4th key to be the active key.Input  up  to  four  keys  for  encryption. You will select one of these keys in the valid key field.Note: Hexadecimal digits consist of the numbers 0-9 and the letters A-F.ASCII (American Standard Code for Information Interchange) is a code for representing English letters as numbers 0-127.Authentication:Encryption:Key Type:Key Size:Valid Key:First through Fourth Key:
24D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuShared Key (64 Bits or 128 Bits)For  Shared  Key  authentication,  the Access Point cannot be seen on the wireless network except to the wireless clients that share the same WEP key.Select Enabled to enable WEP encryption. Select HEX or ASCII.Select 64 Bits or 128 Bits.Select the 1st through the 4th key to be the active key.Input  up  to  four  keys  for  encryption. You will select one of these keys in the valid key field.Note: Hexadecimal digits consist of the numbers 0-9 and the letters A-F.ASCII (American Standard Code for Information Interchange) is a code for representing English letters as numbers 0-127.Authentication:Encryption:Key Type:Key Size:Valid Key:First through Fourth Key:
25D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuWPA & WPA2 PersonalWi-Fi Protected Access authorizes and authenticates  users  onto  the  wireless network. WPA and WPA2 uses different algorithm. Select TKIP or AES from the pull-down menu.Enter a passphrase. The passphrase is an alpha-numeric password between 8 and 63 characters long. The password can include symbols  (!?*&_)  and  spaces.  Make  sure you enter this key exactly the same on all other wireless clients.Re-enter  the  passphrase  once  more  for confirmation.Authentication:Cipher Type:PassPhrase:Confirm PassPhrase:
26D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuWPA & WPA2 EnterpriseWi-Fi  Protected  Access  authorizes  and authenticates  users  onto  the  wireless network. WPA  uses  stronger  security  than WEP  and  is  based  on  a  key  that  changes automatically at a regular interval. It requires a RADIUS server in the network. WPA and WPA2  uses  different  algorithm. WPA-Auto allows both WPA and WPA2.Select TLS, TTLS or PEAP from the pull-down menu.Select TKIP  or  AES  from  the  pull-down menu.Client  and  server  authenticate  each  other using  digital  certificates.  Client  generates a  pre-master  secret  key  by  encrypting  a random number with the server’s public key and sends it to the server. Ce r t ificate  Au thor i ty  (Ex:  Microsoft Certification, Bank Cerification…etc). Client  Authentication  (Ex: The  cerification from Radius Server use in client device).EAP  private  key  data  use  in  wireless connection.Authentication:EAP Type:Cipher Type:EAP Secret:CA Certification:Client Certification:Private Key Certification:
27D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuWireless WAN > Static IPChoose Static IP if you have a static IP subscription from WISP. Enter  the  initial  IP  address  to  be assigned by the DHCP server.Enter the subnet mask.Enter the gateway IP address, typically a router.Enter the MAC address of the network device  you are  configuring  a  DHCP Reservation for.Copy the MAC address of the network device  you are  configuring  a  DHCP Reservation for.  Enter your primary DNS IP address.Enter your secondary DNS IP address.Internet Connection Type:IP Address:Subnet Mask:ISP Gateway Address:MAC Address:Clone MAC Address:Primary DNS Server:Secondary DNS Server:
28D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuNo SecurityFor added security on a wireless network, data encryption can be enabled. There are  several  available  Authentications type can be selected. Select Disable  if you choose  to not  have security.Authentication:Encryption:
29D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuOpen System (64 Bits or 128 Bits)For Open System authentication, only the  wireless  clients  with  the  same WEP key will be able to communicate on the wireless network. The Access Point will remain visible to all devices on the network.Select Enabled to enable WEP encryption. Select HEX or ASCII.Select 64 Bits or 128 Bits.Select the 1st through the 4th key to be the active key.Input  up  to  four keys for  encryption. You will select one of these keys in the valid key field.Note: Hexadecimal digits consist of the numbers 0-9 and the letters A-F.ASCII (American Standard Code for Information Interchange) is a code for representing English letters as numbers 0-127.Authentication:Encryption:Key Type:Key Size:Valid Key:First through Fourth Key:
30D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuShared Key (64 Bits or 128 Bits)For  Shared  Key  authentication,  the Access Point cannot be seen on the wireless network except to the wireless clients that share the same WEP key.Select Enabled to enable WEP encryption. Select HEX or ASCII.Select 64 Bits or 128 Bits.Select the 1st through the 4th key to be the active key.Input  up  to  four  keys  for  encryption. You will select one of these keys in the valid key field.Note: Hexadecimal digits consist of the numbers 0-9 and the letters A-F.ASCII (American Standard Code for Information Interchange) is a code for representing English letters as numbers 0-127.Authentication:Encryption:Key Type:Key Size:Valid Key:First through Fourth Key:
31D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuWPA & WPA2 PersonalWi-Fi Protected Access authorizes and authenticates  users onto the wireless network. WPA  uses  stronger  security than WEP and is based on  a key that changes  automatically  at  a  regular interval.  It  requires  a  RADIUS  server in  the  network. WPA  and WPA2  uses different algorithm. WPA-Auto allows both WPA and WPA2.Select TKIP or AES from the pull-down menu.Enter a passphrase. The passphrase is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. Make sure you enter this key exactly the same on all other wireless clients.Re-enter  the  passphrase  once  more  for confirmation.Authentication:Cipher Type:PassPhrase:Confirm PassPhrase:
32D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuWPA & WPA2 EnterpriseWi-Fi  Protected  Access  authorizes  and authenticates users onto the wireless network. WPA uses stronger security than WEP and is based on a key that changes automatically at a regular interval. It requires a RADIUS server in the network. WPA and WPA2 uses different algorithm. WPA-Auto  allows both WPA and WPA2.Select TLS, TTLS  or  PEAP from the pull-down menu.Select TKIP  or  AES  from  the  pull-down menu.Client and server authenticate each other using  digital  certificates.  Client  generates a  pre-master  secret  key  by  encrypting  a random number with the server’s public key and sends it to the server. Certificate  Authority  (Ex:  Microsoft Certification,  Bank  Cerification…etc).Upload  the  Client  certificate  for  client recognition.Client  Authentication  (Ex: The  cerification from Radius Server use in client device).EAP  private  key  data  use  in  wireless connection.Authentication:EAP Type:Cipher Type:EAP Secret:CA Certification:Client Certification:Private Key Certification:
33D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuLANAssign a static IP address that is within the IP address range of your network.Enter  the  subnet  mask.  All  devices in  the  network  must  share  the  same subnet mask.DHCP stands for Dynamic Host Control Protocol. The DHCP server assigns IP addresses to  devices on the network that  request  them. These  devices must be set to “Obtain the IP address automatically”.  By  default,  the  DHCP Server  is  enabled  on  the  DWL-3150. The  DHCP  address  pool  contains the  range  of  the  IP  address  that  will automatically be assigned to the clients on the network. The starting and ending IP address for the DHCP server’s IP assignment.The Lease Time is the period of time before the DHCP server will assign new IP addresses.Enter the domain name, if applicable. (An example of a domain name is: www.dlink.com.)When DNS Relay is enabled, DHCP clients of the router will be assigned the router’s LAN IP address as their DNS server. All DNS requests that the router receives will be forwarded to your ISPs DNS servers. When DNS relay is disabled, all DHCP clients of the router will be assigned the ISP DNS server. IP Address:Subnet Mask:Enable DHCP Server:DHCP IP Address Range:DHCP Lease Time:Local Domain Name:Enable DNS Relay:
34D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuEnable DHCP Reservation:Computer Name:IP Address:MAC Address:DHCP Reservation List:Dynamic DHCP Client List:DHCP Reservations allow the router to assign the same IP address to a specific device on your network. The specified device will get the same DHCP IP address information every time it is turned on or requests an IP address. No other computer on your network will receive the specified static DHCP address. DHCP Reservations are very helpful when used for server computers on your network that are hosting applications such as Web and FTP. Select Enabled to configure a DHCP Reservation. If you wish to disable this DHCP Reservation at a later date, click the edit icon next to the entry in the DHCP Reservation List, select the Disabled radio button, and then click Save Settings. Client computers with DHCP Reservations will have their information displayed in the DHCP Reservations List. The table will show the Host Name, IP Address, MAC Address, and Expired Time of the DHCP lease for each client computer.The Hostname of the network device you are configuring DHCP Reservation for. Enter the last octet of the IP address that you are configuring the network device to always obtain. Enter the MAC address of the network device you are configuring a DHCP Reservation for. This is a list of the computers or other devices for which you have created reserved DHCP entries. You can enable and disable entries with the Enabled checkbox. A DHCP Reservation entry can be changed by clicking the Edit icon, or deleted by clicking the Delete icon. When you click the Edit icon, the item is highlighted, and the “DHCP Reservations” section is activated for editing. In this section you can see what LAN devices are currently leasing IP addresses.
35D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuPerformanceHome > Advanced SettingsSelect Mixed, 11g Only, or 11b Only. A  pull-down  menu  to  select  the maximum wireless  signal rate for the selected device(s).Beacons are packets sent by an access point to synchronize a network. Specify the  beacon  value  for  the  selected device(s) here. The default value of 100 is recommended.DTIM  (Delivery Traffic  Indication Message)  is  a  countdown  informing clients of the next listening window for broadcast and multicast messages.This sets the fragmentation threshold (specified in bytes). Packets exceeding the value set here will be fragmented. The default is 2346.The RTS value should not be changed unless you encounter inconsistent data flow. The default value is 2346.Choose full, half (-3dB), quarter (-6dB), eighth (-9dB), minimum power.The DWL-3150  supports  2.4GHz  radio  with  two  antennas.  Radio  is  connected to  each  antenna  and  supports  auto diversity mode by default. This means that the access point will auto switch to the antenna with better RSSI value. Diversity: The DWL-3150 will auto switch to the antenna with better RSSI value.Wireless B/G Mode:Data Rate (11b/g):Beacon Interval:DTIM Interval:Fragmentation:RTS Threshold:Transmit Power:Antenna Diversity:
36D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuLeft Antenna: The AP will not switch antenna and the radio will use the left antenna (when facing the AP) to transmit and receive packets.Right Antenna: AP won’t switch antenna and the radio will use the right antenna (when facing the AP) to transmit and receive packets.
37D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuVirtual ServerThe  name  for the  service  being provided by the device on your LAN that uses the ports being opened.The  server computer  on  the  LAN network that the specified ports will be opened to.This  contains  a  list  of  pre-defined services.This contains a list of the devices on your network, which have obtained an IP Address from the router. The  port  number  that  users  on the  Internet  will  use  to  access  the defined service.The port number of the service being hosted  by  the  server  computer  on the LAN.The protocol used by the service the device on your LAN is providing.The schedule of time when the Virtual Server Rule will be active. Schedules can be defined on the Tools>Schedules pageName:IP Address:Application Name:Computer Name:Public Port:Private Port:Traffic Type:Schedule:
38D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuPort ForwardingThe  name  for the  service  being provided by the device on your LAN that uses the ports being opened.The  server computer  on  the  LAN network that the specified ports will be opened to.This  contains  a  list  of  pre-defined services.This contains a list of the devices on your network that have obtained an IP Address from the router.The  port  number  that  users  on the  Internet  will  use  to  access  the defined service.The protocol used by the service the device on your LAN is providing.The  schedule  of  time  when  the Virtual  Server  Rule  will  be  active. Schedules  can  be  defined  on  the Tools > Schedules page.Name:IP Address:Application Name:Computer Name:Port Start and End:Traffic Type:Schedule:
39D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuApplication RulesThis  is  the  name  referencing  the application.This is the port used to trigger the application. It can be either a single port or a range of ports.This is the protocol used to trigger the application.This is the port number on the WAN side that will be used to access the application. You may define a single port or a range of ports. You can use a  comma  to  add  multiple  ports  or port ranges.This  is  the  protocol  used  for  the application.The  schedule  of  time  when  the Application  Rule  will  be  active. Schedules  can  be  defined  on  the Tools > Schedules page.Name:Trigger Port:Traffic Type:Firewwall Port:Traffic Type:Schedule:
40D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuFirewallEnter the IP address of that computer as a DMZ (Demilitarized Zone) host with  unrestricted  Internet  access. Adding  a  client  to  the  DMZ  may expose that computer to a variety of security risks; so only use this option as a last resort. The  device  supports VPN  (Virtual Private  Network)  passthrough  for PPTP  (Point-to-Point Tunneling Protocol), L2TP (Layer 2 Tunneling Protocol), and IPSec (IP Security). Once VPN passthrough is enabled, there is no need to create any Virtual Server  or  Port  Forwarding  entries in order for outbound VPN sessions to establish properly.  Multiple VPN connections  can  be  made  through the device. This is useful when you have many VPN clients on the Local Area Network.DMZ:VPN Passthrough:
41D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuAdvanced NetworkUPnP is short for Universal Plug and Play, which is a networking architecture that  provides  compatibility  among networking  equipment,  software, and peripherals. The  DWL-3150  is an UPnP enabled device, meaning it will work with other UPnP devices/software. If you do not want to use the  UPnP  functionality,  it  can  be disabled by selecting “Disable”.When you Enable WAN Ping respond, you are  causing  the  public WAN (Wide  Area  Network)  IP  address on  the  device to  respond  to  ping commands  sent  by  Internet  users. Pinging public WAN IP addresses is a common method used by hackers to test whether your WAN IP address is valid.Enable this option to allow Multicast traffic  to  pass  from  the  Internet  to your network more efficiently.UPnP:WAN Ping:Multicast Stream:
42D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuDDNSDynamic  DNS  (Domain  Name Service) is a  method  of  keeping a domain name linked to a changing (dynamic)  IP  address. With  most Cable  and  DSL  connections,  you are assigned a dynamic IP address and that address is used only for the duration of that specific connection. With the DWL-3150, you can setup your DDNS  service,  in  which  the  DWL-3150 will automatically update your DDNS  server  every  time  it receives a new WAN IP address.Choose  your  DDNS  provider  from the drop down menu.Enter  the  Host  Name  that  you registered with your DDNS service providerEnter the username for your DDNS account.Enter the password for your DDNS accountEnable DDNS:Server Address:Host Name:Username:Password:
43D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuScheduleThe  name  of  the  schedule  being defined.Select a day, range of days, or select the All Week checkbox to have this schedule apply every day.Check this box to have the schedule active  the  entire  24  hours  on  the days specified.Select the time at which you would like the  schedule  being  defined  to become active.Select the time at which you would like the  schedule  being  defined  to become inactiveThis displays all the schedules that have been definedName:Day(s):All Days - 24 Hrs:Start Time:End Time:Schedule Rule List:
44D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuFiltersNetwork FilterUse MAC Filters to deny computers within  the  local  area  network  from accessing  the  Internet. You  can either manually add a MAC address or  select  the  MAC  address  from the list of clients  that  are currently connected to the unit. Select “Turn  MAC  Filtering  ON and  ALLOW  computers  with  MAC address listed below to access the network”  if  you only want selected computers to have network access and all other computers not to have network access. Select “Turn  MAC  Filtering  ON and  DENY  computers  with  MAC address listed below to access the network” if you want all computers to have network access except those computers in the list. The  MAC  address  of  the  network device to be added to the MAC Filter List.DHCP clients will have their hostname in the Computer Name drop down menu. You can select the client computer you want to add to the MAC Filter List and click arrow button. This will automatically add that computer’s MAC address to the appropriate field.This will remove the MAC Address on the corresponding line from the MAC Filtering table.Configure MAC Filtering Below:MAC 3Address:DHCP Client List:Clear:
45D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuWebsite FilterWebsite  Filtering  is  used  to  allow  or  deny  computers on your network from accessing specific web sites by keywords or specific Domain Names.  Select and Turn Website  Filtering  ON  and  ALLOW  computers  access to ONLY these sites in order only allow computers on your network to access the specified URLs and Domain Names.  Select and Turn Website Filtering ON and DENY computers  access  to  ONLY  these  sites  in  order  deny computers on your network to access the specified URLs and Domain Names.Example 1: If  you  wanted  to  block  LAN  users  from  any  website containing  a  URL  pertaining  to  shopping,  you  would need to select “Turn Website Filtering ON and DENY” computers access to ONLY these sites, and then enter “shopping” into the Website Filtering Rules list. Sites like these will be denied access to LAN users because they contain the keyword in the URL. ·  http://shopping.yahoo.com·  http://www.msn.com/search/shopping-spree.html Example 2: If you want your children to only access particular sites, you would then choose “Turn Website Filtering ON and ALLOW computers access to ONLY these sites and then enter in the domains you want your children to have access to.·  Disney.com·  Cartoons.com
46D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuHome > StatusDevice InformationLAN  (Local  Area  Network)  - This  displays  the  MAC Address of the Ethernet LAN interface, the IP Address and  Subnet  Mask  of  the  LAN  interface,  and  whether or not the router’s built-in DHCP  server is Enabled or Disabled. WAN  (Wide  Area  Network)  - This  displays  the  MAC Address of the WAN interface, as well as the IP Address, Subnet  Mask,  Default Gateway,  and  DNS  server information that the DWL-3150 has obtained from your ISP. It  will  also  display  the  connection  type  (Dynamic, Static, or  PPPoE)  that  is  used  establish a  connection with your ISP. If the router is configured for Dynamic, then there will be buttons for releasing and renewing the IP Address assigned to the WAN interface. If the router is configured for PPPoE, there will be buttons for connecting and disconnecting the PPPoE session.
47D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuWireless InformationThis  displays  the  SSID,  Channel,  and  whether  or  not Encryption is enabled on the Wireless interface.
48D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuStatisticsThe DWL-3150 keeps statistic of the data traffic that it handles. You are able to view the amount of packets that the device has received and transmitted on the Wireless WAN, LAN, and Wireless interfaces. Click this button to update the counters. Click this  button  to  clear  the  counters. The  traffic  counter  will  reset  when  the device is rebooted.Refresh:Reset:
49D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuLogView LogThe  DWL-3150  keeps  a  running  log  of  events  and activities occurring on it at all times. The log will display up to 500 recent logs. Newer log activities will overwrite the older logs. You can save the log files or have them emailed to you by clicking on the Log Settings button. This is recommended as the logs are cleared every time the router is rebooted. Click this button to go to the first page of the log. Click this button  to go to the last page of the log. Moves back one log page. Moves forward one log page.Clears the logs completely.First Page:Last Page:Previous:Next:Clear:
50D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuLog SettingsThe address of the SMTP (Simple Mail Transfer  Protocol)  server  that will be used to send the logs.The email address the logs will be sent from. The email address the logs will be sent to. Click on Send Mail Now to send the email.Click this  button  to  save  the  log entries to a text file.Select  the  type  of  information  you would like the DWL-3150 to log.SMTP Server/IP Address:SMTP Sender:SMTP Recipient:Save Log File to Local Hard Drive:Log Type:
51D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuAdministrator SettingsToolEnter  an  IP  address  that  will  be allowed for the administrator to login. Enter  the  2nd  IP  address  that  will be allowed  for the  administrator to login.You  can  customize  user  name  as an administrator of DWL-3150. The default username is “admin” with no password configured.Enter the old password.Enter a password in this  filed. The password  is  case-sensitive.  “A”  is a  different  character  than  “a.” The length should be between 0 and 12 characters.Type the password again to confirm it.Enable or disable console.Select the time out period.Enable or disable SNMP.Enter the security user name.Choose MD5 or SHA1.Choose DES or AES.Limit Administrator IP:User Name:Old Password:New Password:Confirm New Password:Console Settings Status:Timeout:SNMP Status:Security User Name:Authentication Protocol:Privacy Protocol:
52D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuFirmware UpgradeYou can upgrade the firmware of the device  using  this  tool.  Make sure that  the  firmware  you  want  to  use is saved  on the local hard drive of the  computer.  Click  on  Browse  to search  the  local  hard  drive for  the firmware to be used for the update. Upgrading the  firmware  will  not change any of your system settings but it  is  recommended  that  you save  your  system  settings  before doing  a  firmware  upgrade.  Please check the  D-Link  support  site  for firmware updates at http://support.dlink.com/.Upload Firmware From File:
53D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuConfiguration File Upload and DownloadBrowse  to  the  saved  configuration file you have in local drive and click open  and  upload  to  update  the configuration.Click download to save the current configuration file to your local disk. Note that if you save one configuration with administrator’s password now, after  reset  your,  and  then  update to this saved configuration file, the password will be gone.Upload Configuration File:Load Settings to Local Hard Drive:
54D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuNTP SettingsDisplays the current NTP settings.Enter the NTP server IP, or choose from the drop-down menu.Select  your  time  zone  from  the drop-down menu.Check the  box  to  enable  daylight savings time.NTP Information:NTP Server IP:NTP Time Zone:Daylight Saving Time:
55D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuConfigurationSave and ActivateClicking Save and Activate will save and activate all changes made to the configuration and reboot the system.Clicking Discard Changes will discard all changes made to the configuration.
56D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuSystem SettingsSystemClick on  to  apply  settings  and restart.Click on Restore to reset to factory default settings.System Restart:Restore to Factory Default Settings:
57D-Link DWL-3150 User ManualSection 4 - Using the Configuration MenuSystem Information
58D-Link DWL-3150 User ManualAppendix A - Wireless BasicsD-Link wireless products are based on industry standards to provide easy-to-use and compatible high-speed wireless connectivity within your home, business or public access wireless networks. Strictly adhering to the IEEE standard, the D-Link wireless family of products will allow you to securely access the data you want, when and where you want it. You will be able to enjoy the freedom that wireless networking delivers.A  wireless  local  area  network  (WLAN)  is  a  computer  network  that  transmits  and  receives data  with  radio  signals instead of wires. Wireless LANs are used increasingly in both home and office environments, and public areas such as airports, coffee shops and universities. Innovative ways to utilize WLAN technology are helping people to work and communicate more efficiently. Increased mobility and, the absence of cabling and other fixed infrastructures have proven to be beneficial for many users. Under many circumstances, it may be desirable for mobile network devices to link to a conventional Ethernet LAN in order to use servers, printers or an Internet connection supplied through the wired LAN. A Wireless Router is a device used to provide this link.Wireless Basics
59D-Link DWL-3150 User ManualAppendix A - Wireless BasicsWhat is Wireless?Wireless or WiFi technology is another way of connecting your computer to the network without using wires. WiFi uses radio frequency to connect wirelessly, so you have the freedom to connect computers anywhere in your home or office network.Why D-Link Wireless?   D-Link is the worldwide leader and award winning designer, developer, and manufacturer of networking products. D-Link delivers the performance you need at a price you can afford. D-Link has all the products you need to build your network.How does wireless work?   Wireless works similar to how cordless phones work, through radio signals that transmit data from point A to point B. But wireless technology has restrictions as to how you can access the network. You must be within the wireless network range area to be able to connect your computer. There are two different types of wireless networks Wireless Local Area Network (WLAN), and Wireless Personal Area Network (WPAN).Wireless Local Area Network (WLAN)In a wireless local area network, a device called an Access Point (AP) connects computers to the network. The access point has a small antenna attached to it, which allows it to transmit data back and forth over radio signals. With an indoor access point, the signal can travel up to 300 feet. With an outdoor access point the signal can reach out up to 30 miles to serve places like manufacturing plants, industrial locations, college and high school campuses, airports, golf courses, and many other outdoor venues.
60D-Link DWL-3150 User ManualAppendix A - Wireless BasicsWho uses wireless?   Wireless technology has become so popular in recent years that almost everyone is using it, whether it’s for home, office, or business, D-Link has a wireless solution for it.Home  • Gives everyone at home broadband access  • Surf the web, check email, instant message, and etc  • Gets rid of the cables around the house  • Simple and easy to use Small Office and Home Office  • Stay on top of everything at home as you would at office  • Remotely access your office network from home  • Share Internet connection and printer with multiple computers  • No need to dedicate office space   Where is wireless used?   Wireless technology is expanding everywhere, not just at home or the office. People like the freedom of mobility and it’s becoming so popular that more and more public facilities now provide wireless access to attract people. A wireless connection in a public place is usually called a “hotspot”.
61D-Link DWL-3150 User ManualAppendix A - Wireless BasicsUsing a D-Link Cardbus Adapter with your laptop, you can access the hotspot to connect to the Internet from remote locations like: Airports, Hotels, Coffee Shops, Libraries, Restaurants, and Convention Centers.A wireless network is easy to setup, but if you’re installing it for the first time it could be quite a task not knowing where to start. That’s why we’ve put together a few setup steps and tips to help you through the process of setting up a wireless network.TipsHere are a few things to keep in mind, when you install a wireless network.Centralize your router or Access Point  Make sure you place the router/access point in a centralized location within your network for the best performance. Try to place the router/access point as high as possible in the room, so the signal gets dispersed throughout your home. If you have a two-story home, you may need a repeater to boost the signal to extend the range.Eliminate Interference   Place home appliances such as cordless telephones, microwaves, and televisions as far away as possible from the router/access point. This would significantly reduce any interference that the appliances might cause since they operate on the same frequency.Security   Don’t let you next-door neighbors or intruders connect to your wireless network. Secure your wireless network by turning on the WPA or WEP security feature on the router. Refer to the product manual for detailed information on how to set security up.
62D-Link DWL-3150 User ManualAppendix A - Wireless BasicsThere are basically two modes of networking: • Infrastructure – All wireless clients will connect to an access point or wireless router.• Ad-Hoc – Directly connecting to another computer, for peer-to-peer communication, using wireless network adapters on each computer, such as two or more WNA-1330 wireless network Cardbus adapters.An Infrastructure network contains an Access Point or wireless router. All the wireless devices, or clients, will connect to the wireless router or access point. An Ad-Hoc network contains only clients, such as laptops with wireless cardbus adapters. All the adapters must be in Ad-Hoc mode to communicate.Wireless Modes
63D-Link DWL-3150 User ManualAppendix B - Networking BasicsNetworking BasicsCheck your IP AddressAfter you install your new D-Link adapter, by default, the TCP/IP settings should be set to obtain an IP address from a DHCP server (i.e. wireless router) automatically. To verify your IP address, please follow the steps below.Click on Start > Run. In the run box type cmd and click OK.At the prompt, type ipconfig and press Enter.This will display the IP address, subnet mask, and the default gateway of your adapter.If  the  address  is  0.0.0.0,  check  your  adapter installation,  security  settings,  and  the  settings on your router. Some firewall software programs may  block  a  DHCP  request  on  newly  installed adapters. If you are connecting to a wireless network at a hotspot (e.g. hotel, coffee shop, airport), please contact an employee or administrator to verify their wireless network settings.
64D-Link DWL-3150 User ManualAppendix B - Networking BasicsStatically Assign an IP AddressIf you are not using a DHCP capable gateway/router, or you need to assign a static IP address, please follow the steps below:Step 1Windows® XP - Click on Start > Control Panel > Network Connections.Windows® 2000 - From the desktop, right-click My Network Places > Properties.Step 2Right-click on the Local Area Connection which represents your D-Link network adapter and select Properties.Step 3Highlight Internet Protocol (TCP/IP) and click Properties.Step 4Click Use the following IP address and enter an IP address that is on the same subnet as your network or the LAN IP address on your router. Example:  If  the  router´s LAN IP  address  is  192.168.0.1,  make your IP  address 192.168.0.X where X is a number between 2 and 99. Make sure that the number you choose is not in use on the network. Set Default Gateway the same as the LAN IP address of your router (192.168.0.1). Set Primary DNS the same as the LAN IP address of your router (192.168.0.1). The Secondary DNS is not needed or you may enter a DNS server from your ISP.Step 5Click OK twice to save your settings.
65D-Link DWL-3150 User ManualAppendix E - Technical SupportYou can find software updates and user documentation on the D-Link website.U.S.  and  Canadian  customers  can  contact  D-Link  technical  support  through  our  web  site,  or  by phone.  Tech Support for customers within the United States: D-Link Technical Support over the Telephone:  (877) 453-5465  D-Link Technical Support over the Internet:  http://support.dlink.com Tech Support for customers within Canada: D-Link Technical Support over the Telephone:  (800) 361-5265    D-Link Technical Support over the Internet:  http://support.dlink.comContacting Technical Support
66D-Link DWL-3150 User ManualAppendix E - Warranty•  “GPL Software” means GPL software licensed to you under the GNU General Public License as published by the Free Software Foundation (GPL). A copy of the GPL is included below.•  “Open Source Software” means various open source software components licensed under the terms of applicable open source license agreements included in the materials relating to such software. Open Source Software is composed of individual software components, each of which has its own copyright and its own applicable license conditions. The Open Source Software licenses can be found in the gpl.pdf file, other materials accompanying the software package, the documentation or corresponding source files available from http://support.dlink.com/GPL.asp.GNU/Linux GPL
67D-Link DWL-3150 User ManualAppendix E - WarrantyGNU General Public LicenseVersion 2, June 1991Copyright (C) 1989, 1991 Free Software Foundation, Inc.,51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USAEveryone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.PreambleThe licenses for most software are designed to take away your freedom to share and change it.  By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.  This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it.  (Some other Free Software Foundation software is covered by the GNU Lesser General Public License instead.)  You can apply it to your programs, too.When we speak of free software, we are referring to freedom, not price.  Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get itif you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights.These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have.  You must make sure that they, too, receive or can get the source code.  And you must show them these terms so they know their rights.We protect your rights with two steps: (1) copyright the software, and(2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.Also, for each author’s protection and ours, we want to make certain that everyone understands that there is no warranty for this free software.  If the software is modified by someone else and passed on, we want its recipients to know that hat they have is not the original, so that any problems introduced by others will not reflect on the original authors’ reputations.
68D-Link DWL-3150 User ManualAppendix E - WarrantyFinally, any free program is threatened constantly by software patents.  We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary.  To prevent this, we have made it clear that any patent must be licensed for everyone’s free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow.GNU GENERAL PUBLIC LICENSETERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION0.  This License applies  to any program or other work which contains a notice placed by  the copyright holder saying  it may  be distributed under the terms of this General Public License.  The “Program”, below, refers to any such program or work, and a “work based on the Program” means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language.  (Hereinafter, translation is included without limitation in the term “modification”.)  Each licensee is addressed as “you”.  Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.1.  You may copy and distribute verbatim copies of the Program’s source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.  You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.2.  You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:a)  You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
69D-Link DWL-3150 User ManualAppendix E - Warrantyb)  You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.c)  If the modified program normally reads commands interactively when run, you must cause it, when started running for  such  interactive use  in  the most ordinary way, to  print or display  an  announcement  including  an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may  redistribute  the  program  under  these  conditions,  and  telling  the  user  how  to  view  a  copy  of  this  License.   (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)These requirements apply to the modified work as a whole.  If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.  But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.3.  You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:a)  Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,b)  Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be  distributed under the  terms  of  Sections  1  and  2  above  on  a  medium  customarily  used  for software interchange; or,c)  Accompany  it  with  the  information  you  received  as  to  the  offer  to  distribute  corresponding  source  code.  (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)
70D-Link DWL-3150 User ManualAppendix E - WarrantyThe source code for a work means the preferred form of the work for making modifications to it.  For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable.  However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.4.  You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License.  Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.5.  You are not required to accept this License, since you have not signed it.  However, nothing else grants you permission to modify or distribute the Program or its derivative works.  These actions are prohibited by law if you do not accept this License.  Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.6.  Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions.  You may not impose any further restrictions on the recipients’ exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.7.  If,  as  a  consequence  of  a  court  judgment  or  allegation  of patent  infringement  or  for any other reason  (not  limited  to  patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.  If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all.  For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
71D-Link DWL-3150 User ManualAppendix E - WarrantyIt is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity  of the free  software distribution system, which is implemented  by public license practices.  Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.8.  If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original  copyright holder  who  places  the  Program under this License  may add  an  explicit geographical  distribution limitation excluding those countries, so that distribution is permitted only in or among countries not  thus excluded.  In such case, this License incorporates the limitation as if written in the body of this License.9.  The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.  Each version is given a distinguishing version number.  If the Program specifies a version number of this License which applies to it and “any later version”, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation.  If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this.  Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.NO WARRANTY11.  BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT  PERMITTED  BY  APPLICABLE  LAW.    EXCEPT  WHEN  OTHERWISE  STATED  IN  WRITING  THE  COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED  OR  IMPLIED,  INCLUDING,  BUT  NOT  LIMITED TO, THE  IMPLIED WARRANTIES  OF  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU.  SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
72D-Link DWL-3150 User ManualAppendix E - Warranty12.  IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR  ANY  OTHER  PARTY  WHO  MAY  MODIFY  AND/OR  REDISTRIBUTE THE  PROGRAM  AS  PERMITTED  ABOVE,  BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.END OF TERMS AND CONDITIONS
73D-Link DWL-3150 User ManualAppendix F - WarrantyWarrantySubject to the terms and conditions set forth herein, D-Link Systems, Inc. (“D-Link”) provides this Limited Warranty:  • Only to the person or entity that originally purchased the product from D-Link or its authorized reseller or distributor, and  • Only for products purchased and delivered within the fifty states of the United States, the District of Columbia, U.S. Possessions      or Protectorates, U.S. Military Installations, or addresses with an APO or FPO.Limited Warranty:D-Link  warrants that  the  hardware  portion  of  the  D-Link  product  described  below  (“Hardware”)  will  be  free  from  material  defects  in workmanship  and  materials  under  normal  use  from  the  date  of  original retail  purchase  of  the product,  for the  period  set  forth below (“Warranty Period”), except as otherwise stated herein.  • Hardware (excluding power supplies and fans): One (1) year  • Power supplies and fans: One (1) year  • Spare parts and spare kits: Ninety (90) daysThe customer’s sole and exclusive remedy and the entire liability of D-Link and its suppliers under this Limited Warranty will be, at D-Link’s option, to repair or replace the defective Hardware during the Warranty Period at no charge to the original owner or to refund the actual purchase  price paid.  Any repair or  replacement  will  be  rendered  by D-Link at  an  Authorized D-Link Service  Office. The  replacement hardware need not be new or have an identical make, model or part. D-Link may, at its option, replace the defective Hardware or any part thereof with any reconditioned product that D-Link reasonably determines is substantially equivalent (or superior) in all material respects to the defective Hardware. Repaired or replacement hardware will be warranted for the remainder of the original Warranty Period or ninety (90) days, whichever is longer, and is subject to the same limitations and exclusions. If a material defect is incapable of correction, or if D-Link determines that it is not practical to repair or replace the defective Hardware, the actual price paid by the original purchaser for the defective Hardware will be refunded by D-Link upon return to D-Link of the defective Hardware. All Hardware or part thereof that is replaced by D-Link, or for which the purchase price is refunded, shall become the property of D-Link upon replacement or refund.
74D-Link DWL-3150 User ManualAppendix F - WarrantyLimited Software Warranty:D-Link warrants that the software portion of the product (“Software”) will substantially conform to D-Link’s then current functional specifications for the Software, as set forth in the applicable documentation, from the date of original retail purchase of the Software for a period of ninety (90) days (“Software Warranty Period”), provided that the Software is properly installed on approved hardware and operated as contemplated in its documentation. D-Link further warrants that, during the Software Warranty Period, the magnetic media on which D-Link delivers the Software will be free of physical defects. The customer’s sole and exclusive remedy and the entire liability of D-Link and its suppliers under this Limited Warranty will be, at D-Link’s option, to replace the non-conforming Software (or defective media) with software that substantially conforms to D-Link’s functional specifications for the Software or to refund the portion of the actual purchase price paid that is attributable to the Software. Except as otherwise agreed by DLink in writing, the replacement Software is provided only to the original licensee, and is subject to the terms and conditions of the license granted by D-Link for the Software. Replacement Software will be warranted for the remainder of the original Warranty Period and is subject to the same limitations and exclusions. If a material non-conformance is incapable of correction, or if D-Link determines in its sole discretion that it is not practical to replace the non-conforming Software, the price paid by the original licensee for the non-conforming Software will be refunded by D-Link; provided that the non-conforming Software (and all copies thereof) is first returned to D-Link. The license granted respecting any Software for which a refund is given automatically terminates.Non-Applicability of Warranty:The Limited Warranty provided hereunder for Hardware and Software portions of D-Link’s products will not be applied to and does not cover any refurbished product and any product purchased through the inventory clearance or liquidation sale or other sales in which D-Link, the sellers, or the liquidators expressly disclaim their warranty obligation pertaining to the product and in that case, the product is being sold “As-Is” without any warranty whatsoever including, without limitation, the Limited Warranty as described herein, notwithstanding anything stated herein to the contrary.Submitting A Claim: The customer shall return the product to the original purchase point based on its return policy. In case the return policy period has expired and the product is within warranty, the customer shall submit a claim to D-Link as outlined below:• The customer must submit with the product as part of the claim a written description of the Hardware defect or Software nonconformance in sufficient detail to allow DLink to confirm the same, along with proof of purchase of the product (such as a copy of the dated purchase invoice for the product) if the product is not registered.• The customer must obtain a Case ID Number from D-Link Technical Support at 1-877-453-5465, who will attempt to assist the customer in resolving any suspected defects with the product. If the product is considered defective, the customer must obtain a Return Material Authorization (“RMA”) number by completing the RMA form and entering the assigned Case ID Number at https://rma.dlink.com/.
75D-Link DWL-3150 User ManualAppendix F - Warranty• After an RMA number is issued, the defective product must be packaged securely in the original or other suitable shipping package to ensure that it will not be damaged in transit, and the RMA number must be prominently marked on the outside of the package. Do not include any manuals or accessories in the shipping package. DLink will only replace the defective portion of the product and will not ship back any accessories.• The customer is responsible for all in-bound shipping charges to D-Link. No Cash on Delivery (“COD”) is allowed. Products sent COD will either be rejected by D-Link or become the property of D-Link. Products shall be fully insured by the customer and shipped to D-Link Systems, Inc., 17595 Mt. Herrmann, Fountain Valley, CA 92708. D-Link will not be held responsible for any packages that are lost in transit to D-Link. The repaired or replaced packages will be shipped to the customer via UPS Ground or any common carrier selected by D-Link. Return shipping charges shall be prepaid by D-Link if you use an address in the United States, otherwise we will ship the product to you freight collect. Expedited shipping is available upon request and provided shipping charges are prepaid by the customer. D-Link may reject or return any product that is not packaged and shipped in strict compliance with the foregoing requirements, or for which an RMA number is not visible from the outside of the package. The product owner agrees to pay D-Link’s reasonable handling and return shipping charges for any product that is not packaged and shipped in accordance with the foregoing requirements, or that is determined by D-Link not to be defective or non-conforming.What Is Not Covered:The Limited Warranty provided herein by D-Link does not cover:Products that, in D-Link’s judgment, have been subjected to abuse, accident, alteration, modification, tampering, negligence, misuse, faulty installation, lack of reasonable care, repair or service in any way that is not contemplated in the documentation for the product, or if the model or serial number has been altered, tampered with, defaced or removed; Initial installation, installation and removal of the product for repair, and shipping costs; Operational adjustments covered in the operating manual for the product, and normal maintenance; Damage that occurs in shipment, due to act of God, failures due to power surge, and cosmetic damage; Any hardware, software, firmware or other products or services provided by anyone other than D-Link; and Products that have been purchased from inventory clearance or liquidation sales or other sales in which D-Link, the sellers, or the liquidators expressly disclaim their warranty obligation pertaining to the product.While necessary maintenance or repairs on your Product can be performed by any company, we recommend that you use only an Authorized D-Link Service Office. Improper or incorrectly performed maintenance or repair voids this Limited Warranty.Disclaimer of Other Warranties:EXCEPT FOR THE LIMITED WARRANTY SPECIFIED HEREIN, THE PRODUCT IS PROVIDED “AS-IS” WITHOUT ANY WARRANTY OF  ANY  KIND WHATSOEVER  INCLUDING, WITHOUT  LIMITATION,  ANY WARRANTY  OF  MERCHANTABILITY,  FITNESS  FOR  A PARTICULAR PURPOSE AND NONINFRINGEMENT.
76D-Link DWL-3150 User ManualAppendix F - WarrantyIF ANY IMPLIED WARRANTY CANNOT BE DISCLAIMED IN ANY TERRITORY WHERE A PRODUCT IS SOLD, THE DURATION OF SUCH IMPLIED WARRANTY SHALL BE LIMITED TO THE DURATION OF THE APPLICABLE WARRANTY PERIOD SET FORTH ABOVE. EXCEPT AS EXPRESSLY COVERED UNDER THE LIMITED WARRANTY PROVIDED HEREIN, THE ENTIRE RISK AS TO THE QUALITY, SELECTION AND PERFORMANCE OF THE PRODUCT IS WITH THE PURCHASER OF THE PRODUCT.Limitation of Liability:TO THE MAXIMUM EXTENT PERMITTED BY LAW, D-LINK IS NOT LIABLE UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY LOSS OF USE OF THE PRODUCT, INCONVENIENCE OR DAMAGES OF ANY CHARACTER, WHETHER DIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, LOSS OF REVENUE OR PROFIT, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, FAILURE OF OTHER EQUIPMENT OR COMPUTER PROGRAMS TO WHICH D-LINK’S PRODUCT IS CONNECTED WITH, LOSS OF INFORMATION OR DATA CONTAINED IN, STORED ON, OR INTEGRATED WITH ANY PRODUCT RETURNED TO D-LINK FOR WARRANTY SERVICE) RESULTING FROM THE USE OF THE PRODUCT, RELATING TO WARRANTY SERVICE, OR ARISING OUT OF ANY BREACH OF THIS LIMITED WARRANTY, EVEN IF D-LINK HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THE SOLE REMEDY FOR A BREACH OF THE FOREGOING LIMITED WARRANTY IS REPAIR, REPLACEMENT OR REFUND OF THE DEFECTIVE OR NONCONFORMING PRODUCT. THE MAXIMUM LIABILITY OF D-LINK UNDER THIS WARRANTY IS LIMITED TO THE PURCHASE PRICE OF THE PRODUCT COVERED BY THE WARRANTY. THE FOREGOING EXPRESS WRITTEN WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ANY OTHER WARRANTIES OR REMEDIES, EXPRESS, IMPLIED OR STATUTORY.Governing Law:This Limited Warranty shall be governed by the laws of the State of California. Some states do not allow exclusion or limitation of incidental or consequential damages, or limitations on how long an implied warranty lasts, so the foregoing limitations and exclusions may not apply. This Limited Warranty provides specific legal rights and you may also have other rights which vary from state to state.Trademarks:D-Link is a registered trademark of D-Link Systems, Inc. Other trademarks or registered trademarks are the property of their respective owners.Copyright Statement:No part of this publication or documentation accompanying this product may be reproduced in any form or by any means or used to make any derivative such as translation, transformation, or adaptation without permission from D-Link Corporation/D-Link Systems, Inc., as stipulated by the United States Copyright Act of 1976 and any amendments thereto. Contents are subject to change without prior notice.Copyright 2006-2007 by D-Link Corporation/D-Link Systems, Inc. All rights reserved.
CE Mark Warning: This is a Class B product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures.  Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.  These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.  However, there is no guarantee that interference will not occur in a particular installation.    If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one of the following measures:  -  Reorient or relocate the receiving antenna. -  Increase the separation between the equipment and receiver. -  Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. -  Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. The availability of some specific channels and/or operational frequency bands are country dependent and are firmware programmed at the factory to match the intended destination. The firmware setting is not accessible by the end user.
 Industry Canada statement: This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions:   (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  IMPORTANT NOTE: Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. This device has been designed to operate with an antenna having a maximum gain of 2 dB. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms.  The Class [B] digital apparatus meets all requirements of the Canadian Interference-Causing    Equipment Regulation. Cet appareil numerique de la class [B] respecte toutes les exigences du Reglement sur le materiel brouilleur du Canada.
78D-Link DWL-3150 User ManualVersion 1.0February 8, 2007Product registration is entirely voluntary  and failure to complete or  return this  form will not diminish your warranty rights.Registration

Navigation menu