Quick Links. See also: Manual. Table of Contents. D-Link AirPlus G. Previous Page. Next Page. D-Link DI Manual 92 pages. If any of the above items are missing, please contact your reseller. Page 4 DI, used in conjunction with other You only need to input your encryption information once in the configuration menu.
Pressing the Reset Button restores the router to its original factory This LED blinks Page 7: Features Features Fully compatible with the Page 8 D-Link wireless products will allow you access to the data you want, when and where you want it. You will be able to enjoy the freedom that wireless networking brings.
The DI is backwards compatible with This means that if you have an existing Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range.
Page 13 WLAN. Select Enabled or Disabled. Disabled is the default setting. Note: If you enable encryption on the DI make sure to also enable encryption on all the wireless clients or wireless connection will not be established.
Your ISP will provide you with a username and pass- word. This is considered your internal network. These settings may be referred to as Private settings.
Enter the name referencing the virtual service. The DI provides some predefined applications in the table on the bottom of the web page. Select the application you want to use and enable it. The DI can also block users from accessing restricted web sites. A URL is a specially formatted text string that defines a location on the Internet.
If any part of the URL contains the blocked word, the site will not be accessible and the web page will not display. Domain blocking will deny all requests to a specific domain such as http and ftp. It can also allow computers to access specific sites and deny all other sites.
Page 27 Firewall Rules is an advanced feature used to deny or allow traffic from passing through the DI It works in the same way as IP Filters with additional settings. You can create more detailed access rules for the DI When virtual services are created and enabled, it will also display in Firewall Rules. Page 28 If you have a client PC that cannot run Internet applications properly from behind the DI, then you can set the client up for unrestricted Internet access.
It allows a computer to be exposed to the Internet. This feature is useful for gaming purposes. They are admin and user. User can only view the settings but cannot make any changes. NTP synchronizes com- puter clock times in a network of computers. This field is optional. The saved file or any other saved setting file can be loaded back on the Broadband Router.
To reload a system settings file, click on Browse to browse the local hard drive and locate the system file to be used. Page 33 Click on Browse to browse the local hard drive and locate the firmware to be used for the update.
You can download firmware up- grades to your hard drive from the D-Link support site. Page 34 IP Security. Once VPN pass-through is enabled, there is no need to open up virtual services. If the device is rebooted, the logs are automatically cleared. You may save the log files under Log Settings. View Log- First Page - The first page of the log.
Email Address - The email address to which the logs will be sent. The traffic counter will reset if the device is rebooted. Page 40 Networking Basics Please follow all the instructions in this window: Click Next In the following window, select the best description of your computer.
Click Next Click Next Enter a Workgroup name. All computers on your network should have the same Workgroup name. When the changes are complete, click Next. Please wait while the Network Setup Wizard configures the computer. This may take a few minutes. Page 43 Networking Basics In the window below, select the option that fits your needs. In this example, Create a Network Setup Disk has been selected. You will run this disk on each of the computers on your network.
Click Next. Insert a disk into the Floppy Disk Drive, in this case drive A. The new settings will take effect when you restart the computer. Click Yes to restart the computer. You have completed configuring this computer. Next, you will need to run the Network Setup Disk on all the other computers on your network.
Page Getting Started Naming your Computer In this window, enter the Computer name Select Workgroup and enter the name of the Workgroup All computers on your network must have the same Workgroup name.
To check on the IP Address of the adapter, please do the following: Right-click on the The IP Addresses on your network must be within the same range. For example, if one computer has an IP Address of A window similar to this one will appear.
Type ping xxx. Click Save to Save your configuration. The software is no longer needed and will not work through a router. Select the Security Mode and then click Next to continue. Please note that changes made on this section may also need to be duplicated on your Wireless Client. Enable Wireless: Select A maximum of 5 text characters can be entered for 64 bit keys, and a maximum of 13 characters for bit keys.
Page 26 4. Click Save Settings to save your settings. If you are configuring the router with a wireless adapter, you will lose connectivity until you enable the Security mode on your adapter and enter the same passphrase as you did on the router. Page Wds Setting Selecting Enabled enables wireless bridge restriction. Only those bridges listed in Bridges will be granted access. Leave blank or set to zero to disable the detection.
Enable: Select Enabled to enable the rule and click Add to add the rule. Port Forwarding The List show the rules you configured. Special Applications makes some of these applications work with the DIR If you need to run applications that require multiple connections, specify the port normally associated with an application in the Incoming Ports , select the protocol type as TCP or UDP, then enter the Outgoing ports associated with the Incoming ports to open them for inbound traffic.
Page Firewall Settings Firewall Settings A firewall protects your network from the outside world. The SPI feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications.
If you choose to expose a computer, you can enable DMZ. Page Advanced Wireless Settings Make sure to select the appropriate preamble type and click the Save Settings button. This will improve the quality of video and voice applications for your wireless clients. Page Wireless Mac Filter When Deny computers listed to access the wireless is selected, these wireless clients on the list will not be able to connect the wireless router.
Page Static Routing Enter the routing subnet mask. Gateway: Enter the routing gateway. Metric: It means the number of the network equipment that the data will pass. Interface: Select the interface to transmit the data out the router. Port: The port number used to access the DIR Page Time Settings Internet, not a local server.
Page System If you want to save the current router configuration settings, use the Save configuration button above. Reboot the Click to reboot the router. Page Firmware To upgrade the firmware, locate the upgrade file on the local hard drive with the Browse button.
Once you have found the file to be used, click the Upgrade button below to start the firmware upgrade. Ping Results: The results of your ping attempts will be displayed here. Click the Save button to save the logs to Save Logs: local hard drive or to syslog server. The firmware version is also displayed here. Page Logs Section 4 — Security LOGS Display the captured log messages of the router activities, these captured log meesages might be useful for troubleshooting and monitoring.
Page Wireless Security Section 4 — Security Wireless Security This section will show you the different levels of security you can use to protect your data from intruders. If you are configuring the router with a wireless adapter, you will lose connectivity until you enable WPA-PSK on your adapter and enter the same passphrase as you did on the router.
Refer to the Networking Basics section in this manual for more information. Select Connect to a network. Page 54 It may take seconds to connect to the wireless network. If the connection fails, please verify that the security settings are correct. The key or passphrase must be exactly the same as on the wireless router. Page Using Windows Xp Connect button. Page Troubleshooting 1. When entering the IP address of the D-Link router The device has the utility built-in to a ROM chip in the device itself.
Open your web browser and enter the IP address of your D-Link router in the address bar. This should open the login page for your the web management. Use the following syntax: ping [url] [-f] [-l] [MTU value] Example: ping yahoo.
Page Wireless Basics Strictly adhering to the IEEE standard, the D-Link wireless family of products will allow you to securely access the data you want, when and where you want it.
You will be able to enjoy the freedom that wireless networking delivers.
0コメント