Po wer Adapter (5.0V, 2.5A)
Vertical Stands
Mounting Kit
CD-ROM with Software and Manual
Quick Installation Guide
Package Contents
Note: Using a power supply with a different voltage than the one included with
your product will cause damage and void the warranty for this product.
If any of the above items are missing, please contact y our reseller.
Minimum System Requirements
Ethernet-Based Cable or DSL Modem
Computers with Windows, Macintosh, or Linux-based operating systems with
an installed Ethernet adapter and CD-ROM Drive
Internet Explorer Version 6.0 or Netscape Navigator Version 7.0 and Abov e
D-Link Systems, Inc.
4
DI-624M User’s Manual
*Maximum wireless signal rate derived from IEEE Standard 802.11g specifications. Actual data throughput will vary.
Network conditions and environmental factors, including volume of network traffic, building materials and
construction, and network overhead lower actual data throughput rate.
Introduction
The D-Link DI-624M Super G MIMO Wireless Router is an 802.11g high-perf ormance,
wireless router that supports high-speed wireless networking at home, at work or in
public places.
Unlike most routers, the DI-624M provides data transfers at up to 108 Mbps* (compared
to the standard 54 Mbps) when used with other D-Link Super G MIMO products. The
802.11g standard is backwards compatible with 802.11b products. This means that
you do not need to change your entire network to maintain connectivity. You may sacrifice
some of 802.11g’s speed when y ou mix 802.11b and 802.11g de vices, b ut you will not
lose the ability to communicate when you incorporate the 802.11g standard into your
802.11b network. You may choose to slo wly change your network by gradually replacing
the 802.11b devices with 802.11g devices .
In addition to offering faster data transfer speeds when used with other 802.11g products,
the DI-624M has the newest, strongest, most adv anced security features available toda y .
When used with other 802.11g WPA (WiFi Protected Access) compatible products in a
network, the security features include:
Introduction
WPA:Wi-Fi Protected Access authorizes and identifies users based on a secret
key that changes automatically at a regular interval. WPA uses TKIP (Temporal KeyIntegrity Protocol) to change the temporal key every 10,000 packets (a packet is a
kind of message transmitted over a network.) This insures much greater security than
the standard WEP security. (By contrast, the older WEP encryption required the keys to
be changed manually.)
D-Link Systems, Inc.
5
DI-624M User’s Manual
Features and Benefits
Fully compatible with the 802.11g standard to provide a wireless data rate of up
to 108Mbps
Backwards compatible with the 802.11b standard to provide a wireless data
rate of up to 11Mbps
WPA (Wi Fi Protected Access) authorizes and identifies users based on a secret
key that changes automatically at a regular interval, for example:
Pre Shared Key mode means that the home user, without a RADIUS server,
will obtain a new security key every time the he or she connects to the network,
vastly improving the safety of communications on the network
Utilizes OFDM technology (Orthogonal Frequency Division Multiplexing)
User-friendly configuration and diagnostic utilities
Operates in the 2.4GHz frequency range
Connects multiple computers to a Broadband (Cable or DSL) modem to share
the Internet connection
Features and Benefits
Advanced Firewall features: Supports NAT with VPN pass-through, providing
added security , MA C Filtering, IP Filtering, URL Filtering, Domain Blocking, and
Scheduling
DHCP server enables all networked computers to automatically receive IP
addresses
Web-based interface for Managing and Configuring
Access Control to manage users on the network
Supports special applications that require multiple connections
Equipped with 4 10/100 Ethernet ports, 1 W AN port, Auto MDI/MDIX
D-Link Systems, Inc.
6
DI-624M User’s Manual
Hardware Overview
Connections
Hardware Overview
All Ethernet Ports (WAN and LAN) are
auto MDI/MDIX, meaning you can use
either a straight-through or a crossover
Ethernet cable.
Reset Button
Pressing the reset button restores
the router to its original factory
default settings.
D-Link Systems, Inc.
Auto MDI/MDIX LAN Ports
These ports automatically
sense the cable type when
connecting to Ethernetenabled computers.
Auto MDI/MDIX WAN Port
This is the connection for the
Ethernet cable to the Cable or DSL
modem
DC Power Connector
The DC power input
connector is labeled DC5V with a single jack
socket to supply power
to the DI-624M.
7
DI-624M User’s Manual
LEDs
Hardware Overview
WAN LED
A solid light indicates
connection on the WAN
port. This LED blinks
during data transmission.
WLAN LED
A solid light indicates that the
wireless segment is ready.
This LED blinks during
wireless data transmission.
LOCALNETWORK LED
D-Link Systems, Inc.
POWER LED
A solid light indicates a
proper connection to the
power supply.
A solid light indicates a
connection to an Ethernetenabled computer on ports
1-4. This LED blinks during
data transmission.
STATUS
A blinking light
indicates that the
DI-624M is ready.
8
DI-624M User’s Manual
Wireless Basics
D-Link wireless products are based on industry standards to provide easy-to-use and
compatible high-speed wireless connectivity within your home, business or public access
wireless networks. D-Link wireless products will allow you access to the data you want,
when and where you want it. You will be able to enjoy the freedom that wireless
networking brings.
A WLAN is a cellular computer network that transmits and receives data with radio
signals instead of wires. WLANs are used increasingly in both home and office
environments, and public areas such as airports, coffee shops and universities.
Innovative ways to utilize WLAN technology are helping people to work and
communicate more efficiently . Increased mobility and the absence of cab ling and other
fixed infrastructure have proven to be beneficial for many users.
Wireless users can use the same applications they use on a wired network. Wireless
adapter cards used on laptop and desktop systems support the same protocols as
Ethernet adapter cards.
Wireless Basics
People use wireless LAN technology for many different purposes:
Mobility - Productivity increases when people have access to data in any location
within the operating range of the WLAN. Management decisions based on real-time
information can significantly improve worker efficiency.
Low Implementation Costs – WLANs are easy to set up , manage, change and relocate.
Networks that frequently change can benefit from WLANs ease of implementation.
WLANs can operate in locations where installation of wiring may be impractical.
Installation and Network Expansion - Installing a WLAN system can be f ast and easy
and can eliminate the need to pull cable through walls and ceilings. Wireless technology
allows the network to go where wires cannot go - even outside the home or office.
Scalability – WLANs can be configured in a v ariety of topologies to meet the needs of
specific applications and installations. Configurations are easily changed and range
from peer-to-peer networks suitable for a small number of users to larger infrastructure
networks to accommodate hundreds or thousands of users, depending on the number
of wireless devices deployed.
Inexpensive Solution - Wireless network devices are as competitively priced as
conventional Ethernet network devices.
D-Link Systems, Inc.
9
DI-624M User’s Manual
Standards-Based Technology
The DI-624M Super G MIMO Wireless Router utiliz es the 802.11g standard.
The IEEE 802.11g standard is an extension of the 802.11b standard. It increases the
data rate up to 54Mbps within the 2.4GHz band, utilizing OFDM technology.
This means that in most environments, within the specified range of this device, you
will be able to transfer large files quickly or even watch a movie in MPEG format over
your network without noticeable delays. This technology works by transmitting highspeed digital data over a radio wave utilizing OFDM (Orthogonal Frequency DivisionMultiplexing) technology. OFDM works b y splitting the radio signal into multiple smaller
sub-signals that are then transmitted simultaneously at different frequencies to the
receiver . OFDM reduces the amount of crosstalk (interf erence) in signal transmissions.
The DI-624M is backwards compatible with 802.11b devices. This means that if you
have an existing 802.11b network, the devices in that network will be compatible with
802.11g devices at speeds of up to 11Mbps in the 2.4GHz range.
Wireless Basics
Installation Considerations
The D-Link DI-624MSuper G MIMO Wireless Router lets you access your network,
using a wireless connection, from virtually anywhere within its operating range. Keep
in mind, however, that the number, thickness and location of walls, ceilings, or other
objects that the wireless signals must pass through, may limit the range . Typical ranges
vary depending on the types of materials and background RF (radio frequency) noise
in your home or business . The k ey to maximizing wireless range is to f ollow these basic
guidelines:
1Keep the number of w alls and ceilings between the DI-624M and other network
devices to a minimum - each wall or ceiling can reduce your D-Link wireless
product’s r ange from 3-90 feet (1-30 meters.) Position your devices so that the
number of walls or ceilings is minimized.
2Be aware of the direct line between network devices. A wall that is 1.5 feet thick
(.5 meters), at a 45-degree angle appears to be almost 3 feet (1 meter) thick. At a
2-degree angle it looks over 42 feet (14 meters) thick! Position devices so that
the signal will travel straight through a wall or ceiling (instead of at an angle) for
better reception.
3Building Materials can impede the wireless signal - a solid metal door or aluminum
studs may hav e a negative effect on range . Try to position wireless devices and
computers with wireless adapters so that the signal passes through drywall or
open doorways and not other materials.
4Keep y our product aw a y (at least 3-6 f eet or 1-2 meters) from electrical
D-Link Systems, Inc.
devices or appliances that generate extreme RF noise.
10
DI-624M User’s Manual
Getting Started
Setting up a Wireless Infrastructure Network
Getting Started
Please remember that D-Link Super G MIMO wireless devices are pre-configured to
connect together, right out of the bo x, with their def ault settings.
For a typical wireless setup at home (as shown above), please do the following:
1
2
3
4
5
6
You will need broadband Inter net access (a Cable or DSL-subscriber line into
your home or office)
Consult with your Cable or DSL provider for proper installation of the modem.
Connect the Cable or DSL modem to the DI-624M Wireless Broadband Router
(see the printed Quick Installation Guide included with your router).
If you are connecting a desktop computer to your network, install the D-Link
AirPlus Xtreme G DWL-G520 wireless PCI adapter into an av ailable PCI slot on
your desktop computer. You may also install the DWL-520+, or the DWL-520.
(See the printed Quick Installation Guide included with the network adapter.)
Install the D-Link DWL-G650M wireless Cardbus adapter into a laptop computer .
(See the printed Quick Installation Guide included with the DWL-G650M.)
Install the D-Link DFE-530TX+ adapter into a desktop computer. The four
Ethernet LAN ports of the DI-624M are Auto MDI/MDIX and will work with both
Straight-Through and Cross-Over cable. (See the printed Quick Installation Guideincluded with the DFE-530TX+.)
D-Link Systems, Inc.
11
DI-624M User’s Manual
Using the Configuration Menu
Whenever you want to configure your DI-624M, you can access the Configuration Menu
by opening the Web-browser and typing in the IP Address of the DI-624M. The
DI-624M’s default IP Address is shown below:
Open the W eb browser.
Type in the IP Address of the Router (http://192.168.0.1).
Using the Configuration Menu
http://192.168.0.1
Note: if you have changed the default IP Address assigned to the DI-624M, make sure
to enter the correct IP Address.
Type admin in the User Name field.
Leave the Password blank.
Click OK.
D-Link Systems, Inc.
12
DI-624M User’s Manual
Home
The Advanced tab provides the f ollowing configuration options: Wizard, Wireless, WAN,
LAN, and DHCP.
Wizard
The Home>Wizard screen will appear. Please refer to the Quick Installation Guide for
more information regarding the Setup Wizard.
Using the Configuration Menu
The DI-624M is a Super G MIMO wireless router ideal for home networking
and small business networking. The setup wizard will guide y ou to configure
the DI-624M to connect to your ISP (Internet Service Provider).
The DI-624M’s easy setup will allow you to have Internet access within
minutes. Please follow the setup wizard step by step to configure the DI624M.
These buttons appear on most of the configuration screens in this section. Please click
on the appropriate button at the bottom of each screen after you have made a
configuration change.
D-Link Systems, Inc.
Home > Wizard
13
DI-624M User’s Manual
Wireless
Using the Configuration Menu
SSID:
Channel:
Super G Mode:
Home > Wireless
Service Set Identifier (SSID) is the name designated for a
specific wireless local area network (WLAN). The SSID’ s factory
default setting is default. The SSID can be easily changed to
connect to an existing wireless network or to establish a new
wireless network.
6 is the default channel. All devices on the network must share
the same channel. (Note: The wireless adapters will
automatically scan and match the wireless setting.)
Super G is a group of performance enhancement features that
increase end user application throughput in an 802.11g network.
Super G is backwarsd compatible to standard 802.11g devices.
For top performance, all wirelss devices on the network should
be Super G capable. Select either Disabled, Super G without
Turbo, Super G with Dynamic Turbo, or Super G with Static
Turbo.
D-Link Systems, Inc.
Disabled:
Standard 802.11g support, no enhanced capabilities.
14
DI-624M User’s Manual
Using the Configuration Menu
Super G without
Turbo::
Super G with
Static Turbo::
Super G with
DynamicTurbo::
802.11g Only
Mode:
Capable of Packet Bursting, FastFrames, Compression, and
no T urbo mode.
Capable of Packet Bursting, FastFrames, Compression, and
Dynamic Turbo. This setting is backwards compatib le with nonTurbo (legacy) devices. Dynamic Turbo mode is only enabled
when all nodes on the wireless network is Super G with
Dynamic Turbo enabled.
Capable of Packet Bursting, FastFrames, Compression, and
Static Turbo. This setting is not backwards compatible with nonTurbo (legacy) devices. Static turbo mode is always on and is
only enabled when all nodes on the wireless network is Super
G with Static Turbo enabled.
Select this mode to restrict your network to only those devices
that employ the 802.11g standard. Enabling this mode will
ensure that you maintain the highest connectivity rate,
unhampered by any connection to an 802.11b device.
SSID Broadcast:
Security:
Authentication:
WEP Encryption:
Key Type:
Choose Enabled to broadcast the SSID across the network.
All devices on a network must share the same SSID (Service
Set Identifier) to establish communication. Choose Disabled if
you do not wish to broadcast the SSID over the network.
Select None, WEP, WPA, or WPA-PSK encryption.
Select Open System or Shared Key authentication.
Wired Equivalent Privacy (WEP) is a wireless security protocol
for Wireless Local Area Networks (WLAN). WEP provides
security by encrypting the data that is sent over the WLAN.
Select Enabled or Disabled. Disabled is the default setting.
(Note: If you enable encryption on the DI-624M make sure to
also enable encryption on all the wireless clients or wireless
connection will not be established.) Select the level of
encryption desired: 64-bit, or 128-bit.
Select HEX or ASCII.
D-Link Systems, Inc.
Keys 1-4:
Input up to 4 WEP k e ys; select the one you wish to use.
15
DI-624M User’s Manual
WAN
Dynamic IP Address
Using the Configuration Menu
Host Name:
MAC Address:
D-Link Systems, Inc.
Dynamic IP
Address:
Home > WAN > Dynamic IP Address
Choose Dynamic IP Address to obtain IP Address information
automatically from your ISP. Select this option if your ISP does
not give you any IP numbers to use. This option is commonly
used for Cable modem services.
The Host Name is optional but may be required by some ISPs.
The default host name is the device name of the Router and
may be changed.
The default MA C Address is set to the W AN’s ph ysical interface
MAC address on the Broadband Router . It is not recommended
that you change the default MAC address unless required by
your ISP.
16
DI-624M User’s Manual
Using the Configuration Menu
Clone MAC
Address:
Primary/Secondary
DNS Address:
MTU:
Static IP Address
The default MA C address is set to the W AN’s ph ysical interface
MAC address on the Broadband Router . Y ou can use the “Clone
MAC Address” button to copy the MAC address of the Ethernet
Card installed by your ISP and replace the W AN MA C address
with the MAC address of the router . It is not recommended that
you change the default MAC address unless required by your
ISP.
Enter a DNS Address if you do not wish to use the one provided
by your ISP.
Enter an MTU value only if required by your ISP. Otherwise,
leave it a the default setting.
D-Link Systems, Inc.
Home > WAN > Static IP Address
17
DI-624M User’s Manual
Choose Static IP Address if all WAN IP information is provided to y ou b y y our ISP. You
will need to enter in the IP address, subnet mask, gateway address, and DNS
address(es) provided to you b y your ISP. Each IP address entered in the fields m ust be
in the appropriate IP form, which are four octets separated by a dot (x.x.x.x). The Router
will not accept the IP address if it is not in this format.
Using the Configuration Menu
IP Address:
Subnet Mask:
ISP Gateway
Address:
Primary DNS
Address:
Secondary DNS
Address:
MTU:
Input the public IP Address provided b y your ISP.
Input your Subnet mask. (All devices in the network must have
the same subnet mask.)
Input the public IP address of the ISP to which you are
connecting.
Input the primary DNS (Domain Name Server) IP address
provided by your ISP.
This is optional.
Enter an MTU value only if required by your ISP. Otherwise,
leave it at the default setting.
D-Link Systems, Inc.
18
DI-624M User’s Manual
PPPoE
Using the Configuration Menu
Please be sure to remove any existing PPPoE client software installed on your
computers.
Choose PPPoE (Point to Point Protocol over Ethernet) if your ISP uses a PPPoE
connection. Your ISP will provide you with a username and password. This option is
typically used for DSL services. Select Dynamic PPPoE to obtain an IP address
automatically for your PPP oE connection. Select Static PPP oE to use a static IP address
for your PPPoeE connection.
D-Link Systems, Inc.
Home > WAN > PPPoE
19
DI-624M User’s Manual
Using the Configuration Menu
PPPoE:
User Name:
Retype Password:
Service Name:
IP Address:
Primary DNS
Address:
Choose this option if your ISP uses PPPoE. (Most DSL users
will select this option.)
Dynamic PPPoE: Receive an IP Address automatically from
your ISP.
Static PPPoE: You have an assigned (static) IP Address.
Your PPPoE username provided by your ISP.
Re-enter the PPPoE password.
Enter the Service Name provided by your ISP (optional).
This option is only available for Static PPPoE. Enter the static
IP Address for the PPPoE connection.
Primary DNS IP address provided by our ISP.
Secondary DNS
Address:
MTU:
Auto-reconnect:
This option is only available for Static PPPoE. Enter the static
IP Address for the PPPoE connection.
Maximum Transmission Unit-1492 is the default setting-you
may need to change the MTU for optimal performance with your
specific ISP.
If enabled, the DI-624M will automatically connect to your ISP
after your system is restarted or if the PPPoE connection is
dropped.
D-Link Systems, Inc.
20
DI-624M User’s Manual
LAN
Using the Configuration Menu
Home > LAN
LAN is short for Local Area Network. This is considered your internal network. These
are the IP settings of the LAN interface f or the DI-624M. These settings ma y be referred
to as Private settings. You may change the LAN IP address if needed. The LAN IP
address is private to your internal network and cannot be seen on the Internet.
IP Address:
Subnet Mask:
Local Domain
Name:
The IP address of the LAN interface. The def ault IP address is:
192.168.0.1.
The subnet mask of the LAN interface . The default subnet mask
is 255.255.255.0.
This field is optional. Enter in the local domain name.
D-Link Systems, Inc.
21
DI-624M User’s Manual
DHCP
Using the Configuration Menu
Home > DHCP
DHCP stands for Dynamic Host Control Protocol. The DI-624M has a built-in DHCP
server. The DHCP Server will automatically assign an IP address to the computers on
the LAN/private network. Be sure to set your computers to be DHCP clients by setting
their TCP/IP settings to “Obtain an IP Address Automatically.” When you turn your
computers on, they will automatically load the proper TCP/IP settings provided by the
DI-624M. The DHCP Server will automatically allocate an unused IP address from the
IP address pool to the requesting computer. You must specify the starting and ending
address of the IP address pool.
DHCP Server:
Starting IP
Address:
Ending IP Address:
Lease Time:
Select Enabled or Disabled. The default setting is Enabled.
The starting IP address for the DHCP server’s IP assignment.
The ending IP address for the DHCP server’s IP assignment.
The length of time for the IP lease. Enter the Lease time. The
default setting is one hour.
D-Link Systems, Inc.
22
DI-624M User’s Manual
Advanced
The Advanced tab provides the following configuration options: Virtual Server,
Applications, Filters, Parental Control, Firewall, DMZ, and Performance.
Virtual Server
Using the Configuration Menu
The DI-624M can be configured as a virtual ser ver so that remote users accessing
Web or FTP services via the public IP address can be automatically redirected to local
servers in the LAN (Local Area Network).
The DI-624M firewall feature filters out unrecognized packets to protect your LAN
network so all computers networked with the DI-624M are invisible to the outside world.
If you wish, you can make some of the LAN computers accessible from the Internet by
enabling Vir tual Server. Depending on the requested service, the DI-624M redirects
the external service request to the appropriate server within the LAN network.
The DI-624M is also capable of port-redirection meaning incoming traffic to a particular
port may be redirected to a different port on the server computer .
Each virtual ser vice that is created will be listed at the bottom of the screen in the
Virtual Ser vers List. There are pre-defined virtual ser vices already in the table. You
may use them by enabling them and assigning the server IP to use that particular
virtual service.
D-Link Systems, Inc.
Advanced > Virtual Server
23
DI-624M User’s Manual
Using the Configuration Menu
Virtual Server:
Name:
Private IP:
Protocol Type:
Private Port:
Public Port:
Schedule:
Select Enabled or Disabled.
Enter the name referencing the virtual service.
The server computer in the LAN (Local Area Network) that will
be providing the virtual services.
The protocol used for the virtual service.
The port number of the service used by the Private IP computer .
The port number on the WAN (Wide Area Network) side that
will be used to access the virtual service.
The schedule of time when the virtual service will be enabled.
The schedule may be set to Always, which will allow the
particular service to always be enabled. If it is set to Time, select
the time frame for the service to be enabled. If the system time
is outside of the scheduled time, the service will be disabled.
Example #1:
If you have a Web server that you wanted Internet users to
access at all times, you would need to enable it. Web (HTTP)
server is on LAN (Local Area Network) computer 192.168.0.25.
HTTP uses port 80, TCP.
Name: W eb Server
Private IP: 192.168.0.25
Protocol Type: TCP
Private P ort: 80
Public Por t: 80
Schedule: always
Click on this icon to edit the virtual service.
D-Link Systems, Inc.
Click on this icon to delete the virtual service.
24
DI-624M User’s Manual
Using the Configuration Menu
Example #2:
All Internet users who want to access this FTP Server must connect to it from port 2100.
This is an example of port redirection and can be useful in cases where there are many
of the same servers on the LAN network.
If you have an FTP server that you wanted Internet users to
access by WAN port 2100 and only during the weekends, you
would need to enable it as such. FTP server is on LAN computer
192.168.0.30. FTP uses port 21, TCP.
Name: FTP Server
Private IP: 192.168.0.30
Protocol Type: TCP
Private P ort: 21
Public Por t : 2100
Schedule: F rom: 01:00AM to 01:00AM, Sat to Sun
Applications
D-Link Systems, Inc.
Advanced > Applications
25
DI-624M User’s Manual
Some applications require multiple connections, such as Internet gaming, video
conferencing, Internet telephony and others. These applications have difficulties working
through NAT (Network Address Translation). Special Applications mak es some of these
applications work with the DI-624M. If you need to run applications that require multiple
connections, specify the port nor mally associated with an application in the “Trigger
Port” field, select the protocol type as TCP or UDP, then enter the public ports associated
with the trigger port to open them for inbound traffic.
The DI-624M provides some predefined applications in the table on the bottom of the
web page. Select the application you want to use and enable it.
Note: Only one PC can use each Special Application tunnel.
Using the Configuration Menu
Name:
Trigger Port:
T rigger Type:
Public Port:
Public Type:
This is the name referencing the special application.
This is the port used to trigger the application. It can be either a
single port or a range of ports.
This is the protocol used to trigger the special application.
This is the port number on the WAN side that will be used to
access the application. You may define a single port or a range
of ports. You can use a comma to add multiple ports or por t
ranges.
This is the protocol used to trigger the special application.
D-Link Systems, Inc.
26
DI-624M User’s Manual
Filters
IP Filters
Using the Configuration Menu
Filters are used to deny or allow LAN (Local Area Network) computers from accessing
the Internet. The DI-624M can be setup to deny internal computers by their IP or MAC
addresses. The DI-624M can also block users from accessing restricted Web sites.
Protocol Type:
D-Link Systems, Inc.
IP Filters:
IP:
Port:
Schedule:
Advanced > Filters > IP Filters
Use IP Filters to deny LAN IP addresses from accessing the
Internet. Y ou can deny specific port numbers or all ports for the
specific IP address.
The IP address of the LAN computer that will be denied access
to the Internet.
The single port or port range that will be denied access to the
Internet.
Select the protocol type.
This is the schedule of time when the IP Filter will be enabled.
27
DI-624M User’s Manual
MAC Filters
Using the Configuration Menu
Advanced > Filters > MAC Filters
Use MAC (Media Access Control) Filters to allow or deny LAN (Local Area Network)
computers by their MAC addresses from accessing the Network. You can either manually
add a MAC address or select the MAC address from the list of clients that are currently
connected to the Broadband Router.
Filters:
MAC Filters:
Name:
MAC Address:
DHCP Client:
Select the filter you wish to use; in this case, MAC filters was
chosen.
Choose Disable MAC filters; allow MAC addresses listed
below; or deny MAC addresses listed below.
Enter the name here.
Enter the MAC Address.
Select a DHCP client from the pull-down list; click Clone to
copy that MAC Address.
D-Link Systems, Inc.
28
DI-624M User’s Manual
Parental Control
URL Blocking
Using the Configuration Menu
Advanced > Parental Control > URL Blocking
URL Blocking is used to deny LAN computers from accessing specific web sites by the
URL. A URL is a specially formatted text string that defines a location on the Internet. If
any part of the URL contains the blocked word, the site will not be accessible and the
web page will not display. To use this feature, enter the text string to be blocked and
click Apply. The text to be b locked will appear in the list. T o delete the te xt, just highlight
it and click Delete.
Parental Control
Filters:
URL Blocking:
Keywords:
Select the filter you wish to use; in this case, URL Blocking
was chosen.
Select Enabled or Disabled.
Block URLs which contain keywords listed below. Enter the
keywords in this space.
D-Link Systems, Inc.
29
DI-624M User’s Manual
Domain Blocking
Using the Configuration Menu
Advanced > Parental Control > Domain Blocking
Domain Blocking is used to allow or deny LAN (Local Area Network) computers from
accessing specific domains on the Internet. Domain blocking will deny all requests to a
specific domain such as http and ftp. It can also allow computers to access specific
sites and deny all other sites.
Parental
ControlFilters:
Domain Blocking:
Permitted
Domains:
Blocked Domains:
Select the filter you wish to use; in this case, Domain Blocking
was chosen.
Disabled: Select Disabled to disable Domain Blocking.
Allow: Allows users to access all domains except BlockedDomains.
Deny: Denies users access to all domains except PermittedDomains.
Enter the Permitted Domains in this field.
Enter the Blocked Domains in this field.
D-Link Systems, Inc.
30
DI-624M User’s Manual
Firewall
Using the Configuration Menu
Advanced > Firewall
Firewall Rules is an advanced feature used to deny or allow traffic from passing through
the DI-624M. It works in the same way as IP Filters with additional settings. You can
create more detailed access rules for the DI-624M. When virtual services are created
and enabled, it will also display in Firewall Rules. Firewall Rules contain all network
firewall rules pertaining to IP (Internet Protocol).
In the Firewall Rules List at the bottom of the screen, the priorities of the rules are from
top (highest priority) to bottom (lowest priority .)
Note:The DI-624M MAC Address filtering rules have precedence over the Firewall Rules.
Firewall Rules:
Name:
Action:
Source:
Enable or disable the Firewall.
Enter the name.
Select Allow or Deny.
Enter the IP Address range.
Destination:
D-Link Systems, Inc.
Schedule:
Enter the IP Address range, the Protocol, and the P ort Range.
Select Always or enter the Time Range.
31
DI-624M User’s Manual
DMZ
Using the Configuration Menu
Advanced > DMZ
If you have a client PC that cannot run Internet applications properly from behind the
DI-624M, then you can set the client up for unrestricted Internet access. It allows a
computer to be exposed to the Internet. This feature is useful for gaming purposes.
Enter the IP address of the internal computer that will be the DMZ host. Adding a client
to the DMZ (Demilitarized Zone) may expose your local network to a variety of security
risks, so only use this option as a last resort.
DMZ:
IP Address:
Enable or Disable the DMZ. The DMZ (Demilitarized Zone)
allows a single computer to be exposed to the internet. By
default the DMZ is disabled.
Enter the IP Address of the computer to be in the DMZ.
D-Link Systems, Inc.
32
DI-624M User’s Manual
Performance
Using the Configuration Menu
Advanced > Performance
Note: These features will be available in future firmware releases.
TX Rate:
Transmit Power:
Beacon Interval:
RTS Threshold:
Fragmentation:
Auto is the default selection. Select from the drop down menu.
100% is the default selection. Select from the drop down menu.
Beacons are packets sent b y an Access Point to synchronize a
wireless network. Specify a value. 100 is the default setting
and is recommended.
This value should remain at its default setting of 2432. If
inconsistent data flow is a problem, only a minor modification
should be made.
The fragmentation threshold, which is specified in bytes,
determines whether packets will be fragmented. Packets
exceeding the 2346 byte setting will be fragmented before
transmission. 2346 is the default setting.
D-Link Systems, Inc.
33
DI-624M User’s Manual
Using the Configuration Menu
DTIM Interval:
Preamble T ype:
CTS Mode:
(Delivery Traffic Indication Message) 3 is the default setting. A
DTIM is a countdown informing clients of the next window for
listening to broadcast and multicast messages.
Select Short or Long Preamble. The Preamble defines the
length of the CRC block (Cyclic Redundancy Check is a
common technique for detecting data transmission errors) for
communication between the wireless router and the roaming
wireless network adapters. Note: High network traffic areas
should use the shorter preamble type.
CTS (Clear To Send) is a function used to minimize collisions
among wireless devices on a wireless local area network
(LAN). CTS will make sure the wireless network is clear before
a wireless client attempts to send wireless data. Enabling CTS
will add overhead and may lower wireless throughput.
None: CTS is typically used in a pure 802.11g environment. If
CTS is set to “None” in a mixed mode environment populated
by 802.11b clients, wireless collisions may occur frequently.
Always: CTS will always be used to make sure the wireless
LAN is clear before sending data.
Auto: CTS will monitor the wireless network and automatically
decide whether to implement CTS based on the amount of
traffic and collisions that occurs on the wireless network.
D-Link Systems, Inc.
34
DI-624M User’s Manual
Tools
The Advanced tab provides the following options: Admin, Time, System, Firmware,
and Misc.
Admin
Using the Configuration Menu
At this page, the DI-624M administrator can change the system password. There are
two accounts that can access the Broadband Router’ s Web-Management interf ace. They
are admin and user. Admin has read/write access while user has read-only access.
User can only view the settings but cannot make any changes.
D-Link Systems, Inc.
Tools > Admin
35
DI-624M User’s Manual
Using the Configuration Menu
Administrator:
Password:
User:
Password:
Remote
Management:
IP Address:
admin is the Administrator login name.
Enter the password and enter again to confirm.
user is the User login name.
Enter the password and enter again to confirm
Remote management allows the DI-624M to be configured from
the Internet by a web browser. A username and password is
still required to access the Web-Management interface. In
general, only a member of your network can browse the builtin web pages to perform Administrator tasks. This feature
enables you to perform Administrator tasks from the remote
(Internet) host.
The Internet IP address of the computer that has access to the
Broadband Router. If you input an asterisk (*) into this field,
then any computer will be able to access the Router . Putting an
asterisk (*) into this field would present a security risk and is
not recommended.
Port:
Example:
The port number used to access the Broadband Router.
http://x.x.x.x:8080 where x.x.x.x is the WAN IP address of the
Broadband Router and 8080 is the port used for the WebMangement interface.
D-Link Systems, Inc.
36
DI-624M User’s Manual
Time
Using the Configuration Menu
Default NTP
Set the Time:
Daylight Saving:
D-Link Systems, Inc.
Time Zone:
Server:
Tools > Time
Select the Time Zone from the pull-do wn men u.
NTP is short for Network Time Protocol. NTP synchronizes
computer clock times in a network of computers. This field is
optional.
To manually input the time, enter the values in these fields for
the Year, Month, Da y , Hour, Min ute, and Second. Click Set Time.
To select Daylight Saving time manually, select enabled or
disabled, and enter a start date and an end date for daylight
saving time.
37
DI-624M User’s Manual
System
Using the Configuration Menu
Browse
Tools > System
The current system settings can be saved as a file onto the local hard driv e. The save d
file or any other saved setting file can be loaded back on the Broadband Router. To
reload a system settings file, click on Browse to browse the local hard drive and locate
the system file to be used. You may also reset the Broadband Router back to factory
settings by clicking on Restore.
Save Settings to
Local Hard Drive:
Load Settings
from Local Hard
Drive:
Restore to Factory
Default Settings:
Click Save to save the current settings to the local Hard Drive.
Click Browse to find the settings, then click Load.
Click Restore to restore the factory default settings.
D-Link Systems, Inc.
38
DI-624M User’s Manual
Firmware
Using the Configuration Menu
Tools > Firmware
You can upgrade the firmware of the Router here. Mak e sure the firmware you w ant to
use is on the local hard drive of the computer . Clic k on Browse to browse the local hard
drive and locate the firmware to be used for the update. Please check the D-Link support
site for firmware updates at http://support.dlink.com. You can download firmware
upgrades to your hard drive from the D-Link support site.
Firmware Upgrade:
Browse:
Click on the link in this screen to find out if there is an updated
firmware; if so , do wnload the ne w firmware to y our hard drive .
After you have downloaded the new firmware, click Browse in
this window to locate the firmware update on your hard drive.
Click Apply to complete the firmware upgrade.
D-Link Systems, Inc.
39
DI-624M User’s Manual
Misc.
Using the Configuration Menu
D-Link Systems, Inc.
Tools > Misc.
40
DI-624M User’s Manual
Using the Configuration Menu
Ping Test:
Restart Device:
Block WAN Ping:
UPNP:
Gaming Mode:
The Ping T est is used to send Ping pack ets to test if a computer
is on the Internet. Enter the IP Address that you wish to Ping,
and click Ping.
Click Reboot to restart the DI-624M.
If you choose to block WAN Ping, the WAN IP Address of the
DI-624M will not respond to pings. Blocking the Ping may
provide some extra security from hackers.
Discard Ping from WAN side: Clic k Enabled to block the WAN
ping.
To use the Universal Plug and Play feature click on Enabled.
UPNP provides compatibility with networking equipment,
software and peripherals of the over 400 vendors that cooperate
in the Plug and Play forum.
Gaming mode allows a form of pass-through for certain Internet
Games. If you are using Xbox, Playstation2 or a PC, make sure
you are using the latest firmware and Gaming Mode is enabled.
To utilize Gaming Mode, click Enabled. If you are not using a
Gaming application, it is recommended that you Disable
Gaming Mode.
Dynamic DNS:
D-Link Systems, Inc.
VPN Pass
Through::
Dynamic Domain Name System is a method of keeping a
domain name linked to a changing IP Address. This is a useful
feature since many computers do not use a static IP address.
The DI-624M supports VPN (Virtual Private Network) passthrough for both PPTP (P oint-to-Point Tunneling Protocol) and
IPSec (IP Security). Once VPN pass-through is enab led, there
is no need to open up virtual services. Multiple VPN connections
can be made through the DI-624M. This is useful when you
have many VPN clients on the LAN network.
41
DI-624M User’s Manual
Tools
The Advanced tab provides the f ollowing options: Device Inf o, Log, Stats , and Wireless.
Device Info
Using the Configuration Menu
This page displays the current inf ormation for the DI-624M. It will displa y the LAN, W AN
and MAC address information. If your WAN connection is set up for a Dynamic IPaddress then a Release button and a Renew button will be displayed. Use Release to
disconnect from your ISP and use Renew to connect to your ISP. If your WAN connection
is set up for PPPoE, a Connect button and a Disconnect b utton will be displa yed. UseDisconnect to drop the PPPoE connection and use Connect to establish the PPPoE
connection.
D-Link Systems, Inc.
Status > Device Info
42
DI-624M User’s Manual
This window will show the DI-624M’s working status:
Using the Configuration Menu
WAN:
LAN:
Wireless:
IP Address: WAN/Public IP Address
Subnet Mask: W AN/Public Subnet Mask
Gateway: WAN/Public Gateway IP Address
Domain Name Server: WAN/Public DNS IP Address
WAN Status: WAN Connection Status
IP Address: LAN/Private IP Address of the DI-624M
Subnet Mask: LAN/Private Subnet Mask of the DI-624M
MAC Address: Displays the MAC address
SSID: Displays the current SSID
Channel: Displays the current channel
WEP: indicates whether WEP is enabled or disabled
D-Link Systems, Inc.
43
DI-624M User’s Manual
Log
Using the Configuration Menu
Status > Log
The Broadband Router keeps a running log of events and activities occurring on the
Router. If the de vice is rebooted, the logs are automatically cleared. You may save the
log files under Log Settings.
View Log:
First Pa ge - The first page of the log.
Last Page - The last page of the log.
Previous - Moves back one log page.
Next - Moves forward one log page.
Clear - Clears the logs completely.
Log Settings - Brings up the page to configure the log.
D-Link Systems, Inc.
44
DI-624M User’s Manual
Log Settings
Using the Configuration Menu
Status > Log > Log Settings
Not only does the Broadband Router display the logs of activities and events, it can
setup to send these logs to another location.
SMTP Server/
IP Address:
Email Address:
The address of the SMTP server that will be used to send the
logs.
The email address to which the logs will be sent. Click on SendMail Now to send the email.
D-Link Systems, Inc.
45
DI-624M User’s Manual
Stats
The screen above displa ys theT raffic Statistics. Here you can vie w the amount of packets
that pass through the DI-624M on both the W AN and the LAN ports. The traffic counter
will reset if the device is rebooted.
Using the Configuration Menu
M
Status > Stats
Wireless
Status > Wireless
The wireless client table displays a list of current connected wireless clients . This table
also displays the connection time and MAC address of the connected wireless client.
Click on Help at any time, for more information.
D-Link Systems, Inc.
46
DI-624M User’s Manual
Troubleshooting
This Chapter provides solutions to problems that can occur during the installation and
operation of the DI-624M Wireless Broadband Router . We co ver v arious aspects of the
network setup, including the network adapters. Please read the following if you are
having problems.Note: It is recommended that you use an Ethernet connection to
configure the DI-624M Wireless Broadband Router.
Note: It is recommended that you use an Ethernet connection to configure the
DI-624M Wireless Broadband Router.
1. The computer used to configure the DI-624M cannot access the Configuration
menu.
Check that the Ethernet LED on the DI-624M is ON. If the LED is not ON, check
that the cable for the Ethernet connection is securely inserted.
Check that the Ethernet Adapter is working properly . Please see item 3 (Check
that the drivers for the network adapters are installed properly) in this
Troubleshooting section to chec k that the drivers are loaded properly.
Troubleshooting
Check that the IP Address is in the same range and subnet as the DI-624M.
Please see Checking the IP Address in Windows XP in the Networking Basics
section of this manual.
Note: The IP Address of the DI-624M is 192.168.0.1. All the computers on the network
must have a unique IP Address in the same range, e.g., 192.168.0.x. Any computers
that have identical IP Addresses will not be visib le on the network. They must all have
the same subnet mask, e.g., 255.255.255.0.
Do a Ping test to make sure that the DI-624M is responding. Go to
Start>Run>Type Command>Type ping 192.168.0.1. A successful ping will
show four replies.
Note: If you have changed the default IP Address, make sure to ping the correct IP
Address assigned to the DI-624M.
D-Link Systems, Inc.
47
DI-624M User’s Manual
2. The wireless client cannot access the Internet in the Infrastructure mode.
Make sure the wireless client is associated and joined with the correct Access P oint. To
check this connection: Right-click on the Local Area Connection icon in the taskbar>
select View Av ailable Wireless Networks. The Connect to Wireless Network screen
will appear. Please make sure you have selected the correct available network, as
shown in the illustrations below.
Troubleshooting
default
Check that the IP Address assigned to the wireless adapter is within the same
IP Address range as the access point and gatewa y . (Since the DI-624M has an
IP Address of 192.168.0.1, wireless adapters must have an IP Address in the
same range, e.g., 192.168.0.x. Each device must have a unique IP Address; no
two devices ma y have the same IP Address. The subnet mask must be the same
for all the computers on the network.) To check the IP Address assigned to the
wireless adapter , double-click on the Local Area Connection icon in the taskbar
> select the Support tab and the IP Address will be displayed. (Please refer to
Checking the IP Address in the Networking Basics section of this manual.)
If it is necessary to assign a Static IP Address to the wireless adapter, please
refer to the appropriate section in Networking Basics. If you are entering a DNS
Server address you must also enter the Default Gateway Address. (Remember
that if you have a DHCP-capable router, you will not need to assign a Static IP
Address. See Networking Basics: Assigning a Static IP Address.)
D-Link Systems, Inc.
48
DI-624M User’s Manual
3. Chec k that the drivers f or the netw ork adapter s are installed pr operl y.
You may be using different network adapters than those illustrated here, but this
procedure will remain the same, regardless of the type of network adapters you are
using.
Go to Start > My Computer > Properties.
Troubleshooting
Select the Hardware T ab.
Click Device Manager.
D-Link Systems, Inc.
49
DI-624M User’s Manual
Double-click on Network Adapters.
Right-click on D-Link D WL-G650M Super G MIMO Wireless Notebook Adapter .
(In this example we use the DWL-G650M; you may be using other network
adapters, but the procedure will remain the same.)
Select Properties to check that the drivers are installed properly.
Troubleshooting
D-Link Super G MIMO DWL-G650M
Look under Device Status to check that the de vice is w orking properly.
Click OK.
D-Link Super G MIMO DWL-G650M Wireless Cardbus Adapter
D-Link Super G MIMO DWL-G650M Wireless Cardbus Adapter
D-Link Systems, Inc.
50
DI-624M User’s Manual
4. What variab les ma y cause m y wireless pr oducts to lose reception?
D-Link products let you access your network from virtually anywhere you want. Howe ver ,
the positioning of the products within your environment will affect the wireless range.
Please refer to Installation Considerations in the Wireless Basics section of this
manual for further information about the most advantageous placement of your D-Link
wireless products.
5. Wh y does my wireless connection keep dropping?
Antenna Orientation- Tr y different antenna orientations for the DI-624M. Try to
keep the antenna at least 6 inches away from the wall or other objects.
If you are using 2.4GHz cordless phones, X-10 equipment or other home security
systems, ceiling fans, and lights, your wireless connection will degrade
dramatically or drop altogether. T ry changing the Channel on your Router , Access
Point and Wireless adapter to a different Channel to avoid interference.
Keep y our product away (at least 3-6 feet) from electrical de vices that gener ate
RF noise, like microwaves, Monitors, electric motors, etc.
Troubleshooting
6. Wh y can’t I get a wireless connection?
If you have enabled Encryption on the DI-624M, you must also enable encryption on all
wireless clients in order to establish a wireless connection.
For 802.11b , the Encryption settings are: 64, 128, or 256 bit. Mak e sure that the
encryption bit level is the same on the Router and the Wireless Client.
Make sure that the SSID on the Router and the Wireless Client are exactly the
same. If they are not, wireless connection will not be established.
Move the DI-624M and the wireless client into the same room and then test the
wireless connection.
Disable all security settings. (WEP, MAC Address Control)\
Turn off your DI-624M and the client. Turn the DI-624M back on again, and then
turn on the client.
Make sure that all devices are set to Infrastructure mode.
Check that the LED indicators are indicating normal activity . If not, check that the
AC power and Ethernet cables are firmly connected.
Check that the IP Address, subnet mask, gateway and DNS settings are correctly
entered for the network.
If you are using 2.4GHz cordless phones, X-10 equipment or other home security
systems, ceiling fans, and lights, your wireless connection will degrade
dramatically or drop altogether . Try changing the Channel on your DI-624M, and
on all the devices in your network to avoid interference.
Keep y our product away (at least 3-6 feet) from electrical de vices that gener ate
D-Link Systems, Inc.
RF noise, like microwaves, Monitors, electric motors, etc.
51
DI-624M User’s Manual
7. I f orgot my encryption key.
Reset the DI-624M to its factory default settings and restore the other devices on
your network to their default settings. You may do this by pressing the Reset
button on the back of the unit. You will lose the current configuration settings.
8. Resetting the DI-624M to Factory Default Settings
After you have tried other methods for troubleshooting your network, you may choose
to Reset the DI-624M to the factory default settings. Remember that D-Link Super G
MIMO products network together, out of the bo x, at the factory default settings.
Troubleshooting
To hard-reset the DI-624M to Factory Default Settings, please do the follo wing:
Locate the Reset button on the back of the DI-624M.
Use a paper clip to press the Reset button.
Hold for about 10 seconds and then release.
After the DI-62M reboots (this may take a few minutes) it will be reset to the
*Maximum wireless signal rate derived from IEEE Standard 802.11g specifications. Actual data throughput will vary.
Network conditions and environmental factors, including volume of network traffic, building materials and
construction, and network overhead lower actual data throughput rate.
When entering the IP Address of the DI-624M (192.168.0.1), you are not connecting to
the Internet or have to be connected to the Internet. The de vice has the utility b uilt-in to
a ROM chip in the device itself . Y our computer must be on the same IP subnet to connect
to the web-based utility.
To resolve difficulties accessing a Web utility, please follow the steps below.
Step 1: Verify ph ysical connectivity by chec king for solid link lights on the de vice. If you
do not get a solid link light, try using a different cable or connect to a different port on the
device if possible. If the computer is turned off, the link light may not be on.
What type of cable should I be using?
Frequently Asked Questions
The following connections require a Crossover Cable:
Computer to Computer
Computer to Uplink Port
Computer to Access Point
Computer to Print Server
Computer/XBOX/PS2 to DWL-810
Computer/XBOX/PS2 to DWL-900AP+
Uplink Port to Uplink Port (hub/switch)
Normal Port to Normal Port (hub/switch)
The following connections require a Straight-through Cable:
Computer to Residential Gateway/Router
Computer to Normal Port (hub/switch)
Access Point to Normal Port (hub/switch)
Print Server to Normal Port (hub/switch)
Uplink Port to Normal Port (hub/switch)
Rule of Thumb:
”If there is a link light, the cable is right.”
D-Link Systems, Inc.
56
DI-624M User’s Manual
What´s the difference between a crossover cable and a straight-through cable?
The wiring in crossover and straight-through cables are diff erent. The tw o types of cable
have different purposes for different LAN configurations. EIA/TIA 568A/568B define the
wiring standards and allow for two different wiring color codes as illustrated in the
following diagram.
Frequently Asked Questions
*The wires with colored backgrounds may have white stripes and may be denoted that
way in diagrams found elsewhere.
How to tell straight-through cable from a crossover cable:
The main way to tell the difference between the two cable types is to compare the
wiring order on the ends of the cable. If the wiring is the same on both sides, it is straightthrough cable. If one side has opposite wiring, it is a crossover cable.
All you need to remember to properly configure the cables is the pinout order of the two
cable ends and the following rules:
A straight-through cable has identical ends. A crossover cable has different ends.
It makes no functional difference which standard you follow for straight-through cable
ends, as long as both ends are the same. You can star t a crossover cable with either
standard as long as the other end is the other standard. It makes no functional difference
which end is which. The order in which you pin the cable is important. Using a pattern
other than what is specified in the above diagram could cause connection problems.
When to use a crossover cable and when to use a straight-through cable:
Computer to Computer – Crossover
Computer to an normal port on a Hub/Switch – Straight-through
Computer to an uplink port on a Hub/Switch - Crossover
Hub/Switch uplink port to another Hub/Switch uplink port – Crossover
Hub/Switch uplink port to another Hub/Switch normal port - Straight-through
D-Link Systems, Inc.
57
DI-624M User’s Manual
Step 2: Disable any Internet security software running on the computer. Software firewalls
like Zone Alarm, Black Ice, Sygate, Norton Personal Firewall, etc. might block access
to the configuration pages. Check the help files included with your firewall software for
more information on disabling or configuring it.
Step 3: Configure your Internet settings.
Go to Start>Settings>Control Panel. Double click the Internet Options Icon.
From the Security tab , clic k the button to restore the settings to their def aults.
Frequently Asked Questions
Click to the Connection tab and set the dial-up option to Never Dial a
D-Link Systems, Inc.
Connection. Click the LAN Settings button.
58
DI-624M User’s Manual
Nothing should be checked. Click OK.
Go to the Advanced tab and click the button to restore these settings to their
defaults.
Frequently Asked Questions
Click OK. Go to the desktop and close any open windows.
Step 4: Check your IP Address. Your computer must have an IP Address in the same
range of the device you are attempting to configure. Most D-Link devices use the
192.168.0.X range.
How can I find my IP Address in Windows 95, 98, or ME?
Click on Start, then click on Run.
The Run Dialogue Box will appear . Type winipcfg in the window as shown then
D-Link Systems, Inc.
click OK.
59
DI-624M User’s Manual
The IP Configuration window will appear, displaying your Ethernet Adapter
Information.
Select your adapter from the drop down menu.
If you do not see your adapter in the drop down menu, your adapter is not properly
installed.
Frequently Asked Questions
After selecting your adapter, it will display your IP Address, subnet mask, and
default gate w ay.
Click OK to close the IP Configuration window.
How can I find my IP Address in Windows 2000/XP?
Click on Start and select Run.
Type cmd then click OK.
D-Link Systems, Inc.
60
DI-624M User’s Manual
From the Command Prompt, enter ipconfig. It will return your IP Address, subnet
mask, and default gateway.
Frequently Asked Questions
Type exit to close the command prompt.
Make sure you tak e note of y our computer´s Default Gateway IP Address . The Default
Gatewa y is the IP Address of the D-Link router. By default, it should be 192.168.0.1
How can I assign a Static IP Address in Windows 98/Me?
From the desktop , right-click on the Network Neigborhood icon (Win ME - My
Network Places) and select Properties.
Highlight TCP/IP and clic k the Properties button. If you have more than 1 adapter ,
then there will be a TCP/IP “Binding” f or each adapter . Highlight TCP/IP > (your
network adapter) and then click Properties.
D-Link Systems, Inc.
61
DI-624M User’s Manual
Click Specify an IP Address.
Frequently Asked Questions
Enter in an IP Address that is on the same subnet as the LAN IP Address on
your router . Example: If the router´s LAN IP Address is 192.168.0.1, make your
IP Address 192.168.0.X where X is between 2-99. Make sure that the number
you choose is not in use on the network.
Click on the Gateway tab.
Enter the LAN IP Address of your router here (192.168.0.1).
Click Add when finished.
D-Link Systems, Inc.
62
DI-624M User’s Manual
Click on the DNS Configuration tab .
Frequently Asked Questions
Click Enable DNS. T ype in a Host (can be any word). Under DNS server search
order, enter the LAN IP Address of y our router (192.168.0.1). Click Add.
Click OK twice.
When prompted to reboot your computer , click Yes. After you reboot, the computer
D-Link Systems, Inc.
will now have a static, private IP Address.
63
DI-624M User’s Manual
How can I assign a Static IP Address in Windows 2000?
Right-click on My Network Places and select Properties.
Right-click on the Local Area Connection which represents your network card
and select Properties.
Frequently Asked Questions
Highlight Internet Protocol (TCP/IP) and click Properties.
Click Use the following IP Address and enter an IP Address that is on the
same subnet as the LAN IP Address on your router . Example: If the router´s LAN
IP Address is 192.168.0.1, make your IP Address 192.168.0.X where X = 2-99.
Make sure that the number you choose is not in use on the network.
Set the Default Gateway to be the same as the LAN IP Address of your router
Set the Primary DNS to be the same as the LAN IP address of your router
D-Link Systems, Inc.
(192.168.0.1).
(192.168.0.1).
64
DI-624M User’s Manual
The Secondary DNS is not needed or enter a DNS server from your ISP.
Click OK twice. You may be asked if you want to reboot your computer. Click
Yes.
Frequently Asked Questions
How can I assign a Static IP Address in Windows XP?
Click on Start > Control Panel > Network and Internet Connections > Network
connections.
See the second step for assigning a static IP address in Windows 2000 and
continue from there.
Step 5: Access the W eb management. Open y our Web bro wser and enter the IP Address
of your D-Link device in the address bar. This should open the login page for the Web
management. Follow instructions to login and complete the configuration.
2 How can I setup my router to work with a Cable
modem connection?
Dynamic Cable connection
(IE AT&T-BI, Co x, Adelphia, Rogers, Roadrunner , Charter , and Comcast).
Note: Please configure the router with the computer that was last connected directly to
the cable modem.
Step 1: Log into the web based configuration by typing in the IP Address of the router
(default:192.168.0.1) in your web bro wser . The username is admin (all lowercase) and
the password is blank (nothing).
D-Link Systems, Inc.
65
DI-624M User’s Manual
Step 2: Click the Home tab and clic k the WAN button. Dynamic IP Address is the default
value, how ever , if Dynamic IP Address is not selected as the WAN type , select Dynamic
IP Address by clicking on the radio button. Click Clone Mac Address. Click on Apply
and then Continue to save the changes.
Frequently Asked Questions
D-Link Systems, Inc.
66
DI-624M User’s Manual
Step 3: Po wer cycle the cab le modem and router.
Turn the cable modem off (first) . Turn the router off Leave them off f or 2 minutes.** Turn
the cable modem on (first). Wait until you get a solid cable light on the cable modem.
Turn the router on. W ait 30 seconds.
** If you have a Motorola (Surf Board) modem, leave off for at least 5 minutes.
Step 4: Follow step 1 again and log back into the web configuration. Click the Status
tab and click the Device Info button. If you do not already have a public IP Address
under the WAN heading, click on the DHCP Renew and Continue buttons.
Step 1: Log into the web based configuration by typing in the IP Address of the router
(default:192.168.0.1) in your web bro wser . The username is admin (all lowercase) and
the password is blank (nothing).
Frequently Asked Questions
Static Cable Connection
Step 2: Click the Home tab and click the WAN button. Select Static IP Address and
enter your static settings obtained from the ISP in the fields provided.
If you do not know y our settings, you m ust contact y our ISP.
D-Link Systems, Inc.
67
DI-624M User’s Manual
Frequently Asked Questions
Step 3: Click on Apply and then click Continue to save the changes.
Step 4: Click the Status tab and click the D evice Info button. Your IP Address informationwill be displayed under the WAN heading.
3 How can I setup my router to work with Earthlink
DSL or any PPPoE connection?
Make sure you disab le or uninstall any PPPoE software such as WinPoet or Enternet
300 from your computer or you will not be able to connect to the Internet.
Step 1: Upgrade Firmware if needed.
(Please visit the D-Link tech support website at: http://support.dlink.com for the latest
firmware upgrade information.)
Step 2: Take a paperclip and perform a hard reset. With the unit on, use a paperclip
and hold down the reset button on the back of the unit for 10 seconds. Release it and
the router will recycle, the lights will blink, and then stabilize.
D-Link Systems, Inc.
68
DI-624M User’s Manual
Step 3: After the router stabilizes, open your browser and enter 192.168.0.1 into the
address window and hit the Enter key. When the password dialog box appears, enter
the username admin and leave the password blank. Click OK.
If the password dialog box does not come up repeat Step 2.
Note: Do not run Wizard.
Step 4: Click on the WAN tab on left-hand side of the screen. Select PPPoE.
Step 5: Select Dynamic PPPoE (unless y our ISP supplied you with a static IP Address).
Step 6: In the username field enter ELN/username@earthlink.net and your password,
where username is your own username.
For SBC Global users, enter username@sbcglobal.net.
For Ameritech users, enter username@ameritech.net.
For BellSouth users, enter username@bellsouth.net.
For Mindspring users, enter username@mindspring.com.
Frequently Asked Questions
For most other ISPs, enter username.
Step 7: Maximum Idle Time should be set to zero. Set MTU to 1492, unless specified
by your ISP, and set Autoreconnect to Enabled.
Note: If y ou experience problems accessing certain websites and/or email issues, please
set the MTU to a lower number such as 1472, 1452, etc. Contact your ISP for more
information and the proper MTU setting for your connection.
Step 8: Click Apply. When prompted, click Continue. Once the screen refreshes, unplug
the power to the D-Link router .
Step 9: Turn off your DSL modem for 2-3 minutes. Turn back on. Once the modem has
established a link to your ISP, plug the pow er back into the D-Link router . W ait about 30
seconds and log back into the router .
Step 10: Click on the Status tab in the web configuration where you can view the
device info. Under WAN, click Connect. Click Continue when prompted. You should
now see that the device info will show an IP Address, verifying that the device has
connected to a server and has been assigned an IP Address.
D-Link Systems, Inc.
69
DI-624M User’s Manual
4 Can I use my D-Link Br oadband Router to share m y
Internet connection provided by AOL DSL Plus?
In most cases yes. AOL DSL+ ma y use PPPoE for authentication b ypassing the client
software. If this is the case, then our routers will work with this service. Please contact
AOL if you are not sure.
To set up your router:
Step 1: Log into the web-based configuration (192.168.0.1) and configure the WAN
side to use PPPoE.
Step 2: Enter your screen name followed by @aol.com for the user name. Enter your
AOL password in the password box.
Step 3: You will have to set the MTU to 1400. AOL DSL does not allow for anything
higher than 1400.
Step 4: Apply settings.
Frequently Asked Questions
Step 5: Recycle the power to the modem for 1 minute and then recycle power to the
router. Allow 1 to 2 minutes to connect.
If you connect to the Internet with a different internet service provider and want to use
the AOL software , you can do that without configuring the router’ s firew all settings. You
need to configure the AOL software to connect using TCP/IP.
Go to http://www .aol.com for more specific configur ation information of their software.
5 How do I open ports on my router?
To allow traffic from the internet to enter your local network, you will need to open up
ports or the router will block the request.
Step 1: Open your web browser and enter the IP Address of your D-Link router
(192.168.0.1). Enter username (admin) and your password (blank by default).
Step 2: Click on Adv anced on top and then click Virtual Server on the left side.
D-Link Systems, Inc.
70
DI-624M User’s Manual
Frequently Asked Questions
Step 3: Check Enabled to activ ate entry .
Step 4: Enter a name for your virtual server entry.
Step 5: Next to Priv ate IP, enter the IP Address of the computer on your local network
that you want to allow the incoming service to .
Step 6: Choose Protocol T ype - either TCP, UDP, or both. If you are not sure, select
both.
Step 7: Enter the port information next to Private Port and Public P ort. The private and
public ports are usually the same. The public port is the port seen from the WAN side,
and the private port is the por t being used by the application on the computer within
your local network.
Step 8: Enter the Schedule information.
Step 9: Click Apply and then click Continue.
Note: Make sure DMZ host is disabled. If DMZ is enabled, it will disable all Virtual
Server entries.
Because our routers use NAT (Network Address Translation), you can only open a
specific port to one computer at a time. F or example: If y ou hav e 2 web servers on your
network, you cannot open port 80 to both computers. Y ou will need to configure 1 of the
web servers to use port 81. Now you can open port 80 to the first computer and then
open port 81 to the other computer.
D-Link Systems, Inc.
71
DI-624M User’s Manual
6 What is DMZ?
Demilitarized Zone:
In computer networks, a DMZ (demilitarized zone) is a computer host or small network
inserted as a neutral zone between a company´s private network and the outside public
network. It prevents outside users from getting direct access to a server that has company
data. (The term comes from the geographic buffer z one that was set up between North
Korea and South K orea f ollowing the UN police action in the early 1950s.) A DMZ is an
optional and more secure approach to a firewall and effectively acts as a proxy server
as well.
In a typical DMZ configuration for a small company, a separate computer (or host in
network terms) receives requests from users within the private network for access to
Web sites or other companies accessible on the public network. The DMZ host then
initiates sessions for these requests on the public network. However, the DMZ host is
not able to initiate a session back into the private network. It can only forward packets
that have already been requested.
Frequently Asked Questions
Users of the public network outside the company can access only the DMZ host. The
DMZ may typically also have the company´s Web pages so these could be served to
the outside world. Ho wev er , the DMZ provides access to no other company data. In the
event that an outside user penetr ated the DMZ hosts security , the Web pages might be
corrupted but no other company information would be exposed. D-Link, a leading maker
of routers, is one company that sells products designed for setting up a DMZ
7 How do I configure the DMZ Host?
The DMZ feature allows y ou to forw ard all incoming ports to one computer on the local
network. The DMZ, or Demilitarized Zone, will allow the specified computer to be
exposed to the Internet. DMZ is useful when a cer tain application or game does not
work through the firewall. The computer that is configured for DMZ will be completely
vulnerable on the Internet, so it is suggested that you try opening ports from the Virtual
Server or Firewall settings before using DMZ.
Step 1: Find the IP address of the computer you want to use as the DMZ host.
T o find out ho w to locate the IP Address of the computer in Windo ws XP/2000/ME/9x or
Macintosh operating systems please refer to Step 4 of the first question in this section
(Frequently Ask ed Questions).
D-Link Systems, Inc.
72
DI-624M User’s Manual
Step 2: Log into the web based configuration of the router by typing in the IP Address of
the router (default:192.168.0.1) in your web browser. The username is admin (all
lowercase) and the password is blank (nothing)
Step 3: Click the Advanced tab and then click on the DMZ button. Select Enable and
type in the IP Address you found in step 1.
Frequently Asked Questions
Step 4: Click Apply and then Continue to save the changes.
Note: When DMZ is enabled, Virtual Ser ver settings will still be effective. Remember,
you cannot forw ard the same port to multiple IP Addresses, so the Virtual Server settings
will take priority over DMZ settings.
D-Link Systems, Inc.
73
DI-624M User’s Manual
8 How do I open a range of ports on my DI-624M using
Firewall rules?
Step 1: Access the router’s Web configuration by entering the router’s IP Address in
your Web browser . The default IP Address is 192.168.0.1. Login using y our password.
The default username is “admin” and the password is blank.
If you are having difficulty accessing Web management, please see the first question in
this section.
Step 2: From the Web management Home page , click the Advanced tab then click the
Firewall button.
Frequently Asked Questions
Step 3: Click on Enabled and type in a name for the new rule.
Step 4: Choose WAN as the Source and enter a range of IP Addresses out on the
internet that you would like this rule applied to. If you would like this rule to allow all
internet users to be able to access these ports, then put an Asterisk in the first box and
leave the second box empty.
Step 5: Select LAN as the Destination and enter the IP Address of the computer on
your local network that you want to allo w the incoming service to. This will not work with
a range of IP Addresses.
D-Link Systems, Inc.
74
DI-624M User’s Manual
Step 6: Enter the port or range of ports that are required to be open for the incoming
service.
Step 7: Click Apply and then click Continue.
Note: Make sure DMZ host is disabled.
Because our routers use NAT (Network Address Translation), you can only open a
specific port to one computer at a time. F or example: If y ou hav e 2 web servers on your
network, you cannot open port 80 to both computers. Y ou will need to configure 1 of the
web servers to use port 81. Now you can open port 80 to the first computer and then
open port 81 to the other computer.
9 What are virtual servers?
Frequently Asked Questions
A Virtual Server is defined as a service port, and all requests to this port will be redirected
to the computer specified by the server IP. For e xample, if you hav e an FTP Server (port
21) at 192.168.0.5, a Web server (port 80) at 192.168.0.6, and a VPN server at
192.168.0.7, then you need to specify the f ollo wing virtual server mapping table:
Server Port
21 192.168.0.5X
80 192.168.0.6 X
1723 192.168.0.7X
Server IP
Enable
10 How do I use PC Anywhere with my DI-624M router?
You will need to open 3 ports in the Virtual Server section of your D-Link router.
Step 1: Open your web browser and enter the IP Address of the router (192.168.0.1).
Step 2: Click on Advanced at the top and then click Virtual Server on the left side.
D-Link Systems, Inc.
75
DI-624M User’s Manual
Step 3: Enter the information as seen below. The Private IP is the IP Address of the
computer on your local network that you want to connect to.
Frequently Asked Questions
Step 4: The first entry will read as shown above.
Step 5: Click Apply and then click Continue.
Step 6: Create a second entry as shown below:
D-Link Systems, Inc.
76
DI-624M User’s Manual
Step 7: Click Apply and then click Continue.
Step 8: Create a third and final entry as shown below:
Frequently Asked Questions
Step 9: Click Apply and then click Continue.
Step 10: Run PCAnywhere from the remote site and use the WAN IP Address of the
router, not y our computer´s IP Address.
11 How can I use eDonkey behind m y D-Link Router?
You must open ports on your router to allow incoming traffic while using eDonkey.
eDonkey uses three ports (4 if using CLI):
4661 (TCP) To connect with a server
4662 (TCP) To connect with other clients
4665 (UDP) To communicate with servers other than the one you are connected to.
4663 (TCP) *Used with the command line (CLI) client when it is configured to allow
remote connections. This is the case when using a Graphical Interface (such as the
Java Interface) with the client.
Step 1: Open your web browser and enter the IP Address of your router (192.168.0.1).
Enter username (admin) and your password (leave blank).
D-Link Systems, Inc.
77
DI-624M User’s Manual
Step 2: Click on Advanced and then click Firewall.
Frequently Asked Questions
Step 3: Create a new firewall rule:
Click Enabled. Enter a name (edonkey). Click Allow. Ne xt to Source, select WAN under
interface. In the first box, enter an *. Leave the second box empty. Next to Destination,
select LAN under interface. Enter the IP Address of the computer you are running
eDonkey from. Lea ve the second bo x empty. Under Protocol, select *. In the port range
boxes, enter 4661 in the first box and then 4665 in the second box. Click Always or set
a schedule.
Step 4: Click Apply and then Continue.
12 How do I set up my router for SOCOM on my
Playstation 2?
T o allo w you to play SOCOM and hear audio , you must download the latest firmware f or
the router (if needed), enable Game Mode, and open port 6869 to the IP Address of
your Playstation.
Step 1: Upgrade firmware (follow link above).
D-Link Systems, Inc.
78
DI-624M User’s Manual
Step 2: Open your web browser and enter the IP Address of the router (192.168.0.1).
Enter username (admin) and your password (blank by default).
Step 3: Click on the Advanced tab and then clic k on Virtual Server on the left side.
Frequently Asked Questions
socom
192.168.0.100
Both
6869
6869
Step 4: You will now create a new Virtual Server entry . Click Enabled and enter a name
(socom). Enter the IP Address of your Playstation f or Private IP.
Step 5: For Protocol Type select Both. Enter 6869 f or both the Private Port and Public
Port. Click Always. Click Apply to save changes and then Continue.
Step 6: Click on the Tools tab and then Misc on the left side.
Step 7: Make sure Gaming Mode is Enabled. If not, click Enabled. Click Apply and
then Continue.
13 How can I use Gamespy behind my D-Link router?
Step 1: Open your web browser and enter the IP Address of the router (192.168.0.1).
Enter admin for the username and your password (blank by default).
D-Link Systems, Inc.
79
DI-624M User’s Manual
Step 2: Click on the Advanced tab and then clic k Virtual Server on the left side.
Frequently Asked Questions
gamespy1
192.168.0.100
Both
3783
3783
Step 3: You will create 2 entries.
Step 4: Click Enabled and enter Settings:
NAME - Gamespy1
PRIV ATE IP - The IP Address of your computer that y ou are running Gamespy from.
PRO TOCOL TYPE - Both
PRIVATE PORT - 3783
PUBLIC PORT - 3783
SCHEDULE - Always.
Click Apply and then continue..
D-Link Systems, Inc.
80
DI-624M User’s Manual
Frequently Asked Questions
gamespy2
192.168.0.100
Both
6500
6500
Step 5: Enter 2nd entry:
Click Enabled.
Enter the following information:
NAME - Gamespy2
PRIV ATE IP - The IP Address of y our computer that you are running Gamespy from.
PRO TOCOL TYPE - Both
PRIVATE PORT - 6500
PUBLIC PORT - 6500
SCHEDULE - Always.
Click Apply and then continue.
D-Link Systems, Inc.
81
DI-624M User’s Manual
14 How do I configure my router for KaZaA and
Grokster?
The following is for KaZaA, Grokster, and others using the FastTrack P2P file sharing
system.
In most cases, you do not have to configure anything on the router or on the Kazaa
software. If you are having problems, please follow steps below:
Step 1: Enter the IP Address of your router in a web browser (192.168.0.1).
Step 2: Enter your username (admin) and your password (blank by default).
Step 3: Click on Advanced and then click Virtual Server.
Step 4: Click Enabled and then enter a Name (kazaa for example).
Step 5: Enter the IP Address of the computer you are running KaZaA from in the Private
IP box. Select TCP for the Protocol Type.
Frequently Asked Questions
Step 6: Enter 1214 in the Private and Public Port box es . Click Always under schedule
or set a time range. Click Apply.
D-Link Systems, Inc.
Make sure that you did not enable proxy/firewall in the KaZaA software.
82
DI-624M User’s Manual
15 How do I configure my router to play Warcraft 3?
You must open por ts on your router to allow incoming traffic while hosting a game in
Warcraft 3. To play a game, you do not ha ve to configure y our router .
Warcraft 3 (Battlenet) uses port 6112.
Step 1: Open your web browser and enter the IP Address of your router (192.168.0.1).
Enter username (admin) and your password (leave blank).
Step 2: Click on Advanced and then click Virtual Server.
Step 3: Create a new entry: Click Enabled. Enter a name (warcraft3). Private IP - Enter
the IP Address of the computer you want to host the game. Select Both for Protocol
Type Enter 6112 for both Private Port and Public Port Click Always or set a schedule.
Frequently Asked Questions
warcraft3
192.168.0.100
Both
6112
6112
Step 4 Click Apply and then Continue.
Note: If you want multiple computers from you LAN to play in the same game that you
are hosting, then repeat the steps above and enter the IP Addresses of the other
computers. You will need to change ports. Computer #2 can use port 6113, computer
#3 can use 6114, and so on.
D-Link Systems, Inc.
83
DI-624M User’s Manual
You will need to change the port information within the W arcraft 3 software for computers
#2 and up.
Configure the Game Port information on each computer:
Start Warcraft 3 on each computer, click Options > Gameplay. Scroll down and you
should see Game Port. Enter the port number as you entered in the abov e steps.
16 How do I use NetMeeting with my D-Link Router?
Unlike most TCP/IP applications, NetMeeting uses D YNAMIC PORTS instead of ST ATIC
PORTS. That means that each NetMeeting connection is somewhat different than the
last. F or instance, the HTTP web site application uses port 80. NetMeeting can use any
of over 60,000 diff erent ports.
All broadband routers using (only) standard NAT and all internet sharing programs like
Microsoft ICS that use (only) standard NAT will NOT work with NetMeeting or other
h.323 software packages.
Frequently Asked Questions
The solution is to put the router in DMZ.
Note: A few hardware manufacturers have taken it on themselves to actually provide
H.323 compatibility . This is not an easy task since the router m ust search each incoming
packet f or signs that it might be a netmeeting packet. This is a whole lot more work than
a router normally does and may actually be a weak point in the firewall. D-Link is not
one of the manufacturers.
To read more on this visit http://www.HomenetHelp.com.
17 How do I set up my router to use iChat? -for
Macintosh users-
You must open ports on your router to allow incoming traffic while using iChat.
iChat uses the following ports: 5060 (UDP) 5190 (TCP) File Sharing 16384-16403
(UDP) To video conference with other clients.
Step 1: Open your web browser and enter the IP Address of your router (192.168.0.1).
Enter username (admin) and your password (leave blank).
Step 2: Click on Advanced and then click Firewall.
Step 3: Create a new firewall rule:
Click Enabled.
Enter a name (ichat1).
Click Allow.
D-Link Systems, Inc.
84
DI-624M User’s Manual
Next to Source, select WAN under interface.
In the first box, enter an *.
Leave the second bo x empty.
Next to Destination, select LAN under interface.
Enter the IP Address of the computer you are running iChat from.
Leave the second box empty. Under Protocol, select UDP. In the port range boxes,
enter 5060 in the first box and lea v e the second bo x empty.
Click Always or set a schedule.
Frequently Asked Questions
ichat1
WAN
LAN
*
192.168.0.100
UDP
5060
D-Link Systems, Inc.
85
DI-624M User’s Manual
Step 4: Click Apply and then Continue.
Step 5: Repeat steps 3 and 4 enter ichat2 and open ports 16384-16403 (UDP).
Frequently Asked Questions
ichat2
WAN
LAN
*
192.168.0.100
UDP
For File Sharing:
Step 1: Click on Advanced and then Virtual Server.
16384
16403
Step 2: Check Enabled to activ ate entry .
Step 3: Enter a name for your virtual server entry (ichat3).
Step 4: Next to Private IP, enter the IP Address of the computer on y our local network
that you want to allow the incoming service to .
Step 5: Select TCP for Protocol Type.
Step 6: Enter 5190 next to Private Port and Public Port.
Step 7: Click Always or configure a schedule.
Step 8: Click Apply and then Continue.
D-Link Systems, Inc.
86
DI-624M User’s Manual
Frequently Asked Questions
ichat3
192.168.0.100
5190
5190
*
If using Mac OS X Firewall, you may need to temporarily turn off the firewall in the
Sharing preference pane on both computers.
To use the Mac OS X Firewall, you must open the same ports as in the router:
Step 1: Choose Apple menu > System Preferences.
Step 2: Choose View > Sharing.
Step 3: Click the Firewall tab .
Step 4: Click New.
Step 5: Choose Other from the P ort Name pop-up menu.
Step 6: In the Port Number, Range or Series field, type in: 5060, 16384-16403.
Step 7: In the Description field type in: iChat AV
Step 8: Click OK.
D-Link Systems, Inc.
87
DI-624M User’s Manual
17 How do I send or receive a file via iChat when the
Mac OSX firewall is active? -for Macintosh users- Mac
OS X 10.2 and later
The following information is from the online Macintosh AppleCare knowledge base:
“iChat cannot send or receive a file when the Mac OS X firewall is active in its default
state. If you have opened the AIM port, you may be able to receive a file but not send
them.
In its default state, the Mac OS X firewall blocks file transfers using iChat or America
Online AIM software. If either the sender or receiver has turned on the Mac OS X firewall,
the transfer may be blocked.
The simplest workaround is to temporarily turn off the firewall in the Sharing preference
pane on both computers. This is required for the sender. However, the receiver may
keep the firew all on if the AIM port is open. To open the AIM port:
Step 1: Choose Apple menu > System Preferences.
Frequently Asked Questions
Step 2: Choose Vie w > Sharing.
Step 3: Click the Firewall tab.
Step 4: Click New.
Step 5: Choose AOL IM from the Port Name pop-up menu. The number 5190 should
already be filled in for you.
Step 6: Click OK.
If you do not want to turn off the firewall at the sending computer , a diff erent file sharing
service may be used instead of iChat. The types of file sharing available in Mac OS X
are outlined in technical document 106461, "Mac OS X: File Sharing" in the AppleCareKnowledge base online.
Note: If you use a file sharing service when the firewall is turned on, be sure to click the
Firewall tab and select the service you have chosen in the "Allow" list. If you do not do
this, the firewall will also block the file sharing service.
D-Link Systems, Inc.
88
DI-624M User’s Manual
18 What is NAT?
NAT stands for Network Address Translator. It is proposed and described in RFC-
1631 and is used for solving the IP Address depletion problem. Basically, each NAT
box has a table consisting of pairs of local IP Addresses and globally unique addresses,
by which the box can “translate” the local IP Addresses to global address and vice
versa. Simply put, it is a method of connecting multiple computers to the Internet (or any
other IP network) using one IP Address.
D-Link´s broadband routers (ie: DI-624M) support NA T. With proper configuration, multiple
users can access the Internet using a single account via the NAT device.
For more information on RFC-1631: The IP Network Address Translator (NAT), visit
http://www .faqs.org/rfcs/rfc1631.html.
Frequently Asked Questions
D-Link Systems, Inc.
89
DI-624M User’s Manual
Appendix
Securing Your Network
1. Change Admin Password
Changing the password to access your new router is the first step in securing your
network. This can done through the Wizard or on the Admin Page of the Tools tab.
There is no password by default and hackers will know this when trying to access your
network. Make sure that the password you choose is not commonly known or something
that is easy to guess such as your last name or your pet’ s name. T ry using a combination
of letters and numbers to deter intruders from hacking into your network. Your private
information should be kept private.
2. Disable DHCP and use Static IP addresses or Use Static DHCP and limit
scope to the amount of users on your network.
In the event that an intruder manages to gain access to your network, having DHCP
enabled makes it easier for the intruder to access other computers on your network.
There are two methods for getting around this. One is to disable DHCP and use static
IP addressing on all the devices connected to your netw ork. This would mean that the
intruder would have to know what IP network your devices are on in order to access
them. The second way is to change the scope of the DHCP server to only include
enough IP addresses for the de vices in your network. You can then use the Static DHCP
feature of the router to assign an IP address to each device on your network. Static
DHCP still dynamically assigns an IP address to your network devices but only allows
for those defined devices to obtain an IP address.
Appendix
3. Change the default LAN IP address
Change the default LAN IP address from 192.168.0.1 to an alternate IP address. There
are 3 ranges of IP addresses that have been reserved for use on Private Networks.
10.0.0.0- 10.255.255.255 (10.0.0.0/8)
172.16.0.0- 172.31.255.255 (172.16.0.0/12)
192.168.0.0 - 192.168.255.255 (192.168.0.0/16)
D-Link routers use 192.168.0.1 as their default LAN IP address. Choosing an alternate
IP address lessens the probabilty of an intruders knowing what IP network your devices
are on.
4. Set up MAC Filtering
Each networking device (router, network card, etc) on a network contains a unique
hexadecimal number that identifies that specific product. This number is ref erred to as
a MAC address. MAC filtering allows you to create a list of the MAC address of each
device on your network and only allows these specific devices to associate with your
network. With this feature enab led, de vices attempting to connect to y our network with
a MAC address that is not in the list you created, will be denied access.
D-Link Systems, Inc.
90
DI-624M User’s Manual
Glossary
A
Access Control List - ACL. Database of network devices that are allowed to access resources on the
network.
Access Point - AP. Device that allows wireless clients to connect to it and access the network
Ad-hoc network - Peer-to-Peer network between wireless clients
Address Resolution Protocol - ARP. Used to map MAC addresses to IP addresses so that con versions can
be made in both directions.
ADSL - Asymmetric Digital Subscriber Line
Advanced Encryption Standard - AES. Government encryption standard
Alphanumeric - Characters A-Z and 0-9
Antenna - Used to transmit and receive RF signals.
AppleTalk – A set of Local Area Network protocols developed by Apple for their computer systems
AppleTalk Address Resolution Protocol – AARP. Used to map the MAC addresses of Apple computers to
their AppleTalk network addresses, so that conversions can be made in both directions.
Appendix
Application layer - 7th Layer of the OSI model. Provides services to applications to ensure that they can
communicate properly with other applications on a network.
ASCII - American Standard Code for Information Interchange. This system of characters is most commonly
used for text files
Attenuation – The loss in strength of digital an analog signals. The loss is greater when the signal is being
transmitted over long distances.
Authentication –To provide credentials, like a Password, in order to verify that the person or device is really
who they are claiming to be
Automatic Private IP Addressing - APIPA. An IP address that a Windows computer will assign itself when it
is configured to obtain an IP address automatically but no DHCP server is available on the network
B
Backward Compatible - The ability for new devices to communicate and interact with older legacy devices
to guarantee interoperability
Bandwidth - The maximum amount of bytes or bits per second that can be transmitted to and from a netw ork
device
Basic Input/Output System – BIOS. A program that the processor of a computer uses to startup the system
once it is turned on
Baud – Data transmission speed
Bit rate – The amount of bits that pass in given amount of time
bit/sec – bits per second
BOOTP – Bootstrap Protocol. Allows for computers to be booted up and given an IP address with no user
intervention
Bottleneck – A time during processes when something causes the process to slowdown or stop all together
Broadband – A wide band of frequencies available for transmitting data
D-Link Systems, Inc.
91
DI-624M User’s Manual
Broadcast – Transmitting data in all directions at once
Browser – A program that allows you to access resources on the web and provides them to you graphically
C
Cable modem – A device that allows you to connect a computer up to a coaxial cable and receive Internet
access from your Cable provider
CardBus – A newer version of the PC Card or PCMCIA interface. It supports a 32-bit data path, DMA, and
consumes less voltage
Carrier Sense Multiple Access/Collision Avoidance – CSMA/CA
Carrier Sense Multiple Access/Collision Detect – CSMA/CD
CA T 5 – Category 5. Used for 10/100 Mbps or 1Gbps Ethernet connections
Client – A program or user that requests data from a server
Collision – When do two devices on the same Ethernet network try and transmit data at the exact same time.
Cookie – Information that is stored on the hard drive of your computer that holds your preferences to the site
that gave your computer the cookie
CSMA/CA – Carrier Sense Multiple Access/Collision Avoidance
Appendix
CSMA/CD – Carrier Sense Multiple Access/Collision Detection
D
Data – Information that has been translated into binary do that it can be processed or moved to another device
Data Encryption Standard – Uses a randomly selected 56-bit key that must be known by both the sender and
the receiver when information is exchanged
Data-Link layer – The second layer of the OSI model. Controls the movement of data on the physical link of
a network
Database – Organizes information so that it can be managed updated, as well as easily accessed by users
or applications
DB-25 – A 25 ping male connector for attaching External modems or RS-232 serial devices
DB-9 – A 9 pin connector for RS-232 connections
dBd - decibels related to dipole antenna
dBi - decibels relative to isotropic radiator
dBm - decibels relative to one milliwatt
Decrypt – To unscramble an encrypted message back into plain text
Default – A predetermined value or setting that is used by a program when no user input has been entered
for this value or setting
Demilitarized zone – DMZ. A single computer or group of computers that can be accessed by both users on
the Internet as well as users on the Local Network, but that is not protected by the same security as the Local
Network.
DHCP – Dynamic Host Configuration Protocol. Used to automatically assign IP addresses from a predefined
pool of addresses to computers or devices that requests them
Digital certificate – An electronic method of providing credentials to a server in order to have access to it or
a network
Direct Sequence Spread Spectrum – DSSS. Modulation technique used by 802.11b wireless devices
D-Link Systems, Inc.
92
DI-624M User’s Manual
DNS – Domain Name System. Translates Domain Names to IP addresses
DOCSIS – Data Over Cable Service Interface Specifications. The standard interface for cable modems
Domain name – A name that is associated with an IP address
Download – To send a request from one computer to another and have the file transmitted back to the
requesting computer
DSL – Digital Subscriber Line. High bandwidth Internet connection over telephone lines
Duplex – Sending and Receiving data transmissions at the sane time
Dynamic DNS service – DDNS is provided by companies to allow users with Dynamic IP addresses to
obtain a Domain Name that will always by linked to their changing IP address. The IP address is updated by
either client software running on a computer or by a router that supports DDNS, whenever the IP address
changes.
Dynamic IP address – IP address that is assigned by a DHCP server and that may change. Cable Internet
providers usually use this method to assign IP addresses to their customers.
E
EAP – Extensible Authentication Protocol
Email – Electronic Mail is a computer-stored message that is transmitted over the Internet
Appendix
Encryption – Converting data into cyphertext so that it cannot be easily read
Enterprise – Large organizations that use computers
Ethernet – The most widely used technology for Local Area Networks.
F
Fiber optic – A way of sending data through light impulses over glass or plastic wire or fiber
File server – A computer on a network that stores data so that the other computers on the network can all
access it
File sharing – Allowing data from computers on a network to be accessed by other computers on the network
will different levels of access rights
Firewall – A device that protects resources of the Local Area Network from unauthorized users outside of the
local network
Firmware – Programming that is inserted into a hardware device that tells it how to function
Fragmentation – Breaking up data into smaller pieces to make it easier to store
FTP – File Transfer Protocol. Easiest way to transfer files between computers on the Internet
Full-duplex – Sending and Receiving data at the same time
G
Gain – The amount an amplifier boosts the wireless signal
Gateway – A device that connects your network to another, like the internet
Gbps – Gigabits per second
Gigabit Ethernet – Transmission technology that provides a data rate of 1 billion bits per second
Graphical user interface – GUI
D-Link Systems, Inc.
93
DI-624M User’s Manual
H
H.323 – A standard that provides consistency of voice and video transmissions and compatibility for
videoconferencing devices
Half-duplex – Data cannot be transmitted and received at the same time
Hashing – Transforming a string of characters into a shorter string with a predefined length
Hexadecimal – Characters 0-9 and A-F
HomePNA – Networking over telephone lines
HomeRF – Networking standard that combines 802.11b and DECT (digital Enhanced Cordless
Telecommunication) that provides speeds up to 1.6 Mbps and a distance of 150 ft using a F requency Hopping
transmission method
Hop – The action of data packets being transmitted from one router to another
Host – Computer on a network
HTTP – Hypertext Transf er Protocol is used to tr ansfer files from HTTP servers (web servers) to HTTP clients
(web browsers)
HTTPS – HTTP over SSL is used to encrypt and decrypt HTTP transmissions
Hub – A networking device that connects multiple devices together
Appendix
I
ICMP – Internet Control Message Protocol
IEEE – Institute of Electrical and Electronics Engineers
IETF – Internet Engineering Task Force
IGMP – Internet Group Management Protocol is used to make sure that computers can report their multicast
group membership to adjacent routers
IIS – Internet Information Server is a WEB server and FTP server provided by Microsoft
IKE – Internet Key Exchange is used to ensure security for VPN connections
Infrastructure – In terms of a wireless network, this is when wireless clients use an Access Point to gain
access to the network
Internet – A system of worldwide networks which use TCP/IP to allow for resources to be accessed from
computers around the world
Internet Explorer – A World Wide Web browser created and provided by Microsoft
Internet Protocol – The method of transferring data from one computer to another on the Internet
Internet Protocol Security – IPsec provides security at the packet processing layer of network communication
Internet Service Provider – An ISP provides access to the Internet to individuals or companies
Interoperability – The ability for products to interact with other products without much customer interaction
Intranet – A private network
Intrusion Detection – A type of security that scans a network to detect attacks coming from inside and outside
of the network
IP – Internet Protocol
IP address – A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer
that transmits data on the Internet or on an Intranet
D-Link Systems, Inc.
94
DI-624M User’s Manual
IPsec – Internet Protocol Security
IPv6 – Internet Protocol Version 6 uses 128-bit addresses and was developed to solve the problem that we
face of running our of IP version 4 addresses
IPX – Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware
clients and servers to communicate
ISP – Internet Service Provider
J
Java – A programming language used to create programs and applets for web pages
K
Kbps – Kilobits per second
Kbyte - Kilobyte
Kerberos – A method of securing and authenticating requests for services on a network
L
Appendix
LAN – Local Area Network
Latency – The amount of time that it takes a packet to get from the one point to another on a network. Also
referred to as delay
LED - Light Emitting Diode
Legacy – Older devices or technology
Local Area Network – A group of computers in a building that usually access files from a server
M
MAC address – A unique hardware address for devices on a Local Area Network
MDI – Medium Dependent Interface is an Ethernet port for a connection to a straight-through cable
MDIX - Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable
Megabit - Mb
Megabyte - MB
Megabits per second - Mbps
MIB – Management Information Base is a set of objects that can be managed by using SNMP
Modem – A device that Modulates digital signals from a computer to an analog signal in order to transmit the
signal over phone lines. It also Demodulates the analog signals coming from the phone lines to digital signals
for your computer
MPPE – Microsoft Point-to-Point Encryption is used to secure data transmissions over PPTP connections
MTU – Maximum Transmission Unit is the largest packet that can be transmitted on a packet-based network
like the Internet
Multicast – Sending data from one device to many devices on a network
D-Link Systems, Inc.
95
DI-624M User’s Manual
N
NA T – Network Address Translation allows many private IP addresses to connect to the Internet, or another
network, through one IP address
NetBEUI – NetBIOS Extended User Interface is a Local Area Network communication protocol. This is an
updated version of NetBIOS
NetBIOS – Network Basic Input/Output System
Netmask – Determines what portion of an IP address designates the Network and which part designates the
Host
NetWare – A Server Software developed by Novell
Network Interface Card – A card installed in a computer or built onto the motherboard that allows the
computer to connect to a network
Network later – The third layer of the OSI model which handles the routing of traffic on a network
Network Time Protocol – Used to synchronize the time of all the computers in a network
NIC – Network Interface Card
NTP – Network Time Protocol
Appendix
O
OFDM – Orthogonal Frequency-Division Multiplexing is the modulation technique for both 802.11a and
802.11g
OSI – Open Systems Interconnection is the reference model for how data should travel between two devices
on a network
OSPF – Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks
because only changes to the routing table are sent to all the other routers in the network as opposed to
sending the entire routing table at a regular interval, which is how RIP functions
P
Password - A sequence of characters that is used to authenticate requests to resources on a network
Personal Area Network – The interconnection of networking devices within a range of 10 meters
Physical layer – The first layer of the OSI model. Provides the hardware means of transmitting electrical
signals on a data carrier
PoE – Power over Ethernet is the means of transmitting electricity over the unused pairs in a category 5
Ethernet cable
POP 3 – Post Office Protocol 3 is used for receiving email
PPP – Point-to-Point Protocol is used for two computers to communicate with each over a serial interf ace , like
a phone line
PPPoE – Point-to-Point Protocol over Ethernet is used to connect multiple computers to a remote server over
Ethernet
PPTP – Point-to-Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two
networks
Preamble – Used to synchronize communication timing between devices on a network
D-Link Systems, Inc.
96
DI-624M User’s Manual
Q
QoS – Quality of Service
R
RADIUS – Remote Authentication Dial-In User Service allows for remote users to dial into a central server
and be authenticated in order to access resources on a network
Rendezvous – Apple’ s version of UPnP, which allows for devices on a network to discover each other and be
connected without the need to configure any settings
Repeater – Retransmits the signal of an Access Point in order to extend it’s coverage
RIP – Routing Information Protocol is used to synchronize the routing table of all the routers on a network
RJ-11 – The most commonly used connection method for telephones
RJ-45 - The most commonly used connection method for Ethernet
RS-232C – The interface for serial communication between computers and other related devices
RSA – Algorithm used for encryption and authentication
S
Appendix
Samba – A freeware program that allows for resources to be shared on a network. Mainly used in Unix based
Operating Systems
Server – A computer on a network that provides services and resources to other computers on the network
Session key – An encryption and decryption key that is generated for every communication session between
two computers
Session layer – The fifth layer of the OSI model which coordinates the connection and communication
between applications on both ends
Simple Mail Transfer Protocol – Used for sending and receiving email
Simple Network Management Protocol – Governs the management and monitoring of network devices
SMTP – Simple Mail Transfer Protocol
SNMP – Simple Network Management Protocol
SOHO – Small Office/Home Office
SPI – Stateful Packet Inspection
SSH – Secure Shell is a command line interface that allows for secure connections to remote computers
SSID – Service Set Identifier is a name for a wireless network
Stateful inspection – A feature of a firewall that monitors outgoing and incoming traffic to make sure that only
valid responses to outgoing requests for incoming packets are allowed to pass though the firewall
Subnet mask – Determines what portion of an IP address designates the Network and which part designates
the Host
T
TCP – Transmission Control Protocol
TCP/IP – Transmission Control Protocol/Inter net Protocol
TFTP – Trivial File Transf er Protocol is a utility used for tr ansferring files that is simpler to use than FTP but with
less features
D-Link Systems, Inc.
97
DI-624M User’s Manual
Throughput – The amount of data that can be transferred in a given time period
Traceroute – A utility displays the routes between you computer and specific destination
U
UDP – User Datagram Protocol
UNC – Universal Naming Convention allows for shares on computers to be identified without having to know
what storage device it’s on
Unicast – Communication between a single sender and receiver
Universal Plug and Play – A standard that allows network devices to discover each other and configure
themselves to be a part of the network
UPnP – Universal Plug and Play
URL – Uniform Resource Locator is a unique address for files accessible on the Internet
UTP – Unshielded Twisted Pair
V
Virtual LAN -
Appendix
Virtual Private Network – A secure tunnel over the Internet to connect remote offices or users to their
company’s network
VLAN – Virtual LAN
Voice over IP – Sending voice information over the Internet as opposed to the PSTN
VoIP – Voice over IP
W
Wake on LAN – Allows you to power up a computer though it’s Network Interface Card
WAN – Wide Area Network
Web browser – A utility that allows you to view content and interact will all of the information on the World
Wide Web
WEP – Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that
of a wired network
Wi-Fi – Wireless Fidelity
Wi-Fi Protected Access – An updated version of security for wireless networks that provides authentication
as well as encryption
Wide Area Network - A network spanning a large geographical area or consisting of more than one LAN.
Wireless ISP – A company that provides a broadband Internet connection over a wireless connection
Wireless LAN – Connecting to a Local Area Network over one of the 802.11 wireless standards
WISP – Wireless Internet Service Provider
WLAN – Wireless Local Area Network
Y
Yagi antenna – A directional antenna used to concentrate wireless signals on a specific location
D-Link Systems, Inc.
98
DI-624M User’s Manual
Contacting Technical Support
You can find software updates and user documentation on the D-Link website.
D-Link provides free technical support for customers within the United States and within
Canada for the duration of the warranty period on this product.
U.S. and Canadian customers can contact D-Link technical support through our web
site, or by phone.
T ech Support for customer s within the United States:
D-Link Technical Support over the Telephone:
(877) 453-5465
24 hours a day, seven days a week.
Contacting Technical Support
D-Link Technical Support over the Internet:
http://support.dlink.com
email:support@dlink.com
T ec h Support for customers within Canada:
D-Link Technical Support over the Telephone:
(800) 361-5265
Monday to F rida y 8:30am to 9:00pm EST
D-Link Technical Support over the Internet:
http://support.dlink.ca
email:support@dlink.ca
When contacting technical support, please provide the following information:
· Serial number of the unit
· Model number or product name
· Software type and version number
D-Link Systems, Inc.
99
DI-624M User’s Manual
Warranty
Subject to the terms and conditions set forth herein, D-Link Systems, Inc. (“D-Link”) provides this Limited
warranty for its product only to the person or entity that originally purchased the product from:
·D-Link or its authorized reseller or distributor and
·Products purchased and delivered within the fifty states of the United States, the District of Columbia,
U.S. P ossessions or Protectorates, U.S. Military Installations, addresses with an APO or FPO .
Limited Warranty: D-Link warrants that the hardware portion of the D-Link products described below will
be free from material defects in workmanship and materials from the date of original retail purchase of the
product, for the period set forth below applicable to the product type (“W arranty Period”), except as otherwise
stated herein.
1-Year Limited W arranty for the Product(s) is defined as f ollows:
·Hardware (excluding pow er supplies and fans) One (1) Year
·Pow er Supplies and Fans One (1) Y ear
·Spare parts and spare kits Ninety (90) days
Getting Started
D-Link’s sole ob ligation shall be to repair or replace the defective Hardware during the Warranty P eriod at
no charge to the original owner or to refund at D-Link’s sole discretion. Such repair or replacement will be
rendered by D-Link at an Authorized D-Link Service Office. The replacement Hardware need not be new or
have an identical mak e, model or part. D-Link may in its sole discretion replace the def ective Hardware (or
any part thereof) with any reconditioned product that D-Link reasonably determines is substantially equivalent
(or superior) in all material respects to the defective Hardware. Repaired or replacement Hardware will be
warranted for the remainder of the original W arranty P eriod from the date of original retail purchase. If a
material defect is incapable of correction, or if D-Link determines in its sole discretion that it is not
practical to repair or replace the defective Hardware, the price paid by the original purchaser for the
defective Hardware will be refunded by D-Link upon return to D-Link of the defective Hardware. All Hardware
(or part thereof) that is replaced by D-Link, or for which the purchase price is refunded, shall become the
property of D-Link upon replacement or refund.
Limited Software Warranty: D-Link w arrants that the software portion of the product (“Software”) will
substantially conform to D-Link’s then current functional specifications f or the Software, as set f orth in the
applicable documentation, from the date of original retail purchase of the Software for a period of ninety
(90) days (“W arranty Period”), provided that the Software is properly installed on approv ed hardware and
operated as contemplated in its documentation. D-Link further warrants that, during the Warranty P eriod,
the magnetic media on which D-Link delivers the Software will be free of physical def ects . D-Link’s sole
obligation shall be to replace the non-conforming Software (or defective media) with software that
substantially conforms to D-Link’s functional specifications f or the Software or to refund at D-Link’s sole
discretion. Except as otherwise agreed by D-Link in writing, the replacement Software is provided only to
the original licensee, and is subject to the terms and conditions of the license granted by D-Link for the
Software. Softw are will be w arranted for the remainder of the original W arr anty Period from the date or
original retail purchase. If a material non-conformance is incapable of correction, or if D-Link determines
in its sole discretion that it is not practical to replace the non-conforming Software, the price paid by the
original licensee for the non-conforming Software will be refunded by D-Link; provided that the non-conforming
Software (and all copies thereof) is first returned to D-Link. The license granted respecting any Softw are
for which a refund is given automatically terminates.
Non-Applicability of Warranty: The Limited W arranty provided hereunder for hardw are and software of DLink’s products will not be applied to and does not co ver any refurbished product and any product purchased
through the inventory clearance or liquidation sale or other sales in which D-Link, the sellers, or the
liquidators expressly disclaim their warranty obligation pertaining to the product and in that case, the
D-Link Systems, Inc.
100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.