D Link DIR615B2 Users Manual

Section 3 - Configuration
Device Information
This page displays the current information for the DIR-615. It will display the LAN, WAN (Internet), and Wireless information.
If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button will be displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP.
If your Internet connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed. Use Disconnect to drop the PPPoE connection and use Connect to establish the PPPoE connection.
See the following page for more information.
61D-Link DIR-615 User Manual
Section 3 - Configuration
General:
WAN:
LAN:
Wireless LAN:
LAN Computers:
IGMP Multicast
Memberships:
Displays the router’s time and firmware version.
Displays the MAC address and the public IP settings for the router.
Displays the MAC address and the private (local) IP settings for the router.
Displays the wireless MAC address and your wireless settings such as SSID and Channel.
Displays computers and devices that are connected to the router via Ethernet and that are receiving an IP address assigned by the router (DHCP).
Displays the Multicast Group IP Address.
62D-Link DIR-615 User Manual
Section 3 - Configuration
Log
The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of the events to view. This router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility.
What to View:
View Levels:
Apply Log
Settings:
Refresh:
Clear:
Email Now:
Save Log:
You can select the types of messages that you want to display from the log. Firewall & Security, System, and Router Status messages can be selected.
There are three levels of message importance: Informational, Warning, and Critical. Select the levels that you want displayed in the log.
Will filter the log results so that only the selected options appear.
Updates the log details on the screen so it displays any recent activity.
Clears all of the log contents.
This option will send a copy of the router log to the e-mail address configured in the Tools > Email Settings screen.
This option will save the router to a log file on your computer.
63D-Link DIR-615 User Manual
Section 3 - Configuration
Stats
The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-615 on both the Internet and the LAN ports. The traffic counter will reset if the device is rebooted.
64D-Link DIR-615 User Manual
Section 3 - Configuration
Internet Sessions
The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer.
Local:
NAT:
Internet:
Protocol:
State:
The IP address and, where appropriate, port number of the local application.
The port number of the LAN-side application as viewed by the WAN-side application.
The IP address and, where appropriate, port number of the application on the Internet.
The communications protocol used for the conversation.
State for sessions that use the TCP protocol:
NO: None -- This entry is used as a placeholder for a future connection that may occur. SS: SYN Sent -- One of the systems is attempting to start a connection. EST: Established -- the connection is passing data. FW: FIN Wait -- The client system has requested that the connection be stopped. CW: Close Wait -- The server system has requested that the connection be stopped. TW: Time Wait -- Waiting for a short time while a connection that was in FIN Wait is fully closed. LA: Last ACK -- Waiting for a short time while a connection that was in Close Wait is fully closed.
CL: Closed -- The connection is no longer active but the session is being tracked in case there are any retransmitted
packets still pending.
The direction of initiation of the conversation:
Out - Initiated from LAN to WAN. In - Initiated from WAN to LAN.
65D-Link DIR-615 User Manual
Section 3 - Configuration
The preference given to outbound packets of this conversation by the QoS Engine logic. Smaller numbers represent higher
Dir:
priority.
Priority:
Time Out:
The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection.
300 seconds - UDP connections.
240 seconds - Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established.
7800 seconds - Established or closing TCP connections.
66D-Link DIR-615 User Manual
Section 3 - Configuration
Wireless
The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless clients.
67D-Link DIR-615 User Manual
Section 3 - Configuration
Support
68D-Link DIR-615 User Manual
Section 4 - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The DIR-615 offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2) • WPA2-PSK(Pre-Shared Key)
• WPA (Wi-Fi Protected Access) • WPA-PSK (Pre-Shared Key)
• WEP (Wired Equivalent Privacy)
What is WEP?
WEP stands for Wired Equivalent Privacy. It is based on the IEEE 802.11 standard and uses the RC4 encryption algorithm. WEP provides security by encrypting data over your wireless network so that it is protected as it is transmitted from one wireless device to another.
To gain access to a WEP network, you must know the key. The key is a string of characters that you create. When using WEP, you must determine the level of encryption. The type of encryption determines the key length. 128-bit encryption requires a longer key than 64-bit encryption. Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or ASCII (American Standard Code for Information Interchange – alphanumeric characters) format. ASCII format is provided so you can enter a string that is easier to remember. The ASCII string is converted to HEX for use over the network. Four keys can be defined so that you can change keys easily.
69D-Link DIR-615 User Manual
Loading...
+ 21 hidden pages