D Link IR615E3 User Manual

Section 3 - Configuration
DDNS
The DDNS feature allows you to host a server (Web, FTP, Game Server, etc…) using a domain name that you have purchased (www.whateveryournameis.com) with your dynamically assigned IP address. Most broadband Internet Service Providers assign dynamic (changing) IP addresses. Using a DDNS service provider, your friends can enter in your domain name to connect to your server no matter what your IP address is.
DDNS:
Server Address:
Host Name:
Username or Key:
Password or Key:
Timeout:
Status:
Dynamic Domain Name System is a method of keeping a domain name linked to a changing IP Address. Check the box to enable DDNS.
Choose your DDNS provider from the drop down menu.
Enter the Host Name that you registered with your DDNS service provider.
Enter the Username for your DDNS account. Enter the Password for your DDNS account. Enter a time (in hours). Displays the current connection status to your
DDNS server.
71D-Link DIR-615 User Manual
Section 3 - Configuration
System Check
Ping Test:
Ping Results:
The Ping Test is used to send Ping packets to test if a computer is on the Internet. Enter the IP Address that you wish to Ping, and click Ping.
The results of your ping attempts will be displayed here.
72D-Link DIR-615 User Manual
Section 3 - Configuration
Schedules
Name:
Days:
Time:
Save:
Schedule Rules
List:
Enter a name for your new schedule. Select a day, a range of days, or All Week to
include every day. Check
end time for your schedule. Click Save to save your schedule. You
must click Save Settings at the top for your schedules to go into effect.
The list of schedules will be listed here. Click the Edit icon to make changes or click the
Delete icon to remove the schedule.
All.Day.-.24hrs or enter a start and
73D-Link DIR-615 User Manual
Section 3 - Configuration
Device Information
This page displays the current information for the DIR-615. It will display the LAN, WAN (Internet), and Wireless information.
If your Internet connection is set up for a Dynamic IP address then a Release button and a Renew button will be displayed. Use Release to disconnect from your ISP and use Renew to connect to your ISP.
If your Internet connection is set up for PPPoE, a Connect button and a Disconnect button will be displayed. Use
Disconnect to drop the PPPoE connection and use Connect to establish the PPPoE connection.
See the following page for more information.
74D-Link DIR-615 User Manual
Section 3 - Configuration
General:
WAN:
LAN:
Wireless LAN:
LAN Computers:
IGMP Multicast
Memberships:
Displays the router’s time and firmware version. Displays the MAC address and the public IP
settings for the router. Displays the MAC address and the private (local)
IP settings for the router. Displays the wireless MAC address and your
wireless settings such as SSID and Channel. Displays computers and devices that are connected
to the router via Ethernet and that are receiving an IP address assigned by the router (DHCP).
Displays the Multicast Group IP Address.
75D-Link DIR-615 User Manual
Section 3 - Configuration
Log
The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t enough internal memory for all events, logs of older events are deleted but logs of the latest events are retained. The Logs option allows you to view the router logs. You can define what types of events you want to view and the level of the events to view. This router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility.
What to View:
View Levels:
Apply Log
Settings:
Refresh:
Clear:
Email Now:
Save Log:
You can select the types of messages that you want to display from the log. Firewall & Security, System, and Router Status messages can be selected.
There are three levels of message importance: Informational, Warning, and Critical. Select the levels that you want displayed in the log.
Will filter the log results so that only the selected options appear.
Updates the log details on the screen so it displays any recent activity.
Clears all of the log contents. This option will send a copy of the router log to the
e-mail address configured in the Settings screen.
This option will save the router to a log file on your computer.
Tools. >. Email.
76D-Link DIR-615 User Manual
Section 3 - Configuration
Stats
The screen below displays the Traffic Statistics. Here you can view the amount of packets that pass through the DIR-615 on both the Internet and the LAN ports. The traffic counter will reset if the device is rebooted.
77D-Link DIR-615 User Manual
Section 3 - Configuration
Internet Sessions
The Internet Sessions page displays full details of active Internet sessions through your router. An Internet session is a conversation between a program or application on a LAN-side computer and a program or application on a WAN-side computer.
Local:
NAT:
Internet:
Protocol:
State:
The IP address and, where appropriate, port number of the local application.
The port number of the LAN-side application as viewed by the WAN-side application.
The IP address and, where appropriate, port number of the application on the Internet.
The communications protocol used for the conversation.
State for sessions that use the TCP protocol: NO: None -- This entry is used as a placeholder for a future connection that may occur.
SS: SYN Sent -- One of the systems is attempting to start a connection. EST: Established -- the connection is passing data. FW: FIN Wait -- The client system has requested that the connection be stopped. CW: Close Wait -- The server system has requested that the connection be stopped. TW: Time Wait -- Waiting for a short time while a connection that was in FIN Wait is fully closed. LA: Last ACK -- Waiting for a short time while a connection that was in Close Wait is fully closed.
CL: Closed -- The connection is no longer active but the session is being tracked in case there are any retransmitted
packets still pending.
Dir:
The direction of initiation of the conversation:
. Out - Initiated from LAN to WAN. . In - Initiated from WAN to LAN.
78D-Link DIR-615 User Manual
Section 3 - Configuration
Priority:
Time Out:
The preference given to outbound packets of this conversation by the QoS Engine logic. Smaller numbers represent higher priority.
The number of seconds of idle time until the router considers the session terminated. The initial value of Time Out depends on the type and state of the connection.
300.seconds - UDP connections.
240.seconds - Reset or closed TCP connections. The connection does not close instantly so that lingering packets can pass or the connection can be re-established.
7800.seconds - Established or closing TCP connections.
79D-Link DIR-615 User Manual
Section 3 - Configuration
Wireless
The wireless client table displays a list of current connected wireless clients. This table also displays the connection time and MAC address of the connected wireless clients.
80D-Link DIR-615 User Manual
Section 3 - Configuration
IPv6
This screen will display all of your IPv6 internet and network connection details are displayed on this page.
81D-Link DIR-615 User Manual
Section 3 - Configuration
Support
82D-Link DIR-615 User Manual
Section 4 - Security
Wireless Security
This section will show you the different levels of security you can use to protect your data from intruders. The DIR-615 offers the following types of security:
• WPA2 (Wi-Fi Protected Access 2) • WPA2-PSK(Pre-Shared Key)
• WPA (Wi-Fi Protected Access) • WPA-PSK (Pre-Shared Key)
What is WPA?
WPA, or Wi-Fi Protected Access, is a Wi-Fi standard that was designed to improve the security features of WEP (Wired Equivalent Privacy).
The 2 major improvements over WEP:
• Improved data encryption through the Temporal Key Integrity Protocol (TKIP). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with. WPA2 is based on 802.11i and uses Advanced Encryption Standard (AES) instead of TKIP.
• User authentication, which is generally missing in WEP, through the extensible authentication protocol (EAP). WEP regulates access to a wireless network based on a computer’s hardware-specific MAC address, which is relatively simple to be sniffed out and stolen. EAP is built on a more secure public-key encryption system to ensure that only authorized network users can access the network.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection. The key is an alpha-numeric password between 8 and 63 characters long. The password can include symbols (!?*&_) and spaces. This key must be the exact same key entered on your wireless router or access point.
WPA/WPA2 incorporates user authentication through the Extensible Authentication Protocol (EAP). EAP is built on a more secure public key encryption system to ensure that only authorized network users can access the network.
83D-Link DIR-615 User Manual
Section 4 - Security
Wireless Connection Setup Wizard
To run the security wizard, browse to the Setup page and then click the Wireless.Connection.Setup.Wizard.button.
84D-Link DIR-615 User Manual
Section 4 - Security
Enter the SSID (Service Set Identifier). The SSID is the name of your wireless network. Create a name using up to 32 characters. The SSID is case-sensitive. Select Automatically and click Next.
Once this screen appears, the setup is complete. You will be given a detailed summary of your wireless security settings. Click Save to continue.
85D-Link DIR-615 User Manual
Loading...
+ 32 hidden pages