The Access Control section allows you to control access in and out of your network. Use this feature as Parental Controls
to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications
like P2P utilities or games.
Add Policy:
Click Next to continue with the wizard.
Check the Enable.Access.Control check box
and click the Add.Policy button to start the
Access.Control.Wizard.
Access Control Wizard
41D-Link DIR-615 User Manual
Section 3 - Configuration
Access Control Wizard (continued)
Enter a name for the policy and then click Next to continue.
Select a schedule (I.E. Always) from the drop-down menu
and then click Next to continue.
Enter the following information and then click Next to
continue.
•
Address.Type - Select IP address, MAC address, or
Other Machines.
• IP.Address - Enter the IP address of the computer
you want to apply the rule to.
42D-Link DIR-615 User Manual
Section 3 - Configuration
Access Control Wizard (continued)
Select the filtering method and then click Next to continue.
Enter the rule:
Enable - Check to enable the rule.
Name - Enter a name for your rule.
Dest.IP.Start - Enter the starting IP address.
Dest.IP.End - Enter the ending IP address.
Protocol - Select the protocol.
Dest.Port.Start - Enter the starting port number.
Dest.Port.End - Enter the ending port number.
To enable web logging, click Enable.
Click Save to save the access control rule.
43D-Link DIR-615 User Manual
Section 3 - Configuration
Website Filters
Website Filters are used to allow you to set up a list of allowed Web sites that can be used by multiple users through
the network. To use this feature select to Allow or Deny, enter the domain or website and click Add, and then click
Save.Settings. You must also select Apply.Web.Filter under the Access Control section (page 40).
Configure Website
Filter Below:
Clear the list
below:
Website URL/
Domain:
Select Deny or Allow computers access to
only these sites.
Click to delete all entries in the list.
Enter the keywords or URLs that you want to
allow or deny.
44D-Link DIR-615 User Manual
Section 3 - Configuration
Inbound Filters
The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you
can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters can be used
with Virtual Server, Port Forwarding, or Remote Administration features.
Name:
Action:
Enable:
Source IP Start:
Source IP End:
Save:
Inbound Filter
Rules List:
Enter a name for the inbound filter rule.
Select Allow or Deny.
Check to enable rule.
Enter the starting IP address. Enter 0.0.0.0 if
you do not want to specify an IP range.
Enter the ending IP address. Enter
255.255.255.255 if you do not want to specify
and IP range.
Click the Save button to apply your settings.
You must click Save Settings at the top to save
the settings.
This section will list any rules that are created.
You may click the Edit icon to change the
settings or enable/disable the rule, or click the
Delete icon to remove the rule.
45D-Link DIR-615 User Manual
Section 3 - Configuration
Firewall Settings
A firewall protects your network from the outside world. The D-Link DIR-615 offers a firewall type functionality. The SPI feature helps
prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose
to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely
to the outside world.
Enable SPI:
NAT Endpoint
Filtering:
Enable Anti-Spoof
Checking:
Enable DMZ Host:
SPI (Stateful Packet Inspection, also known as dynamic packet
filtering) helps to prevent cyber attacks by tracking more state per
session. It validates that the traffic passing through the session
conforms to the protocol.
Select one of the following for TCP and UDP ports:
Endpoint.Independent.- Any incoming traffic sent to an open port
will be forwarded to the application that opened the port. The port
will close if idle for 5 minutes.
Address.Restricted - Incoming traffic must match the IP address
of the outgoing connection.
Address.+.Port.Restriction - Incoming traffic must match the IP
address and port of the outgoing connection.
Enable this option to provide protection from certain kinds of
“spoofing” attacks.
If an application has trouble working from behind the router, you
can expose one computer to the Internet and run the application
on that computer.
IP Address:
Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only
recommended as a last resort.
Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this
computer obtains its IP address automatically using DHCP, be sure to make a static reservation on the
Settings page so that the IP address of the DMZ machine does not change.
System.>.Network.
46D-Link DIR-615 User Manual
Section 3 - Configuration
Routing
This page allows you to specify custom routes that determine how data is moved around your network.
Routing List:
Name:
Destination
IP:
Netmask:
Gateway:
Each Route has a checkbox next to it,
check the box of the route you wish to
enable.
Specify a name for identification of this
route.
Enter the address of the host or network
you wish to access.
This field identifies the portion of the
destination IP in use.
The IP address of the router will be
displayed here.
47D-Link DIR-615 User Manual
Section 3 - Configuration
Advanced Wireless Settings
Transmit Power:
Beacon Period:
RTS Threshold:
Fragmentation
Threshold:
DTIM Interval:
WLAN Partition:
Set the transmit power of the antennas.
Beacons are packets sent by an Access Point to
synchronize a wireless network. Specify a value.
100 is the default setting and is recommended.
This value should remain at its default setting of
2432. If inconsistent data flow is a problem, only a
minor modification should be made.
The fragmentation threshold, which is specified
in bytes, determines whether packets will be
fragmented. Packets exceeding the 2346 byte
setting will be fragmented before transmission. 2346
is the default setting.
(Delivery Traffic Indication Message) 3 is the default
setting. A DTIM is a countdown informing clients of
the next window for listening to broadcast and multicast messages.
This enables 802.11d operation. 802.11d is a wireless specification developed to allow implementation of wireless networks in
countries that cannot use the 802.11 standard. This feature should only be enabled if you are in a country that requires it.
WMM Enable:
Short GI:
WMM is QoS for your wireless network. This will improve the quality of video and voice applications for your wireless
clients.
Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may
create higher data loss.
48D-Link DIR-615 User Manual
Section 3 - Configuration
Advanced Network Settings
UPnP Settings:
WAN Ping:
WAN Port Speed:
Multicast
Streams:
To use the Universal Plug and Play (UPnP™)
feature click on Enabled. UPNP provides
compatibility with networking equipment, software
and peripherals.
Unchecking the box will not allow the DIR-615 to
respond to pings. Blocking the Ping may provide
some extra security from hackers. Check the box
to allow the Internet port to be “pinged”.
You may set the port speed of the Internet port
to 10Mbps, 100Mbps, or auto. Some older cable
or DSL modems may require you to set the port
speed to 10Mbps.
Check the box to allow multicast traffic to pass
through the router from the Internet.
UPnPInternet Ping BlockInternet Port SpeedMulticast Streams
49D-Link DIR-615 User Manual
Loading...
+ 21 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.