D Link IR615E3 Users Manual

Section 3 - Configuration
Access Control
The Access Control section allows you to control access in and out of your network. Use this feature as Parental Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from applications like P2P utilities or games.
Add Policy:
Click Next to continue with the wizard.
Check the Enable.Access.Control check box and click the Add.Policy button to start the Access.Control.Wizard.
Access Control Wizard
41D-Link DIR-615 User Manual
Section 3 - Configuration
Access Control Wizard (continued)
Enter a name for the policy and then click Next to continue.
Select a schedule (I.E. Always) from the drop-down menu and then click Next to continue.
Enter the following information and then click Next to continue.
Address.Type - Select IP address, MAC address, or
Other Machines.
IP.Address - Enter the IP address of the computer you want to apply the rule to.
42D-Link DIR-615 User Manual
Section 3 - Configuration
Access Control Wizard (continued)
Select the filtering method and then click Next to continue.
Enter the rule: Enable - Check to enable the rule.
Name - Enter a name for your rule. Dest.IP.Start - Enter the starting IP address. Dest.IP.End - Enter the ending IP address. Protocol - Select the protocol. Dest.Port.Start - Enter the starting port number. Dest.Port.End - Enter the ending port number.
To enable web logging, click Enable. Click Save to save the access control rule.
43D-Link DIR-615 User Manual
Section 3 - Configuration
Website Filters
Website Filters are used to allow you to set up a list of allowed Web sites that can be used by multiple users through the network. To use this feature select to Allow or Deny, enter the domain or website and click Add, and then click Save.Settings. You must also select Apply.Web.Filter under the Access Control section (page 40).
Configure Website
Filter Below:
Clear the list
below:
Website URL/
Domain:
Select Deny or Allow computers access to only these sites.
Click to delete all entries in the list.
Enter the keywords or URLs that you want to allow or deny.
44D-Link DIR-615 User Manual
Section 3 - Configuration
Inbound Filters
The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you can configure inbound data filtering rules that control data based on an IP address range. Inbound Filters can be used with Virtual Server, Port Forwarding, or Remote Administration features.
Name:
Action:
Enable:
Source IP Start:
Source IP End:
Save:
Inbound Filter
Rules List:
Enter a name for the inbound filter rule. Select Allow or Deny. Check to enable rule. Enter the starting IP address. Enter 0.0.0.0 if
you do not want to specify an IP range. Enter the ending IP address. Enter
255.255.255.255 if you do not want to specify and IP range.
Click the Save button to apply your settings. You must click Save Settings at the top to save the settings.
This section will list any rules that are created. You may click the Edit icon to change the settings or enable/disable the rule, or click the Delete icon to remove the rule.
45D-Link DIR-615 User Manual
Section 3 - Configuration
Firewall Settings
A firewall protects your network from the outside world. The D-Link DIR-615 offers a firewall type functionality. The SPI feature helps prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely to the outside world.
Enable SPI:
NAT Endpoint
Filtering:
Enable Anti-Spoof
Checking:
Enable DMZ Host:
SPI (Stateful Packet Inspection, also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more state per session. It validates that the traffic passing through the session conforms to the protocol.
Select one of the following for TCP and UDP ports: Endpoint.Independent.- Any incoming traffic sent to an open port will be forwarded to the application that opened the port. The port will close if idle for 5 minutes.
Address.Restricted - Incoming traffic must match the IP address of the outgoing connection.
Address.+.Port.Restriction - Incoming traffic must match the IP address and port of the outgoing connection.
Enable this option to provide protection from certain kinds of “spoofing” attacks.
If an application has trouble working from behind the router, you can expose one computer to the Internet and run the application on that computer.
IP Address:
Note: Placing a computer in the DMZ may expose that computer to a variety of security risks. Use of this option is only recommended as a last resort.
Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication. If this computer obtains its IP address automatically using DHCP, be sure to make a static reservation on the
Settings page so that the IP address of the DMZ machine does not change.
System.>.Network.
46D-Link DIR-615 User Manual
Section 3 - Configuration
Routing
This page allows you to specify custom routes that determine how data is moved around your network.
Routing List:
Name:
Destination
IP:
Netmask:
Gateway:
Each Route has a checkbox next to it, check the box of the route you wish to enable.
Specify a name for identification of this route.
Enter the address of the host or network you wish to access.
This field identifies the portion of the destination IP in use.
The IP address of the router will be displayed here.
47D-Link DIR-615 User Manual
Section 3 - Configuration
Advanced Wireless Settings
Transmit Power:
Beacon Period:
RTS Threshold:
Fragmentation
Threshold:
DTIM Interval:
WLAN Partition:
Set the transmit power of the antennas. Beacons are packets sent by an Access Point to
synchronize a wireless network. Specify a value. 100 is the default setting and is recommended.
This value should remain at its default setting of
2432. If inconsistent data flow is a problem, only a minor modification should be made.
The fragmentation threshold, which is specified in bytes, determines whether packets will be fragmented. Packets exceeding the 2346 byte setting will be fragmented before transmission. 2346 is the default setting.
(Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages.
This enables 802.11d operation. 802.11d is a wireless specification developed to allow implementation of wireless networks in countries that cannot use the 802.11 standard. This feature should only be enabled if you are in a country that requires it.
WMM Enable:
Short GI:
WMM is QoS for your wireless network. This will improve the quality of video and voice applications for your wireless clients.
Check this box to reduce the guard interval time therefore increasing the data capacity. However, it’s less reliable and may create higher data loss.
48D-Link DIR-615 User Manual
Section 3 - Configuration
Advanced Network Settings
UPnP Settings:
WAN Ping:
WAN Port Speed:
Multicast
Streams:
To use the Universal Plug and Play (UPnP™) feature click on Enabled. UPNP provides compatibility with networking equipment, software and peripherals.
Unchecking the box will not allow the DIR-615 to respond to pings. Blocking the Ping may provide some extra security from hackers. Check the box to allow the Internet port to be “pinged”.
You may set the port speed of the Internet port to 10Mbps, 100Mbps, or auto. Some older cable or DSL modems may require you to set the port speed to 10Mbps.
Check the box to allow multicast traffic to pass through the router from the Internet.
UPnP Internet Ping Block Internet Port Speed Multicast Streams
49D-Link DIR-615 User Manual
Loading...
+ 21 hidden pages