Home
D-Link DGL-4300 Network Router User Manual
Contents
1. Adds a new route to the IP routing table or edits an existing route Enable Specifies whether the entry will be enabled or disabled Enable Vv Destination IP The IP address or network that the packets will be attempting to access Destination IP 0 0 0 0 Netmask 0 0 0 0 Note 192 168 1 0 with a Netmask of 255 255 255 0 means traffic will be Gateway 0000 Interface WAN routed to the entire 192 168 1 x network es T Netmask Used to specify which portion of the Destination IP signifies the network trying to be accessed and which part signifies the host that the packets will be routed to Enable Destination IP Netmask Gateway Metric Interface 192 168 0 2 255 255 255 255 0 0 0 0 1 LAN Note 255 255 255 255 is used to signify only the host that was entered in 192 168 0255 255 255 255 255 0000 1 the Destination IP field 192 168 0 1 255 255 255 255 0 0 0 0 LAN 192 168 0 0 255 255 255 0 0 0 0 0 LAN LAN Gateway Specifies the next hop to be taken if this route is used A gateway of 0 0 0 0 implies there is no next hop and the IP address matched is directly connected to the router on the interface specified LAN or WAN Advanced gt Routing Interface Specifies the interface LAN or WAN that the IP packet must use to transit out of the router when this route is used Metric The amount of hops it will take to reach the Destination IP or network A hop is considered to be traffic pas
2. By default the Access Control feature is disabled If you enable Access Control every device on the LAN must either have a static IP address that is one that is not in the DHCP range or must be in the Static DHCP Client List see Basic gt DHCP When Access Control is disabled every device on the LAN is permitted to access the Internet However if you enable Access Control every device on the LAN that needs to access the Internet must have an Access Control rule that explicitly permits it to access the Internet Devices that do not have an Access Control Rule cannot access the Internet When Access Control is enabled the options below will appear Add Edit Access Control Rule Policy Name Create a name for this access control policy that is meaningful to you Typically this would be a system name or user name such as Rob s PC Address Type Select IP MAC or Others to apply this rule to the corresponding address type IP Address The local network IP address of the machine that you want the access control rule to apply to Example 192 168 0 50 Make sure that this is a static IP address or the system is in the static DHCP Client list See Basic gt DHCP Machine Address The MAC address of the machine that you want the access control rule to apply to Schedule Select a schedule of times when you want the policy to apply If you do not see the schedule you need in the list of schedules go to the Tools gt Schedul
3. D Link Building Networks for People Manual Version 1 1 DGL 4300 Wireless 108G Gaming Router Contents Package Contents EE ee eg Ve ea Ge eg oe ge ve ew 6 Minimum System Reguirement sissies ee ee ke ke Re RE RE RE RE RR RR ER ER EA ER ER ER ER ee ee 6 ee Te Ui GR OE EE ER EE EO ER OE EE EE EEN 1 Features and Benefits nice iese Ne esse se Ds Ne EE eN ke N Ne Ee NE RE be Rd NE RE GE N be mdnne 8 Hardware Overview eise se ee ee ER EE EE RE EER ER ER EE RE RR ER RE RR ER ER ER Ee RE RR ER ER Ee Re ER Ee 9 MIN 9 ENN 10 Wireless BIS EE EE ES GE RI EE GE GR uun 11 Standards based Technology eeue ER EK BEA BE EES RE Re EE As EN EE EER eke Eg see ER 12 Installation Considerations ee ee ee ee ee Re ee ee ee Re Re ee ee ee ee 12 Using the Configuration Interface cccecececeeeeeeeecececeaeaeseeeeeeeeees 13 BEER EE en RE EE meee ee rea 13 EET AE Ok ON N N ed NEE N N Oe 13 Internet Connection Setup Wizard ee ee ee ee ee ee ee 14 Wireless Security Setup Wizard esse ses see ee ee Re RR AR RR AR Re AE Re Ee 16 WAN MEE NE OE ER RE Ee N 18 LE RE EV NR NN 18 PTE Le EEE EE 19 Static WAN MOde vasen 20 DHCP WAN Mode ee ee ee ee ee ee ee ee ee ee ee ee Re ee ee ee ee ee ee ee 20 PPPOE WAN Mode ee ee ee ee ee ee ee ee ee Ge Re ee Ge Re ee ee ee Ge ee ee ee 21 PPTP WAN MOde see es ee Dee eie n es GEN ge dk Ge ie ee 22 PN 23 PN 23 EE EN E 23 DHCP ee 24 DHCP SANS aent 24 N
4. MTU Maximum Transmission Unit is the largest packet that can be transmitted on a packet based network like the Internet Multicast Sending data from one device to many devices on a network N NAT Network Address Translation allows many private IP addresses to connect to the Internet or another network through one IP address NetBEUI NetBIOS Extended User Interface is a Local Area Network communication protocol This is an updated version of NetBIOS NetBIOS Network Basic Input Output System Netmask Determines what portion of an IP address designates the Network and which part designates the Host NetWare A Server Software developed by Novell Network Interface Card A card installed in a computer or built onto the motherboard that allows the computer to connect to a network Network later The third layer of the OSI model which handles the routing of traffic on a network Network Time Protocol Used to synchronize the time of all the computers in a network NIC Network Interface Card NTP Network Time Protocol O OFDM Orthogonal Frequency Division Multiplexing is the modulation technique for both 802 11a and 802 11g OSI Open Systems Interconnection is the reference model for how data should travel between two devices on a network OSPF Open Shortest Path First is a routing protocol that is used more than RIP in larger scale networks because only changes to the routi
5. Choose the mode to be used by the router to connect to the Internet WAN Mode amp stace DHCP Use these DNS Servers Primary DNS Server ox Secondary DNS Server 000 Advanced gt gt gt gt STATIC WAN MODE Enter the static address information provided by your Internet Service Provider ISP IP Address 0 0 0 0 Subnet Mask OL Default Gateway 000 Basic gt WAN gt Static MODES Choose the mode to be used by the router to connect to the Internet WAN Mode Stac DH Use these DNS Servers Primary DNS Server Secondary DNS Server Host Name DHCP Connection Renew Cickng the Release button above wi release the IP address of the router Ockng the Renew rton vel mmedately renew the IP address of ths router Enable BigPond BigPond Server BigPond User Id BigPond Password Verity Password Bigpond Connection EA MEEN c nil attempt an mmedate Connecton to remote ve Ck pScoRMECt button vell mediately These buttons wil be enabled after the router reboots with this configuration Basic gt WAN gt DHCP D Link Systems Inc PPPoE WAN Mode A method of connection that requires you to enter a Username and Password provided by your Internet Service Provider to gain access to the Internet Username The username that you use to login to your Internet connection Password Enter the password associated with your username Verify Password Retype the password for
6. WAN Port Spoed Aut gt Respond to WAN Ping MAC Cloning Enabled MAC Address STATIC WAN MODE Enter the static address Information provided by your Internet Service Provider ISP Basic gt WAN gt Advanced D Link Systems Inc Static WAN Mode Used when your ISP provides you a set IP address that does not change The IP information is manually entered in your IP configuration settings IP Address Subnet Mask Default Gateway Input the IP Address provided from your router configuration settings ISP or network administrator Input the Subnet mask provided from your router configuration settings ISP or network administrator Input the Gateway address provided from your router configuration settings ISP or network administrator DHCP WAN Mode A method of connection where the ISP assigns your IP address when your computer requests one from the ISP s server Some ISP s require you to make some settings on your side before your computer can connect to the Internet Host Name DHCP Connection Some ISP s may check your computer s HOST name The HOST name identifies your system to the ISP s server This way they know your computer is eligible to receive an IP address In other words they know that you are paying for their service The Release button will release the current IP address of the router The Renew button will request an IP address 20 Using the Configuration Interface MODES
7. 00 00 00 00 00 00 Clone Your PC s MAC Address Host Name Note You may also need to provide a Host Name If you do not have or know this information please contact your ISP Km EA EN SET USERNAME AND PASSWORD CONNECTION PPPOE To set up this connection you will need to have a Username and Password from your Internet Service Provider If you do not have this information please contact your ISP User Name Password seese Verify Password eeeee Service Name optional Note You may also need to provide a Service Name If you do not have or know this information please contact your ISP EA EN EN SET USERNAME AND PASSWORD CONNECTION PPTP To set up this connection vou wil need to have Username and Passwond from your Internet Service Provider You abo heed PPTP IP adress If you da not have this information please contact your ISP Porp IP Address fona PPTP Subset Mask 25 352 PPTP Gateway IP Address PPIP Server IP Address may 277 be same as gateway UserName SEI USERNAME AND PASSWORD CONNECTION LZIP To set up this connection you wil need te have a Username and Password from your Internet Service Provider You also moed L2TP 1P adress I you do not have thin information piosse contact your ESP Lap ie ad ress fox L2TP Subnet Mask F55 255 255 i UITP Gateway IP Address LTD Server IP Address may be same as gateway i User Name Password sesse verify passw
8. After you ve completed all modifications or deletions you must click the Save Settings button at the top of the page to save your changes The router must reboot before new settings will take effect You will be prompted to Reboot the Device or Continue If you need to make additional settings changes click Continue If you are finished with your configuration settings click the Reboot the Device button 32 Using the Configuration Interface D Link Systems Inc Gaming The Gaming section is used to open multiple ports or a range of ports in your router and redirect data through those ports to a single PC on your network This feature allows you to enter ports in various formats Add Edit Game Rule Rule Name IP Address TCP Ports To Open UDP Ports To Open Schedule Save Game Rules List Entries on this list can be Give the Gaming Rule a name that is meaningful to you such as Game Server You can also select from a list of pre defined rules for many popular games If you have any trouble with pre defined rules verify whether the port values have changed since the list was created You also must fill in the IP address field Enter the local network IP address of the system hosting the game server such as 192 168 0 50 Enter the TCP ports to open such as 6159 6180 99 Enter the UDP ports to open such as 6159 6180 99 Select a schedule for when this rule is in effect If you do not see the schedule
9. CLIENTS 1 Computer Name MAC Address pm multimedia 00 0C 76 58 64 1B IP Address 192 168 0 165 Enable 7 IP Address 0 0 0 0 MAC Address 00 00 00 00 00 00 Computer Name ADD STATIC DHCP CLIENT Ea co lt lt Select Machine v D Link Systems Inc Wireless The wireless section is used to configure the wireless settings for your D Link Router Please note that changes made on this section may also need to be duplicated on your Wireless Client Basic Wireless Settings Enable Wireless Radio Wireless Network Name Visibility Status Auto Ghannel Select Channel Transmission Rate 802 11 Mode Super G Mode This option turns off and on the wireless connection feature of the router If this is not enabled you cannot connect using a wireless network adapter When you are browsing for available wireless networks this is the name that will appear in the list unless Visibility Status is set to Invisible see below This name is also referred to as the SSID The Invisible option allows you to hide your wireless network When this option is set to Visible your wireless network name is broadcast to anyone within the range of your signal If you re not using encryption then they could connect to your network When Invisible mode is enabled you must enter the Wireless Network Name SSID manually to connect to the network With this box selected the router will automaticall
10. D Link Router will detect the MAC address and enter it automatically 3 The computer name can be entered in for reference but is not required 4 Click the OK button and then click on the Save Settings button at the top of the page The IP address will now only be assigned to the designated computer and it will always receive the same IP address as long as it uses the same Ethernet adapter Note If you replace the Ethernet adapter in a computer that is using Static DHCP you will need to Copy the PC s MAC Address again because every Ethernet adapter has a unique MAC address The same goes for any network device If you replace a network device such as a print server you will need to input the MAC address of the new print server into the Static DHCP configuration Static DHCP Glient List Entries on this list can be enabled disabled by toggling the Enable checkbox Entries can be modified by clicking on the paper and pencil icon To delete an entry click on the trash can icon After you ve completed all modifications or deletions you must click the Save Settings button at the top of the page to save your changes The router must reboot before new settings will take effect You will be prompted to Reboot the Device or Continue If you need to make additional settings changes click Continue If you are finished with your configuration settings click the Reboot the Device button 25 Using the Configuration Interface NUMBER OF DYNAMIC DHCP
11. H H 323 A standard that provides consistency of voice and video transmissions and compatibility for videoconferencing devices 60 Appendix D Link Systems Inc Half duplex Data cannot be transmitted and received at the same time Hashing Transforming a string of characters into a shorter string with a predefined length Hexadecimal Characters 0 9 and A F HomePNA Networking over telephone lines HomeRF Networking standard that combines 802 11b and DECT Digital Enhanced Cordless Telecommunication that provides speeds up to 1 6 Mbps and a distance of 150 ft using a Frequency Hopping transmission method Hop The action of data packets being transmitted from one router to another Host Computer on a network HTTP Hypertext Transfer Protocol is used to transfer files from HTTP servers web servers to HTTP clients web browsers HTTPS HTTP over SSL is used to encrypt and decrypt HTTP transmissions Hub A networking device that connects multiple devices together ICMP Internet Control Message Protocol IEEE Institute of Electrical and Electronics Engineers IETF Internet Engineering Task Force IGMP Internet Group Management Protocol is used to make sure that computers can report their multicast group membership to adjacent routers IIS Internet Information Server is a WEB server and FTP server provided by Microsoft IKE Internet Key Exchange is used to ensure security for VPN connectio
12. Virtual LAN Virtual Private Network A secure tunnel over the Internet to connect remote offices or users to their company s network VLAN Virtual LAN Voice over IP Sending voice information over the Internet as opposed to the PSTN VolP Voice over IP W Wake on LAN Allows you to power up a computer though it s Network Interface Card WAN Wide Area Network Web browser A utility that allows you to view content and interact will all of the information on the World Wide Web WEP Wired Equivalent Privacy is security for wireless networks that is supposed to be comparable to that of a wired network Wi Fi Wireless Fidelity Wi Fi Protected Access An updated version of security for wireless networks that provides authentication as well as encryption Wide Area Network network spanning a large geographical area or consisting of more than one LAN Wireless ISP A company that provides a broadband Internet connection over a wireless connection Wireless LAN Connecting to a Local Area Network over one of the 802 11 wireless standards WISP Wireless Internet Service Provider WLAN Wireless Local Area Network Yagi antenna A directional antenna used to concentrate wireless signals on a specific location 66 Appendix D Link Systems Inc Technical Specifications Hardware Interface e 4 x 10 100 1000 Auto Sensing Gigabit Ethernet LAN Ports e 1 x 10 100 Auto Sensing Fas
13. a valid string of 13 characters for 128 bit encryption 27 Using the Configuration Interface WIRELESS SECURITY MODE Security Mode None wep WPA Personal wPa Enterprise WEP is the wireless encryption standard To use it you must enter the same key s into the router and the wireless stations For 64 bit keys you must enter 10 hex digits into each key box For 128 bit keys you must enter 26 hex digits into each key box A hex digit is either a number from 0 to 9 or a letter from A to F For the most secure use of WEP set the authentication type to Shared Key when WEP is enabled You may also enter any text string into a WEP key box in which case it will be converted into a hexadecimal key using the ASCII values of the characters A maximum of 5 text characters can be entered for 64 bit keys and a maximum of 13 characters for 128 bit keys WEP Key Length 64 bit 10 hex digits length applies to all keys WEP Key 1 eeeseeseee WEP Key 2 essssesess WEP Key 3 eessessees WEP Key 4 eesseesees Default WEP Key WEP Key 1 Authentication Open v D Link Systems Inc WPA Personal This option uses Wi Fi Protected Access with a Pre Shared Key PSK Pre Shared Key Gipher Type Group Key Update Interval WPA Enterprise The key is entered as a pass phrase of up to 63 characters in ASCII format at both ends of the wireless connection The pass phrase cannot be shorter than 8 character
14. all modifications or deletions you must click the Save Settings button at the top of the page to save your changes The router must reboot before new settings will take effect You will be prompted to Reboot the Device or Continue If you need to make additional settings changes click Continue If you are finished with your configuration settings click the Reboot the Device button Web Filter The Web Filter section is where you add the Web site to be used for Access Control Add Edit Web Site This field is where you can add Web sites to the Allowed Web List The Allowed Web List is used for systems that have the Web filter option enabled in Access Control Enable Entries in the Allowed Web Site List can be activated or deactivated with this checkbox New entries are activated by default Web Site Enter the URL address of the web site that you want to allow such as google com Enter the most inclusive domain name For instance entering dlink com will give you access to www dlink com and support dlink com Do not enter the http preceding the URL Note Many web sites construct pages with images and content from other web sites Access will be forbidden if you do not enable all of the web sites used to construct page For example to access my yahoo com you must enable access to yahoo com yimg com and doubleclick net Save Saves the new or modified Allowed Web Site in the Allowed Web Site List When you are done editing
15. an authentication server The WPA Enterprise option does require a RADIUS authentication server WEP A method of encrypting data for wireless communication intended to provide the same level of privacy as a wired network WEP is not as secure as WPA encryption To gain access to a WEP network you must know the key The key is a string of characters that you create When using WEP you must determine the level of encryption The type of encryption determines the key length 128 bit encryption requires a longer key than 64 bit encryption Keys are defined by entering in a string in HEX hexadecimal using characters 0 9 A F or ASCII American Standard Code for Information Interchange alphanumeric characters format ASCII format is provided so you can enter a string that is easier to remember The ASCII string is converted to HEX for use over the network Four keys can be defined so that you can change keys easily A default key is selected for use on the network Example 64 bit hexadecimal keys are exactly 10 characters in length 12345678FA is a valid string of 10 characters for 64 bit encryption 128 bit hexadecimal keys are exactly 26 characters in length 456FBCDF123400122225271730 is a valid string of 26 characters for 128 bit encryption 64 bit ASCII keys are exactly 5 characters in length DMODE is a valid string of 5 characters for 64 bit encryption 128 bit ASCII keys are exactly 13 characters in length 2002HALOSWINT1 is
16. selected options appear Updates the log details on the screen so it displays any recent activity Clears all of the log contents This option will send a copy of the router log to the email address configured in the Tools gt Email screen This option will save the router to a log file on your computer Network Traffic Stats Refresh Statistics Clear Statistics Updates the screen with the latest router statistics Clears all of the values on the screen 53 Using the Configuration Interface LOG OPTIONS What to Log 7 Firewall amp Security 7 System 7 Gateway Status Logging Levels X critical 7 warning 7 Informational Apply Log Settings Now TN EK EE EN INFO Mon Oct 11 20 29 05 2004 Log viewed by IP address 192 168 0 165 WARN Mon Oct 11 20 04 05 2004 Authentication by IP address 192 168 0 165 Successful INFO Mon Oct 11 19 58 09 2004 Lease 192 168 0 165 renewed by client 000C76586A1B INFO Mon Oct 11 19 58 08 2004 Assigned new lease 192 168 0 165 to client 000C76586A18 INFO Mon Oct 11 19 57 00 2004 Initialization complete starting DHCP server INFO Mon Oct 11 19 56 55 2004 Gateway initialized INFO Mon Oct 11 19 56 53 2004 Allowed Internet access to everyone Status gt Logs D Link Systems Inc LAN Statistics Sent Received TX Packets Dropped RX Packets Dropped Gollisions Errors WAN Statistics Sent Received TX P
17. sensing LAN ports Shamelessly attractive chassis chrome plated front panel hypnotizing blue LEDs 5dBi high gain antenna for exceptional wireless signal Smooth GUI design for seamless device management Protect your wireless data with both Wi Fi Protected Access WPA and 128 bit Wired Equivalent Privacy WEP m Integrated Stateful Packet Inspection SPI firewall and Network Address Translation NAT firewall help protect against hackers wardrivers and other unauthorized users m Create versatile Access Control policies to control network access based on time date websites and or applications m Disable SSID Broadcast and MAC Filtering features help increase your level security to protect against unauthorized access to your wireless network Mm Supports Virtual Private Network VPN pass through to create a secure connection to your day job Maximum wireless signal rate derived from IEEE Standard 802 11a 11b 119 specifications Actual data throughput will vary Network conditions and environmental factors lower actual data throughput rate 8 D Link Systems Inc Hardware Overview Hardware Overview Connections All Ethernet Ports WAN and LAN are auto MDI MDIX meaning you can use either a straight through or a crossover Ethernet cable Antenna Connector for wireless antenna Receptor for the Power Adapter Auto MDI MDIX LAN ports automatically sense the cable type when connecting to Ethernet enabled P
18. the settings you must click the Save Settings button at the top of the page to make the changes effective and permanent Allowed Web Site List This section lists the currently allowed web sites Entries can be modified by clicking on the paper and pencil icon To delete an entry click on the trash can icon After you ve completed all modifications or deletions you must click the Save Settings button at the top of the page to save your changes The router must reboot before new settings will take effect You will be prompted to Reboot the Device or Continue If you need to make additional settings changes click Continue If you are finished with your configuration settings click the Reboot the Device button 38 Using the Configuration Interface ADD WEB SITE Enable Web Site ra EI EI eg waw dink com ALLOWED WEB SITE LIST Enable Web Site Advanced gt Web Filter D Link Systems Inc Mac Address Filters The MAC Media Access Controller Address filter section is used to control network access based on the MAC Address of the network adapter A MAC address is a unigue ID assigned by the manufacturer of a networking device This feature can be configured to ALLOW or DENY network Internet access Filter Settings Enable MAC Address When this is enabled depending on the mode selected computers are Filter granted or denied network access based on their MAC address Mode When Allow is se
19. to a variety of security risks Use of this option is only recommended as a last resort Specify the IP address of the computer on the LAN that you want to have unrestricted Internet communication If this computer obtains it s IP address automatically using DHCP be sure to make a static reservation on the Basic gt DHCP page so that the IP address of the DMZ machine does not change After you ve completed all modifications or deletions you must click the Save Settings button at the top of the page to save your changes The router must reboot before new settings will take effect You will be prompted to Reboot the Device or Continue If you need to make additional settings changes click Continue If you are finished with your configuration settings click the Reboot the Device button 40 Using the Configuration Interface Enable SPI Enable DMZ DMZ IP Address Advanced gt Firewall D Link Systems Inc Using the Configuration Interface Inbound Filters The Inbound Filters option is an advanced method of controlling data received from the Internet With this feature you can configure inbound data filtering rules that control data based on IP Address Protocol and or Port The Inbound Filter option is best suited for custom applications For most applications you should use Virtual Server Special Applications or the Gaming section to create rules that will allow applications to communicat
20. to enter your PPTP IP Address PPTP Subnet Mask PPTP Gateway IP Address PPTP Server IP Address Username and Password provided by your Internet Service Provider to gain access to the Internet PPTP IP Address PPTP Subnet Mask PPTP Gateway IP Address PPTP Server IP Address Username Password Verify Password Maximum Idle Time PPTP Connection Enter the IP Address provided by your ISP Enter the Subnet mask provided by your ISP Enter the Gateway address provided by your ISP Enter the IP Address of the PPTP server you are connecting to information is provided by your ISP The username that you use to login to your Internet connection Enter the password associated with your username Retype the password for verification Using the Configuration Interface Choose the mode to be used by the router to connect to the Internet WAN Mode Use these DNS Servers Primary DNS Server Secondary DNS Server Enter the information provided by your Internet Service Provider ISP PPTP IP Address Thi PPTP Subnet Mask 255 255 255 IS PPTP Gateway IP Address 0 06 PPTP Server IP Address Username Password esen Verily Password lessee Reconnect Mode Maximum Idle Time These buttons wil be enabied after the router reboots with this configuration Basic gt WAN gt PPTP Defines how long the machine can be idle before the PPTP connection is disconnected The Disconnect button
21. will immediately terminate any active connection Note These buttons become enabled after the router has been rebooted with the PPTP mode selected 22 D Link Systems Inc L2TP WAN Mode A method of connection that requires you to enter your L2TP IP Address L2TP Subnet Mask L2TP Gateway IP Address L2TP Server IP Address Username and Password provided by your Internet Service Provider to gain access to the Internet L2TP IP Address L2TP Subnet Mask L2TP Gateway IP Address L2TP Server IP Address User Name Password Verify Password Maximum Idle Time L2TP Gonnection LAN Enter the IP Address provided by your ISP Enter the Subnet mask provided by your ISP Enter the Gateway address provided by your ISP Enter the IP address of the L2TP server you are connecting to This information is provided by your ISP The username that you use to login to your Internet connection Enter the password associated with your username Retype the password for verification Defines how long the machine can be idle before the L2TP connection is disconnected The Disconnect button will immediately terminate any active connection Note These buttons become enabled after the router has been rebooted with the L2TP mode selected Your internal network settings are configured based on the IP Address and Subnet Mask assigned in this section The IP address is also used to access this Web based management interfac
22. 4 D Link Systems Ie Basic gt LAN D Link Systems Inc DHCP The DHCP section is where you configure the built in DHCP Server to assign IP addresses to the computers and other devices on your local area network DHCP Settings Enable DHCP Server DHCP IP Address Range DHCP Lease Time Once your D Link Router is properly configured and this option is enabled the DHCP Server function will assign your network devices the necessary information to connect to the LAN and Internet This eliminates the need to manually configure each device on your network with IP settings Note The devices on your network must have TCP IP bound to the Ethernet connection with the DHCP or Obtain an IP address automatically option enabled This option defines the range of addresses available for the Router to assign to your internal network If you have any devices using static IP addresses be sure the addresses do not fall within the range defined here A Static IP address is one that is entered in manually on the device Example Your D Link Router uses an IP address of 192 168 0 1 You ve assigned 192 168 0 3 You ve assigned another computer designated as an FTP server with a static IP address of 192 168 0 4 The starting IP address for your DHCP server needs to be 192 168 0 5 or above The amount of time a computer may have an IP address before it is required to renew the lease The lease functions just as a lease on an ap
23. DNS if your dynamic IP address has not change The timeout period is entered in hours Note Option will disable it self if Username and Password or keys are incorrect 50 Using the Configuration Interface Enable Dynamic DNS 7 DYNAMIC DNS Server Address DYnDNS org Host Name Username or Key Password or Key Verity Password or Key Timeout 576 hours Tools gt Dynamic DNS D Link Systems Inc Status The Status items are mainly informational Device Info The Device Info page displays your Router settings Options cannot be modified from this page General Time Firmware Version WAN Connection Type MAG Address IP Address Subnet Mask Default Gateway Primary DNS Server Secondary DNS Server LAN MAG Address IP Address Subnet Mask DHCP Server Displays the time and date that the router is set to Displays the currently loaded firmware version The Internet connection type that is being used The MAC address that is seen over the Internet The IP address being used on the WAN port The subnet mask used on the WAN port The default gateway of the WAN port The Primary DNS Server address The Secondary DNS Server address The MAC address displayed for your local area network The IP address of the router on your local area network The subnet mask of the router on your local area network Indicates if the router is acting as a DHCP server on the local a
24. Extensible Authentication Protocol Email Electronic Mail is a computer stored message that is transmitted over the Internet Encryption Converting data into cyphertext so that it cannot be easily read Enterprise Large organizations that use computers Ethernet The most widely used technology for Local Area Networks F Fiber optic A way of sending data through light impulses over glass or plastic wire or fiber File server A computer on a network that stores data so that the other computers on the network can all access it File sharing Allowing data from computers on a network to be accessed by other computers on the network will different levels of access rights Firewall A device that protects resources of the Local Area Network from unauthorized users outside of the local network Firmware Programming that is inserted into a hardware device that tells it how to function Fragmentation Breaking up data into smaller pieces to make it easier to store FTP File Transfer Protocol Easiest way to transfer files between computers on the Internet Full duplex Sending and Receiving data at the same time G Gain The amount an amplifier boosts the wireless signal Gateway A device that connects your network to another like the internet Gbps Gigabits per second Gigabit Ethernet Transmission technology that provides a data rate of 1 billion bits per second Graphical user interface GUI
25. IS LIMITED WARRANTY EVEN IF D LINK HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES THE SOLE REMEDY FOR A BREACH OF THE FOREGOING LIMITED WARRANTY IS REPAIR REPLACEMENT OR REFUND OF THE DEFECTIVE OR NON CONFORMING PRODUCT THE MAXIMUM LIABILITY OF D LINK UNDER THIS WARRANTY IS LIMITED TO THE PURCHASE PRICE OF THE PRODUCT COVERED BY THE WARRANTY THE FOREGOING EXPRESS WRITTEN WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ANY OTHER WARRANTIES OR REMEDIES EXPRESS IMPLIED OR STATUTORY Governing Law This Limited Warranty shall be governed by the laws of the State of California Some states do not allow exclusion or limitation of incidental or consequential damages or limitations on how long an implied warranty lasts so the foregoing limitations and exclusions may not apply This limited warranty provides specific legal rights and the product owner may also have other rights which vary from state to state Trademarks D Link is a registered trademark of D Link Systems Inc Other trademarks or registered trademarks are the property of their respective manufacturers or owners Copyright Statement No part of this publication or documentation accompanying this Product may be reproduced in any form or by any means or used to make any derivative such as translation transformation or adaptation without permission from D Link Corporation D Link Systems Inc as stipulated by the United States Copyright Act of 1976 Contents are subject to chan
26. Internet The step by step guide will prompt you for the necessary information to get you connected The Internet Connection Setup Wizard guides you through the following basic router setup steps To begin click on the Launch Internet Connection Setup Wizard button E The Welcome To The D Link Setup Wizard screen appears click Next to continue m Step 1 Set Your Password prompts you to enter a password for the Web based configuration interface You must also enter the password in the Verify Password prompt m Step 2 Select Your Time Zone prompts you to select your time zone from the pull down menu m Step 3 Configure Your Internet Connection prompts you to select your Internet Service Provider from the pull down menu If your Internet Service Provider is not listed or you do not know who it is you can select the connection type manually 14 Using the Configuration Interface WELCOME TO THE D LINK SETUP WIZARD This wizard will guide you through a step by step process to configure your new D Link router and connect to the Internet Step 1 Set your Password Step 2 Select your Time Zone e Step 3 Configure your Internet Connection Step 4 Save Settings and Connect Ed GE STEP 1 SET YOUR PASSWORD By default your new D Link Router does not have a password configured for administrator access to the Web based configuration pages To secure your new networking device please set and verify a password below Pa
27. PTP Gateway IP Address PPTP Server IP Address Username Password m L2TP A method of connection that requires you to enter informatiom provided by your Internet Service Provider to gain access to the Internet L2TP IP Address L2TP Subnet Mask L2TP Gateway IP Address L2TP Server IP Address Username Password 18 GAMERLOUNGE NE 1001 TT T Using the Configuration Interface Internet Connection Settings Use this secnen to configure your Internet Connection type There are throe connection types to choose frome Static TP DHCD and PPPOE N you wee uname of your connection mathas plane contact your ALTER Service Provider Notes If vang the PEPE option you vel need to remove ary PPPOE dark sofware from your computers lt x WEI Choose the mode to be used by the router to connect to the Internet WAN Mode sie WP O Pot Use these ONS Servers Primary ONS Server Secondary DNS Server i N esse mum OOOO Most Name OP Conmextion TA REET Gikking the Release button above n l release the IP address of this router ding the Bere button wil mmediately renew the IP address of Bas roer Copyright 2004 D Link Systems Ine Basic gt WAN D Link Systems Inc All five modes have some common configuration options The Primary and Secondary DNS Server settings are required for Static configurations and optional for DHCP and PPPoE c
28. SP is blocking Port 80 1 Name the Virtual Server Rule ex Web Server Enter in the IP Address of the machine on your LAN 192 168 0 50 Enter the Private Port as 80 Enter the Public Port as 8888 Select the Protocol TCP Ensure the schedule is set to Always Check the Add Rule to add the settings to the Virtual Server List oN Oo aA BUY N Repeat these steps for each Virtual Server Rule you wish to add After the list is complete click Save Settings at the top of the page With this Virtual Server Rule all Internet traffic on Port 8888 will be redirected to your internal web server on port 80 at IP Address 192 168 0 50 29 Using the Configuration Interface GAMERLOUNGE The Virtual Sarver option allows you bo dafina a single public port on your router For redirection te an internal LAN IP Address and Private LAN port F required This Feature is useful tor hosting online services such as FTP av Web Servers Each Virtual Server rule aniy apples bo the PC with the LAN IP adress spectied for that ADD VIRTUAL SERVER Nene ee Select Vetual Server 9 VIRTUAL SERVERS LIST table Nama IP Address Protocol Ports Schedule Copyright 2004 D Link Systems ine ke a Advanced gt Virtual Server D Link Systems Inc Add Edit Virtual Server Virtual Server Rule IP Address Protocol Private Port Public Port Schedule Save Name of the virtual server such as Web Server The IP
29. WIRELESS SECURITY MODE Security Mode None WEP WPA Personal WPA Enterprse WPA requires stations to use high grade encryption and authentication NOTE WDS will not function with WPA security WPA Mode WPA2 TI Cipher Type TF z Group Key Update Interval 350 seconds PRE SHARED KEY WIRELESS SECURITY MODE Security Mode None WEP C WPa Personal WPA requires stations to use high grade encryption and authentication NOTE WDS will not function with WPA security WPA Mode WPA2 hi Cipher Type PR Group Key Update Interval Meg EAP 802 1X When WPA enterprise Is enabled the router uses EAP 802 1x to authenticate chents via a remote RADIUS server Authentkation Timeout f RADIUS server IP Address RADIUS server Port 1512 RADIUS server Shared Secret radus shared MAC Address Authentication 7 D Link Systems Inc Advanced The Advanced options allow you to configure a variety of advanced features including ports application priority Internet access filters and advanced wireless settings Virtual Server The Virtual Server option gives Internet users access to services on your LAN This feature is useful for hosting online services such as FTP Web or Game Servers For each Virtual Server you define a public port on your router for redirection to an internal LAN IP Address and port Example You are hosting a Web Server on a PC that has Private IP Address of 192 168 0 50 and your I
30. ackets Dropped RX Packets Dropped Gollisions Errors The number of packets transmitted to the local area network The number of packets received from the local area network The number of transmit packets dropped on the local area network The number of receive packets dropped on the local area network The number of collisions on the local area network The number of errors occuring on the local area network The number of packets transmitted to the Internet The number of packets received from the Internet The number of transmit packets sent to the WAN port that were dropped The number of receive packets sent to the WAN port that were dropped The number of collisions involving packets intended for the WAN port The number of errors occuring with packets intended for the WAN port Wireless Statistics Sent Received TX Packets Dropped Errors The number of packets sent to the wireless network The number of packets received from the wireless network The amount of transmit packets dropped The number of errors relating to packets to from the wireless network Active Sessions The Active Session page displays the full details of active sessions to your router 54 Using the Configuration Interface D Link Systems Inc Appendix Securing Your Network 1 Change Admin Password Changing the password to access your new router is the first step in securing your network This can done through the Wiz
31. adband modem If you are using that computer click on the Clone Your PC s MAC Address button and the MAC address is automatically copied If your ISP requires you to enter a Host Name please do so m Set Username and Password Connection PPPoE prompts you to enter your Username and Password You must also verify the Password If your ISP requires a Service Name entry please enter it here E Set Username and Password Connection PPTP prompts you to enter your PPTP IP Address PPTP Subnet Mask PPTP Gateway IP Address PPTP Server IP Address Username and Password You must also verify the Password E Set Username and Password Connection L2TP prompts you to enter your L2TP IP Address L2TP Subnet Mask L2TP Gateway IP Address L2TP Server IP Address Username and Password You must also verify the Password E Set Static IP Address Connection prompts you to enter the IP address Subnet Mask Gateway Address Primary and Secondary DNS address information E Setup Complete will appear after all of the settings have been entered Click Connect to save your settings and reboot the router 15 Using the Configuration Interface DHCP CONNECTION DYNAMIC IP ADDRESS To set up this connection please make sure that you are connected to the D Link Router with the PC that was originally connected to your broadband connection If you are then click the Clone MAC button to copy your computer s MAC Address to the D Link Router MAC Address
32. address of the system on your internal network that will provide the virtual service such as 192 168 0 50 Select the protocol used by the service The port that will be used on your internal network The port that will be accessed from the Internet Select a schedule for when this rule is in effect If you do not see the schedule you need in the list of schedules go to the Tools gt Schedules screen and create a new schedule Saves the new rule or modified existing rule to the Rules list When you are done editing the settings you must click the Save Settings button at the top of the page to make the changes effective and permanent Virtual Servers List Entries on this list can be enabled disabled by toggling the Enable checkbox Entries can be modified by clicking on the paper and pencil icon To delete an entry click on the trash can icon After you ve completed all modifications or deletions you must click the Save Settings button at the top of the page to save your changes The router must reboot before new settings will take effect You will be prompted to Reboot the Device or Continue If you need to make additional settings changes click Continue If you are finished with your configuration settings click the Reboot the Device button 30 Using the Configuration Interface D Link Systems Inc Special Applications The Special Application section is used to open single or multiple ports on your router when the ro
33. anges of IP addresses that have been reserved for use on Private Networks 10 0 0 0 10 255 255 255 10 0 0 0 8 172 16 0 0 172 31 255 255 172 16 0 0 12 192 168 0 0 192 168 255 255 192 168 0 0 16 D Link routers use 192 168 0 1 as their default LAN IP address Choosing an alternate IP address lessens the probabilty of an intruders knowing what IP network your devices are on 55 Using the Configuration Interface D Link Systems Inc 4 Changing the Wireless Network Name SSID used for wireless devices only It is always a good idea to change the wireless network name SSID from the default value Leaving it in the default state is usually a good indication to intruders that all settings including security are probably defaults This setting identifies your wireless network Make sure that the name you choose is not commonly known or something that is easy to guess Try using a combination of letters and numbers to add complexity to it 5 Setthe Visibility Status to Invisible Wireless routers typically broadcast the wireless network name SSID to users attempting to connect to a wireless network By setting the Visibility Status to Invisible all devices attempting to connect to the router will need to know the wireless network name SSID in order to connect 6 Enable WPA Personal or Enterprise Along with changing the wireless network name and setting the visibility status to invisible we highly recommended that you
34. ard or on the Admin Page of the Tools tab There is no password by default and hackers will know this when trying to access your network Make sure that the password you choose is not commonly known or something that is easy to guess such as your last name or your pets name Try using a combination of letters and numbers to deter intruders from hacking into your network Your private information should be kept private 2 Disable DHCP and use Static IP addresses or Use Static DHCP and limit scope to the amount of users on your network Inthe event that an intruder manages to gain access to your network having DHCP enabled makes it easier for the intruder to access other computers on your network There are two methods for getting around this One is to disable DHCP and use static IP addressing on all the devices connected to your network This would mean that the intruder would have to know what IP network your devices are on in order to access them The second way is to change the scope of the DHCP server to only include enough IP addresses for the devices in your network You can then use the Static DHCP feature of the router to assign an IP address to each device on your network Static DHCP still dynamically assigns an IP address to your network devices but only allows for those defined devices to obtain an IP address 3 Change the default LAN IP address Change the default LAN IP address from 192 168 0 1 to an alternate IP address There are 3 r
35. artment would The initial lease designates the amount of time before the lease expires If the tenant wishes to retain the address when the lease expires then a new lease is established If the lease expires and the address is no longer needed then another tenant may use the address Number of Dynamic DHCP Clients In this section you can see what LAN devices are currently leasing IP addresses The DHCP Client table displays the number of clients that are receiving an IP address from the router The computer name MAC address and IP address assigned to each computer are displayed here as well You can Revoke IP addresses in this section The revoke option allows you to tale away a leased IP address from a client This feature is useful for freeing up addresses when the client table is full or nearly full Be sure to only revoke addresses from devices that are no longer needed on the network 24 Using the Configuration Interface Enable DHCP Server 7 DHCP SETTINGS DHCP IP Address Range 100 10 199 addresses within the LAN subnet DHCP Lease Time 184 NUMBER OF DYNAMIC DHCP CLIENTS 1 Computer Name Mutmeda MAC Address 1P Address Enable 7 IP Address Sec Machine MAC Address 00 00 00 00 00 0 a computer designated as a Web server with a static IP address of ties Computer Name Enable Computer Name MAC Address IP Address Basic gt DHCP DHCP Server Enabled V DHCP IP Addre
36. ays but is specifically tied to the Public Ports defined in the Game Rule List This is because you do not want to accidentally block traffic for other applications It is a good idea to turn on the log for this rule so that you can check in the log for anything that is filtered inappropriately Next configure the ALLOW rules In the example on the right two rules are used to cover the three IP addresses Enable Name Action Source IP Protocol Schedule Log orts 7 HALO Allow 67 150 231 1 UDP GAMETIME No CE 2 67 150 231 255 1 65535 2302 2303 7 HALO Allow 67 150 220 117 Any GAMETIME No CE 1 67 150 220 117 1 65535 2302 2303 7 HALO Deny 0 0 0 0 UDP Always Ves CE 255 255 255 255 1 65535 DENY 2302 2303 42 D Link Systems Inc Advanced Wireless Advanced Wireless Settings Fragmentation Threshold RTS Threshold Beacon Period DTIM Interval 802 11d Enable WDS Enable WDS AP MAG Address This setting should remain at its default setting of 3200 If you experience a high packet error rate you may slightly adjust your Fragmentation value somewhere in the between the recommended range of 256 to 3200 Setting the Fragmentation value too low may result in poor performance This setting should remain at its default setting of 3200 If you encounter inconsistent data flow only minor modifications to the value are recommended Beacons are packets sent by a wireless router to synchronize w
37. d shipped in strict compliance with the foregoing requirements or for which an RMA number is not visible from the outside of the package The product owner agrees to pay D Link s reasonable handling and return shipping charges for any product that is not packaged and shipped in accordance with the foregoing requirements or that is determined by D Link not to be defective or non conforming What Is Not Covered This limited warranty provided by D Link does not cover Products if in D Link s judgment have been subjected to abuse accident alteration modification tampering negligence misuse faulty installation lack of reasonable care repair or service in any way that is not contemplated in the documentation for the product or if the model or serial number has been altered tampered with defaced or removed Initial installation installation and removal of the product for repair and shipping costs Operational adjustments covered in the operating manual for the product and normal maintenance Damage that occurs in shipment due to act of God failures due to power surge and cosmetic damage Any hardware software firmware or other products or services provided by anyone other than D Link Products that have been purchased from inventory clearance or liquidation sales or other sales in which D Link the sellers or the liquidators expressly disclaim their warranty obligation pertaining to the product Repair by anyone other than D Link or an Auth
38. de Restore Settings Use this option to load previously saved router configuration settings 44 D Link Systems Inc Time The Time Configuration option allows you to configure update and maintain the correct time on the internal system clock From this section you can set the time zone that you are in and set the Time Server Daylight Saving can also be configured to automatically adjust the time when needed Time Configuration Time Zone Select your local time zone from pull down menu Daylight Saving Enable Check this option if your location observes daylight saving time Daylight Saving Offset Select the time offset if your location observes daylight saving time Synchronize time with Select this option if you want the router s clock synchronized to a Time NTP server Server over the Internet If you are using schedules or logs this is the best way to ensure that the schedules and logs are kept accurate NTP Server Select a Time Server for synchronization You can type in the address of a time server or select one from the list If you have trouble using one server select another Set the Date and Time If you do not have the NTP Server option in effect you can either manually set the time for your router here or you can click the Copy Your Computer s Time Settings button to copy the time from the computer you are using Note Be sure the computer s time is set correctly Note If the router loses power for any reason i
39. e It is recommended that you use the default settings if you do not have an existing network LAN Settings IP Address Default Subnet Mask RIP Announcement Gateway Metric The IP address of the router on the local area network The local network settings are based on the address assigned here The subnet mask of your router on the local area network Used with multiple routers to broadcast routing information This option is used if you have multiple ae Using the Configuration Interface MODES Choose the mode to be used by the router to connect to the Internet WAN Mode Use these DNS Servers Primary DNS Server Secondary DNS Server Enter the information provided by your Internet Service Provider ISP L2TP 1P Address L27P Subnet Mask 255 255 255 LTP Gateway IP Address foo L2TP Server IP Address 0 0 Username Password eesse Maximum Idie Time 5 These buttons wif be enabied after the router reboots with this configuration Basic gt WAN gt L2TP GAMERLOUNGE Use this sedan bo configure your Internal network settings of your router The IP Address that ts configured here n the IP Address that you ue to access the Web based management interface If you da change the dae Adrian you mu raad to DIN your PE E network patting bO access the ratwerk Win lt WEEN si 192 10801 RIP Announcenerk 7 Delmi Subnet Mask 255 296 255 0 Gateway Metric I Copyright 200
40. e and permanent Inbound Filter Rules List This section lists the current Inbound Filter rules Entries can be modified by clicking on the paper and pencil icon To delete an entry click on the trash can icon After you ve completed all modifications or deletions you must click the Save Settings button at the top of the page to save your changes The router must reboot before new settings will take effect You will be prompted to Reboot the Device or Continue If you need to make additional settings changes click Continue If you are finished with your configuration settings click the Reboot the Device button 41 D Link Systems Inc Using the Configuration Interface Configuring an Inbound Filter Rule When the Rule List is empty or none of the rules are enabled all inbound data that corresponds to a connection that originated from inside the router or which corresponds to a Virtual Server Gaming or Special Application Rule is ALLOWED by default When rules are configured the router compares incoming data packets against the rules in the list It is very important to understand that the router examines each rule one by one in the order that they are listed in the Rule list until it finds a match The packet will either be DENIED Dropped or ALLOWED Once a match has been made no further rules will be examined for that packet If no rules match the data packet it is ALLOWED This means that to allow only a specific subset of traffic u
41. e ee 47 VEN 48 System COMMANdS EE EE EE ee 48 El EE OE ER EE EE DE 49 Firmware Information swavesaveravernvernrennrennvernvernvnennvenveenvessvessvessvvesnvene 49 Firmware Upgrade ee ee ee ee AE eek KERR Re ee 49 Table of Contents D Link Systems Inc Table of Contents Firmware Upgrade Notification ODHONS ee ee ee ee ee ee ee 49 Dynamic DNS ee 50 Stalis ME EE EE EE EE E 51 Device EE EE OE EE OE EE EE EEN 51 Bl EE N EE RE EN 51 EEE SN GE 51 EE EE EE RE OE 51 Wireless LA nav 52 NM Saat cat cee teeters seaees crates cneseica eae eee sees een 52 ROUINO EN E E E E dacs 52 SE E AE EE ER TEE 53 LOO 1 EE EE EE ER 53 Log Details RE EE ERE RE EE 53 ESE OO EE OE EE OO EE EE ED OF 53 Network Traffic StatS ees ees see ee RE Re ee Ke Re RR Ee AE Re ee Ee ee ER Ee AE 53 AM hee 1d e SS ro n Ee RR EE GE ee ER oe Ee ie meee ce nen ae 54 VE Se 54 ESS ES GE N EE 54 NM NN 54 AppendiX EE TE EE EE EE 55 Securing Your Network sara N RE EN 55 CYS A AE OE EE EE N epee EE OE eo tesecenei hs 57 Technical Specifications esse se se EER ER EE RE RR ER EE RR ER ER ER EE RE RR ER ER Ee EER ER Ee 67 Contacting Technical Support sisie ee se EE RR ER ER EE EER ER ER EER ER ER ER ER Ee RE RE Re Re ee 69 ETE AE EE EE EE aeaa aaa anaa aa 70 Registration ss ie GR ek cus eas nae ER ER EG Re EE Ee ER wi ee ER aaia 74 5 D Link Systems Inc Package Contents Package Contents D Link DGL 4300 Gam
42. e is entered in two fields The first box is for the hour and the second box is for the minute Email events are triggered only by the start time The end time is entered in the same format as the start time The hour in the first box and the minutes in the second box The end time is used for most other rules but is not used for email events Saves the new or modified Schedule in the Schedule Rules List When you are done editing the settings you must click the Save Settings button at the top of the page to make the changes effective and permanent Schedule Rules List This list displays all of the currently defined schedules Entries can be modified by clicking on the paper and pencil icon To delete an entry click on the trash can icon After you ve completed all modifications or deletions you must click the Save Settings button at the top of the page to save your changes The router must reboot before new settings will take effect You will be prompted to Reboot the Device or Continue If you need to make additional settings changes click Continue If you are finished with your configuration settings click the Reboot the Device button 46 Using the Configuration Interface ADD SCHEDULE RULE Name Day s All Day 24 hrs Start Time End Time O all week select Day s Sun Mon Tue Wed Thu Fri Sat 0 110 AM hour minute 12 hour time AM hourminute 12
43. e ports on your router when the router senses data sent to the Internet on a trigger port or port range Special Applications rules apply to all computers on your internal network Rule Name Trigger Port Range Trigger Port Protocol Input Port Range Input Port Protocol Schedule Save Enter a name for the Special Application Rule for example Game App which will help you identify the rule in the future You can also select from a list of common applications and the remaining configuration values will be filled in accordingly Enter the outgoing port range used by your application Select the outbound protocol used by your application Enter the port range that you want to open up to Internet traffic Select the protocol used by the Internet traffic coming back into the router through the opened port range Select a schedule for when this rule is in effect If you do not see the schedule you need in the list of schedules go to the Tools gt Schedules screen and create a new schedule Saves the new rule or modified existing rule to the Rules list When you are done editing the settings you must click the Save Settings button at the top of the page to make the changes effective and permanent Special Applications Rules List Entries on this list can be enabled disabled by toggling the Enable checkbox Entries can be modified by clicking on the paper and pencil icon To delete an entry click on the trash can icon
44. e through the router Add Edit Inbound Filter Rule Enable Enables inbound filtering ADD INBOUND FILTER RULE Enable V Name Name Enter a name for the rule that is meaningful to you Action Deny v Source IP Range 0 0 0 0 to 255 255 255 255 5 6 f Protocol Any Action The rule can be set to either allow or deny applicable messages Sourcebot awe fi to 66535 Public Port Range 1 to 65535 Schedule Always INBOUND FILTER RULES LIST Enable Name Action Source IP Protocol Ports Schedule Log Source IP Range Defines the range of Internet addresses this rule applies to Log Protocol Select the protocol used for this rule Source Port Range Enter the range of ports that this rule applies to Public Port Range Enter the range of WAN side ports associated with the servers on the LAN that this rule applies to Advanced gt Inbound Filters Schedule Select a schedule for the times when this rule should be in effect If you do not see the schedule you need in the list of schedules go to the Tools gt Schedules screen and create a new schedule Log Check this option if you want the router to add an entry to the log whenever a rule is enforced Save Saves the new rule or modified existing rule to the Rules list When you are done editing the settings you must click the Save Settings button at the top of the page to make the changes effectiv
45. ect the connection type 10 or 100Mbps Respond to WAN Ping This option is disabled by default By disabling the WAN ping the router will not respond to requests from a ping command received via the Internet Pinging public WAN IP addresses is a common method used by hackers to test whether your WAN IP address is valid MAG Cloning Enabled Some ISP s may check your computer s MAC address Each networking device has it s own unique MAC address defined by the hardware manufacturer Some ISP s record the MAC address of the network adapter in the computer used to initially connect to their service The ISP will then only grant Internet access to requests from a computer with this particular MAC address The D Link router has a different MAC address than the computer that initially connected to the ISP To resolve this problem enable this option MAC Address When MAC Cloning is enabled you can enter in a MAC address manually in this field or click the Clone Your Computer s MAC Address button Clone Your PC s MAC When this button is clicked the WAN port will use the MAC Address of the Address network adapter in the computer that you are using to access the router 19 Using the Configuration Interface Choose the mode to be used by the router to connect to the Internet WAN Mode Stat HCP C PPPOE C PPTP C LaTP Use these DNS Servers Primary DNS Server 0 0 0 Secondary DNS Server 0 0 0 Use the defaum MTU 7 MTU
46. ective Hardware All Hardware or part thereof that is replaced by D Link or for which the purchase price is refunded shall become the property of D Link upon replacement or refund Limited Software Warranty D Link warrants that the software portion of the product Software will substantially conform to D Link s then current functional specifications for the Software as set forth in the applicable documentation from the date of original retail purchase of the Software for a period of ninety 90 days Warranty Period provided that the Software is properly installed on approved hardware and operated as contemplated in its documentation D Link further warrants that during the Warranty Period the magnetic media on which D Link delivers the Software will be free of physical defects D Link s sole obligation shall be to replace the non conforming Software or defective media with software that substantially conforms to D Link s functional specifications for the Software or to refund at D Link s sole discretion Except as otherwise agreed by D Link in writing the replacement Software is provided only to the original licensee and is subject to the terms and conditions of the license granted by D Link for the Software Software will be warranted for the remainder of the original Warranty Period from the date or original retail purchase If a material non conformance is incapable of correction or if D Link determines in its sole discret
47. ed as conventional Ethernet network devices 11 Wireless Basics D Link Systems Inc Standards based Technology The DGL 4300 Wireless Broadband Router utilizes the new 802 119 standard The IEEE 802 119 standard is an extension of the 802 11b standard It increases the data rate up to 54Mbps within the 2 4GHz band utilizing OFDM technology This means that in most environments within the specified range of this device you will be able to transfer large files quickly or even watch a movie in MPEG format over your network without noticeable delays This technology works by transmitting high speed digital data over a radio wave utilizing OFDM Orthogonal Frequency Division Multiplexing technology OFDM works by splitting the radio signal into multiple smaller sub signals that are then transmitted simultaneously at different frequencies to the receiver OFDM reduces the amount of crosstalk interference in signal transmissions The DGL 4300 is backwards compatible with 802 11b devices This means that if you have an existing 802 11b network the devices in that network will be compatible with 802 119 devices at speeds of up to 11Mbps in the 2 4GHz range Installation Gonsiderations The D Link DGL 4300 lets you access your network using a wireless connection from virtually anywhere within its operating range Keep in mind however that the number thickness and location of walls ceilings or other objects that the wireless signals m
48. enable some sort of encryption feature There are different methods of securing wireless transmissions but the most effective is WPA Personal and WPA Enterprise WPA Personal is easier to configure but does not offer the extensive level of security that WPA Enterprise does If you have the infrastructure to support WPA Enterprise we recommend that you use this method If not then WPA Personal will suffice 7 Setup MAC Filtering Each networking device router access point wireless card etc on a network contains a unique hexadecimal number that identifies that specific product This number is referred to as a MAC address MAC filtering allows you to create a list of the MAC address of each device on your network and only allows these specific devices to associate with your network With this feature enabled devices attempting to connect to your network with a MAC address that is not in the list you created will be denied access 56 Using the Configuration Interface D Link Systems Inc Glossary A Access Control List ACL Database of network devices that are allowed to access resources on the network Access Point AP Device that allows wireless clients to connect to it and access the network Ad hoc network Peer to Peer network between wireless clients Address Resolution Protocol ARP Used to map MAC addresses to IP addresses so that conversions can be made in both directions ADSL Asymmetric Digital Subscribe
49. erLounge Gaming Router D Link DGL 4300 Gaming Router CD ROM with Manual Power Adapter ie Detachable Antenna ek Rubber Feet Detachable Antenna Cat5 Ethernet Cable Power Adapter 5 0V 2 5A CD ROM with Manual Ethernet Cable Quick Installation Guide Vertical Stands Rubber Feet Vertical Stands Note Using a power supply with a different voltage than the one included with your product will cause damage and void the warranty for this product If any of the above items are missing please contact your reseller Minimum System Requirements m Ethernet Based Cable or DSL Modem To Change Default Settings m PC with E 1 2GHz Processor E 256MB Memory m CD ROM Drive m Ethernet Adapter with TCP IP Protocol Installed E Windows XP 2000 or Mac OS X v10 3 v10 2 v10 1 E Internet Explorer v6 or Netscape Navigator v7 6 D Link Systems Inc Introduction Introduction The D Link GamerLounge DGL 4300 High Speed Wireless Gaming Router is an 802 119 high performance wireless router that supports high speed wireless networking and is designed to provide maximum gaming performance With top notch maximum wireless signal rates of up to 108Mbps and Gigabit Ethernet support for 10 100 1000Mbps LAN connections rest assured enough bandwidth is available for all your gaming needs The DGL 4300 incorporates GameFuel Technology designed to provide the uninterrupted and flawless gaming experience ser
50. es screen and create a new schedule Apply Web Filter With this option enabled the specified system will only have access to the Web sites listed in the Web filter section Log Internet Access If this option is enabled all of the Web sites visited by the specified machine will be logged Filter Ports By clicking the Filter Ports gt gt button you can specify that the rule enables access only to specific IP addresses and ports Save Saves the new or edited access control rule in the Access Control Rules List Repeat the process creating an Access Control Rule for each of the devices on your LAN that needs access to the Internet When finished updating Access Control Rules you must still click the Save Settings button at the top of the page to make changes ee and permanent Using the Configuration Interface Enable Access Control 7 Enable 7 Policy Name i Address Type y IP Address fos SET Machine Copy YourPCs MAC Address y Machine Address Schedule Aways Apply Web Fiter Log Internet Access ACCESS CONTROL RULES LIST Enable Poly Machine Schedule Web Logged Fitering Advanced gt Access Control D Link Systems Inc Access Control Rules List This section shows the current Access Control rules Any device that does not have a rule cannot access the Internet Entries can be modified by clicking on the paper and pencil icon To delete an entry click on the trash can icon After you ve completed
51. ess Network prompts you to select the level of security that you want to use on your wireless network 16 Using the Configuration Interface WELCOME TO THE D LINK WIRELESS SECURITY SETUP WIZARD This wizard will guide you through a step by step process to setup your wireless network and make it secure Step 1 Name your Wireless Network e Step 2 Select a Channel for your Wireless Network Step 3 Secure your Wireless Network Step 4 Set your Wireless Security Password STEP 1 NAME YOUR WIRELESS NETWORK Your wireless network needs a name so it can be easily recognized by wireless clients For security purposes it is highly recommended to change the pre configured network name of default Wireless Network Name SSID default Ea 1 EN STEP 2 SELECT A CHANNEL FOR YOUR WIRELESS NETWORK A wireless network uses specific channels in the 2 4GHz wireless spectrum to handle communication between clients Choosing a clear channel can help optimize the performance and coverage of your wireless network Wireless Channel 2 457 GHz CH10 w I EI EN STEP 3 SECURE YOUR WIRELESS NETWORK In order to protect your network from hackers and unauthorized users its highly recommended you choose one of the folowing wireless network security settings There are three levels of wireless security Good Securty Better Security or Best Securty The level you Choose depends on the security feattres your wireless adap
52. frastructure have proven to be beneficial for many users Wireless users can use the same applications they use on a wired network Wireless adapter cards used on laptop and desktop systems support the same protocols as Ethernet adapter cards People use wireless LAN technology for many different purposes Mobility Productivity increases when people have access to data in any location within the operating range of the WLAN Management decisions based on real time information can significantly improve worker efficiency Low Implementation Costs WLANs are easy to set up manage change and relocate Networks that frequently change can benefit from WLANS ease of implementation WLANS can operate in locations where installation of wiring may be impractical Installation and Network Expansion Installing a WLAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings Wireless technology allows the network to go where wires cannot go even outside the home or office Scalability WLANS can be configured in a variety of topologies to meet the needs of specific applications and installations Configurations are easily changed and range from peer to peer networks suitable for a small number of users to larger infrastructure networks to accommodate hundreds or thousands of users depending on the number of wireless devices deployed Inexpensive Solution Wireless network devices are as competitively pric
53. g clients to communicate across NAT Note that if you want your buddies to call you you should also set up a virtual server for NetMeeting Refer to the Advanced gt Virtual Server page for information on how to set up a virtual server Allows devices and applications using VolP Voice over IP to communicate across NAT Some VolP applications and devices have the ability to discover NAT devices and work around them This ALG may interfere with the operation of such devices If you are having trouble making VolP calls try turning this ALG off Allows Windows Media Player using MMS protocol to receive streaming media from the internet Allows multiple machines on the LAN to connect to their corporate network using the L2TP protocol Allows all of the Windows Messenger functions to work properly through the router 31 Using the Configuration Interface APPLICATION LEVEL GATEWAY ALG CONFIGURATION perp 7 IPSecVPN F RTSP F Messenger Fre F Netmeeting F sip V aol F MMS F Lap F ADD SPECIAL APPLICATIONS RULE Enable F Name Trigger Port Range Trigger Protocol Both gt Input Port Range Input Protocol Bath Schedule Avays gt SPECIAL APPLICATIONS RULES LIST Enable Name Trigger Protocol Ports Input Protocol Ports Schedule Advanced gt Special Applications D Link Systems Inc Add Edit Special Applications Rule The Special Application section is used to open single or multipl
54. ge without prior notice Copyright 2002 by D Link Corporation D Link Systems Inc All rights reserved CE Mark Warning This is a Class B product In a domestic environment this product may cause radio interference in which case the user may be required to take adequate measures FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communication However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures m Reorient or relocate the receiving antenna 7 Increase the separation between the equipment and receiver m Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 7 Consult the dealer or an experienced radio TV technician for help 72 D Link Systems Inc Appendix For detailed warranty outside the United States please contact cor
55. he Device button 39 Using the Configuration Interface Enable MAC Address Fiter 7 FILTER SETTINGS Mode on alow isted machines Firer Wireless Chents 7 Fiter Wired Chents 7 ADD MAC ADDRESS Enable 7 MAC Address ce Sect Machine MAC ADDRESS LIST Deny access to everyone except the machines in this bet Enable MAC Address Advanced gt MAC Address Filter D Link Systems Inc Firewall A firewall protects your network from the outside world The D Link Gaming Router offers a firewall type functionality The SPI feature helps prevent cyber attacks Sometimes you may want a computer exposed to the outside world for certain types of applications If you choose to expose a computer you cam enable DMZ DMZ is short for Demilitarized Zone This option will expose the chosen computer completely to the outside world Firewall Settings Enable SPI Enable DMZ DNZ IP Address SPI Stateful Packet Inspection also known as dynamic packet filtering helps to prevent cyber attacks by tracking more state per session It validates that the traffic passing through the session conforms to the protocol When SPI is enabled the extra state information will be reported on the Status gt Active sessions page If an application has trouble working from behind the router you can expose one computer to the Internet and run the application on that computer Note Placing a computer in the DMZ may expose that computer
56. heir Netware clients and servers to communicate ISP Internet Service Provider a Java A programming language used to create programs and applets for web pages K Kbps Kilobits per second Kbyte Kilobyte Kerberos A method of securing and authenticating requests for services on a network L LAN Local Area Network Latency The amount of time that it takes a packet to get from the one point to another on a network Also referred to as delay LED Light Emitting Diode Legacy Older devices or technology Local Area Network group of computers in a building that usually access files from a server M MAC address A unique hardware address for devices on a Local Area Network MDI Medium Dependent Interface is an Ethernet port for a connection to a straight through cable MDIX Medium Dependent Interface Crossover is an Ethernet port for a connection to a crossover cable Megabit Mb 62 Appendix D Link Systems Inc Megabyte MB Megabits per second Mbps MIB Management Information Base is a set of objects that can be managed by using SNMP Modem A device that Modulates digital signals from a computer to an analog signal in order to transmit the signal over phone lines It also Demodulates the analog signals coming from the phone lines to digital signals for your computer MPPE Microsoft Point to Point Encryption is used to secure data transmissions over PPTP connections
57. hour time E ca Name SCHEDULE RULES LIST Day s Time Frame Tools gt Schedules D Link Systems Inc Syslog This section allows you to archive your log files to a Syslog Server Enable this option to output the router logs to a Syslog Server on your network Enable Logging To Syslog Server Syslog Server IP Address Enter the IP address of the Syslog Server Email The Email feature can be used to send the system log files router alert messages and firmware update notification to your email address Email Settings When this option is enabled router activity logs are e mailed to a designated email address Enable Email Notification From Email address This email address will appear as the sender when you receive a log file or firmware upgrade notification via email To Email address Enter the email address where you want the email sent SMTP Server Address Enter the SMTP server address for sending email Enable Authentication If your SMTP server requires authentication select this option Account Name Enter your account for sending email Password Enter the password associated with the account Verify Password Re type the password associated with the account Email Log When Full or on Schedule On Log Full When this option is selected logs will be sent via email when the log is full On Schedule Selecting this option will send the logs via email according
58. iginal product owner must obtain a Return Material Authorization RMA number from the Authorized D Link Service Office and if requested provide written proof of purchase of the product such as a copy of the dated purchase invoice for the product before the warranty service is provided m After an RMA number is issued the defective product must be packaged securely in the original or other suitable shipping package to ensure that it will not be damaged in transit and the RMA number must be prominently marked on the outside of the package Do not include any manuals or accessoriesi m The customer is responsible for all in bound shipping charges to D Link No Cash on Delivery COD is allowed Products sent COD will either be rejected by D Link or become the property of D Link Products shall be fully insured by the customer D Link will not be held responsible for any packages that are lost in transit to D Link The repaired or replaced packages will be shipped to the customer via UPS Ground or any common carrier selected by D Link with shipping charges prepaid Expedited shipping is available if shipping charges are prepaid by the customer and upon request m Return Merchandise Ship To Address USA 17595 Mt Herrmann Fountain Valley CA 92708 Canada 2180 Winston Park Drive Oakville ON L6H 5W1 Visit http Avww dlink ca for detailed warranty information within Canada D Link may reject or return any product that is not packaged an
59. ion that it is not practical to replace the non conforming Software the price paid by the original licensee for the non conforming Software will be refunded by D Link provided that the non conforming Software and all copies thereof is first returned to D Link The license granted respecting any Software for which a refund is given automatically terminates Non Applicability of Warranty The Limited Warranty provided hereunder for hardware and software of D Link s products will not be applied to and 70 D Link Systems Inc Appendix does not cover any refurbished product and any product purchased through the inventory clearance or liduidation sale or other sales in which D Link the sellers or the liquidators expressly disclaim their warranty obligation pertaining to the product and in that case the product is being sold As Is without any warranty whatsoever including without limitation the Limited Warranty as described herein notwithstanding anything stated herein to the contrary Submitting A Claim The customer shall return the product to the original purchase point based on its return policy In case the return policy period has expired and the product is within warranty the customer shall submit a claim to D Link as outlined below m The customer must submit with the product as part of the claim a written description of the Hardware defect or Software nonconformance in sufficient detail to allow D Link to confirm the same m The or
60. ious online gamers expect The DGL 4300 s high performance CPU supports up to 6000 concurrent connections making it ideal for P2P applications and multiplayer interactivity Maximum wireless signal rate derived from IEEE Standard 802 11a 11b 11g specifications Actual data throughput will vary Network conditions and environmental factors lower actual data throughput rate 7 D Link Systems Inc Features and Benefits Features and Benefits Loaded with game centric features boasting maximum flexibility for configuration and performance m Designed for the Gamers Network m GameFuel Priority powered platform delivers fully loaded features boosting network efficiency and performance Mm Enhanced wireless technology for optimal range and connectivity up to 108Mbps m High Performance CPU ideal for P2P applications and multiplayer interactivity Automatically prioritizes and intelligently manages network traffic to better execute bandwidth sensitive applications such as VolP and multimedia streaming Enables multi tasking between other applications without degradation in game connection Pre configured ports to accommodate up to 256 policies for games and applications Customizable settings to add or modify new applications or game configurations New firmware upgrade notification keeps your D Link Gaming Router up to date Next Generation hardware with one Fast Ethernet 10 100 WAN port and four Gigabit Ethernet 10 100 1000 auto
61. ireless devices Specify a Beacon Period value between 20 and 1000 The default value is set to 100 milliseconds The default value is set to 1 Valid settings are between 1 and 255 A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages When the wireless router has buffered broadcast or multicast messages for associated clients it sends the next DTIM with a DTIM Interval value Wireless clients hear the beacons and awaken to receive the broadcast and multicast messages This enables 802 11d opration 802 11d is a wireless specification developed to allow implementation of wireless networks in countries that cannot use the 802 11 standard This feature should only be enabled if you are in a country that requires it When WDS is enabled this access point functions as a wireless bridge and is able to wirelessly communicate with other AP s via WDS links Note WDS is incompatible with WPA Both features cannot be used at the same time A WDS link is bidirectional so this AP must know the MAC address creates the WDS link of the other AP and the other AP must have a WDS link back to this AP the router Specifies one half of the WDS link The other AP must also have the MAC address of this AP the router to create the WDS link back to the router 43 Using the Configuration Interface ADVANCED WIRELESS SETTINGS Fragmentation Threshold RTS Threshold Beacon Period DTIM I
62. its per second that can be transmitted to and from a network device Basic Input Output System BIOS A program that the processor of a computer uses to startup the system once it is turned on Baud Data transmission speed Bit rate The amount of bits that pass in given amount of time bit sec bits per second BOOTP Bootstrap Protocol Allows for computers to be booted up and given an IP address with no user intervention Bottleneck A time during processes when something causes the process to slowdown or stop all together Broadband A wide band of frequencies available for transmitting data Broadcast Transmitting data in all directions at once Browser A program that allows you to access resources on the web and provides them to you graphically C Cable modem device that allows you to connect a computer up to a coaxial cable and receive Internet access from your Cable provider CardBus newer version of the PC Card or PCMCIA interface lt supports a 32 bit data path DMA and consumes less voltage Carrier Sense Multiple Access Collision Avoidance CSMA CA Carrier Sense Multiple Access Collision Detect CSMA CD CAT 5 Category 5 Used for 10 100 Mbps or 1Gbps Ethernet connections Client A program or user that requests data from a server Collision When do two devices on the same Ethernet network try and transmit data at the exact same time Cookie Information that is stored on the ha
63. lected only computers with MAC addresses listed in the MAC Address List are granted network access When Deny is selected any computer with a MAC address listed in the MAC Address List Filter Wireless Clients When this is selected the MAC address filters will be applied to wireless network clients Filter Wired Clients When this is selected the MAC address filters will be applied to wired network clients Add MAG Address Enable MAC address entries are activated or deactivated with this checkbox MAG Address Enterthe MAC address of the desired computer or connect to the router from the desired computer and click Copy Your PC s MAC Address button Save Saves the new or modified MAC address in the MAC Address List When you are done editing the settings you must click the Save Settings button at the top of the page to make the changes effective and permanent MAG Address List This section lists the current MAC address filters Entries can be modified by clicking on the paper and pencil icon To delete an entry click on the trash can icon After you ve completed all modifications or deletions you must click the Save Settings button at the top of the page to save your changes The router must reboot before new settings will take effect You will be prompted to Reboot the Device or Continue If you need to make additional settings changes click Continue If you are finished with your configuration settings click the Reboot t
64. low of messages whose LAN side port number is within the range set here The rule applies to a flow of messages whose WAN side IP address is within the range set here The rule applies to a flow of messages whose WAN side port number is within the range set here Saves the new rule or modified existing rule to the Rules list When you are done editing the settings you must click the Save Settings button at the top of the page to make the changes effective and permanent GameFuel Rules List Entries on this list can be enabled disabled by toggling the Enable checkbox Entries can be modified by clicking on the paper and pencil icon To delete an entry click on the trash can icon After you ve completed all modifications or deletions you must click the Save Settings button at the top of the page to save your changes The router must reboot before new settings will take effect You will be prompted to Reboot the Device or Continue If you need to make additional settings changes click Continue If you are finished with your configuration settings click the Reboot the Device button 35 Priority Protocol Using the Configuration Interface Source IP Range 0 0 Source Port Range fi Destination IP Range fo Destination Port Range GAMEFUEL RULES LIST Enable Name Priority Source IP Range Destination Protocol Ports IP Range D Link Systems Inc Using the Configuration Interface Routing Add Edit Route
65. mware Version options to the factory defaults Before performing the Tools gt Admin screen hav To upgrade the firm ur OC t have a wired connection to the router Enter the name of the firmware upgrade file and cick on the Upload button Upload Browse FIRMWARE UPGRADE NOTIFICATION OPTIONS Automatically Check Online for Email Notification of Newer Latest Firmware Version 7 Firmware Version Tools gt Firmware D Link Systems Inc Dynamic DNS The DDNS feature allows you to host a server Web FTP Game Server etc using a domain name that you have purchased www whateveryournameis com with your dynamically assigned IP address Most broadband Internet Service Providers assign dynamic changing IP addresses Using a DDNS service provider your friends can enter in your domain name to connect to your server no matter what your IP address is Enable Dynamic DNS Server Address Host Name Username or Key Password or Key Verify Password or Key Timeout Enable this option only if you have purchased your own domain name and registered with a dynamic DNS service provider Select a dynamic DNS service provider from the pull down list Enter your host name Enter the username or key provided by your service provider Enter the password or key provided by your service provider Re type the password or key provided by your service provider The time between periodic updates to the Dynamic
66. nd performance To check for the latest firmware click the Check Online Now button If you would like to be notified when new firmware is released place a checkmark in the box next to Email Notification of Newer Firmware Version Firmware Information This section displays the Current Firmware Version and the Latest Firmware Version To verify the latest firmware version the gaming router checks the Internet To check for the latest version click the Check Online Now for Latest Firmware Version button Firmware Upgrade To upgrade the firmware follow these steps 1 Click the Browse button to locate the D Link upgrade file on your computer 2 Once you have found the file to be used click the Upload button below to start the firmware upgrade process 3 Wait for the router to reboot 4 Confirm updated firmware revision on status page Firmware Version 1 3 18 Mar 2005 Firmware Upgrade Notification Options Automatically Check When this option is enabled your router will check online periodically to Online for Latest see if a newer version of the firmware is available Firmware Version Email Notification of Newer Firmware Version When this option is enabled an email will be sent to the email address configured in the email section whenever new firmware is available 49 Using the Configuration Interface FIRMWARE INFORMATION Current t Firmware Version 13 Latest Firmware Version 1 Check Online Now for Latest Fir
67. ng table are sent to all the other routers in the network as opposed to sending the entire routing table at a regular interval which is how RIP functions 63 Appendix D Link Systems Inc P Password A sequence of characters that is used to authenticate requests to resources on a network Personal Area Network The interconnection of networking devices within a range of 10 meters Physical layer The first layer of the OSI model Provides the hardware means of transmitting electrical signals on a data carrier PoE Power over Ethernet is the means of transmitting electricity over the unused pairs in a category 5 Ethernet cable POP 3 Post Office Protocol 3 is used for receiving email PPP Point to Point Protocol is used for two computers to communicate with each over a serial interface like a phone line PPPoE Point to Point Protocol over Ethernet is used to connect multiple computers to a remote server over Ethernet PPTP Point to Point Tunneling Protocol is used for creating VPN tunnels over the Internet between two networks Preamble Used to synchronize communication timing between devices on a network Q QoS Quality of Service R RADIUS Remote Authentication Dial In User Service allows for remote users to dial into a central server and be authenticated in order to access resources on a network Rendezvous Apple s version of UPnP which allows for devices on a network to disco
68. noryptioe WPA SSK TKIP Bu kroen as WER Personal Pro Shared Key VER Tr D Link Systems Inc WAN The WAN section is where your Internet Connection mode is selected Your Internet Service Provider ISP determines the type of connection that you use Modes There are five connection modes to choose from as shown below If you are unsure of your connection settings contact your Internet Service Provider ISP and you can enter the necessary information on the QIG or print this page and write the settings for future reference Primary DNS Server Secondary DNS Server m Static Used when your ISP provides you a set IP address that does not change The IP information is manually entered in your IP configuration settings IP Address Subnet Mask Default Gateway m DHCP A method of connection where the ISP assigns your IP address when your computer requests one from the ISP s server Some ISP s require you to make some settings on your side before your computer can connect to the Internet Host Name E PPPoE A method of connection that requires you to enter a Username and Password provided by your Internet Service Provider to gain access to the Internet Username Password Service Name Optional m PPTP A method of connection that requires you to enter information provided by your Internet Service Provider to gain access to the Internet PPTP IP Address PPTP Subnet Mask P
69. ns Infrastructure In terms of a wireless network this is when wireless clients use an Access Point to gain access to the network Internet A system of worldwide networks which use TCP IP to allow for resources to be accessed from computers around the world Internet Explorer A World Wide Web browser created and provided by Microsoft Internet Protocol The method of transferring data from one computer to another on the Internet Internet Protocol Security IPsec provides security at the packet processing layer of network communication Internet Service Provider An ISP provides access to the Internet to individuals or companies Interoperability The ability for products to interact with other products without much customer interaction Intranet A private network 61 Appendix D Link Systems Inc Intrusion Detection A type of security that scans a network to detect attacks coming from inside and outside of the network IP Internet Protocol IP address A 32 bit number when talking about Internet Protocol Version 4 that identifies each computer that transmits data on the Internet or on an Intranet IPsec Internet Protocol Security IPv6 Internet Protocol Version 6 uses 128 bit addresses and was developed to solve the problem that we face of running our of IP version 4 addresses IPX Internetwork Packet Exchange is a networking protocol developed by Novel to enable t
70. nterval 802 11d Enable WDS Enable WDS AP MAC Address 3200 256 65535 3200 1 65535 Seas SPE 100 1 65535 1 1 255 Leave blank to disable WDS for that slot Advanced gt Advanced Wireless D Link Systems Inc Using the Configuration Interface Tools Admin The Admin option is used to set a password for access to the Web based management By default there is no password configured lt is highly recommended that you create a password to keep your new router secure Please enter the same password into both boxes for confirmation Password mn f Password Enter a password the will grant access to the Web based management Gateway Name interface cne nanoa nomga I Administration SAVE AND RESTORE CONFIGURATION Browse Gateway Name The name of the router can be changed here Enable Remote Enabling this allows you to manage the router from anywhere with an ra Management Internet connection Tools gt Admin Remote Management The port that will be accessed from the Internet Server Port Admin Idle Timeout The amount of time before the administration session is closed when there is no activity Note This applies to local or remote administration Save and Restore Configuration Save Settings This option allows you to save the router configuration to a file on your computer Be sure to save the configuration before performing a firmware upgra
71. om material defects in workmanship and materials from the date of original retail purchase of the product for the period set forth below applicable to the product type Warranty Period except as otherwise stated herein 1 Year Limited Warranty for the Product s is defined as follows Hardware excluding power supplies and fans One 1 Year Power Supplies and Fans One 1 Year m Spare parts and spare kits Ninety 90 days D Link s sole obligation shall be to repair or replace the defective Hardware during the Warranty Period at no charge to the original owner or to refund at D Link s sole discretion Such repair or replacement will be rendered by D Link at an Authorized D Link Service Office The replacement Hardware need not be new or have an identical make model or part D Link may in its sole discretion replace the defective Hardware or any part thereof with any reconditioned product that D Link reasonably determines is substantially equivalent or superior in all material respects to the defective Hardware Repaired or replacement Hardware will be warranted for the remainder of the original Warranty Period from the date of original retail purchase If a material defect is incapable of correction or if D Link determines in its sole discretion that it is not practical to repair or replace the defective Hardware the price paid by the original purchaser for the defective Hardware will be refunded by D Link upon return to D Link of the def
72. onfigurations The Advanced options on the following page can be modified for any of the five connection modes You should be able to get the Primary DNS and Secondary DNS Servers settings from your router configuration settings ISP or your network administrator Only the primary DNS server address is required though it is best to have both the primary and secondary addresses Advanced The Advanced options apply to all WAN modes Use the Default MTU This option is enabled by default allowing the router to select the typical MTU settings for the selected WAN interface If this option is unchecked the router will use the value assigned in the MTU field MTU The MTU Maximum Transmission Unit is a parameter that determines the largest packet size in bytes that the router will send to the WAN If LAN devices send larger packets the router will break them into smaller packets Ideally you should set this to match the MTU of the connection to your ISP Typical values are 1500 bytes for an Ethernet connection and 1492 bytes for a PPPoE connection If the router s MTU is set too high packets will be fragmented downstream If the router s MTU is set too low the router will fragment packets unnecessarily and in extreme cases may be unable to establish some connections In either case network performance can suffer WAN Port Speed The WAN Port Speed is set to auto by default If you have trouble connecting the WAN port you can sel
73. ord eeose SET STATIC IP ADDRESS CONNECTION To set up this connection you will need to have a complete list of IP information provided by your Internet Service Provider If you have a Static IP connection and do not have this information please contact your ISP IP Address 0 0 0 0 Subnet Mask 255 255 255 0 Gateway Address 0 0 0 0 Primary DNS Address 0 0 0 0 Secondary DNS Address 0 0 0 0 optional I ks EN SETUP COMPLETE The Setup Wizard has completed Click the Connect button to save your settings and reboot the router D Link Systems Inc Wireless Security Setup Wizard The Wireless Security Setup Wizard will assist you with setting up your wireless network The step by step guide will ask you for the necessary information to secure your wireless network The Wireless Security Setup Wizard guides you through the following steps To begin click on the Launch Wireless Security Setup Wizard button m The Welcome To The D Link Wireless Security Setup Wizard screen appears click Next to continue E Step 1 Name Your Wireless Network prompts you to enter a wireless network name for your network This name is also referred to as SSID For security purposes it is highly recommended that you do not use the default name E Step 2 Select A Channel for your Wireless Network prompts you to select the channel that will be used by your router to communicate to wireless devices m Step 3 Secure Your Wirel
74. orized D Link Service Office will void this Warranty 71 D Link Systems Inc Appendix Disclaimer of Other Warranties EXCEPT FOR THE LIMITED WARRANTY SPECIFIED HEREIN THE PRODUCT IS PROVIDED AS IS WITHOUT ANY WARRANTY OF ANY KIND WHATSOEVER INCLUDING WITHOUT LIMITATION ANY WARRANTY OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE AND NON INFRINGEMENT IF ANY IMPLIED WARRANTY CANNOT BE DISCLAIMED IN ANY TERRITORY WHERE A PRODUCT IS SOLD THE DURATION OF SUCH IMPLIED WARRANTY SHALL BE LIMITED TO NINETY 90 DAYS EXCEPT AS EXPRESSLY COVERED UNDER THE LIMITED WARRANTY PROVIDED HEREIN THE ENTIRE RISK AS TO THE QUALITY SELECTION AND PERFORMANCE OF THE PRODUCT IS WITH THE PURCHASER OF THE PRODUCT Limitation of Liability TO THE MAXIMUM EXTENT PERMITTED BY LAW D LINK IS NOT LIABLE UNDER ANY CONTRACT NEGLIGENCE STRICT LIABILITY OR OTHER LEGAL OR EQUITABLE THEORY FOR ANY LOSS OF USE OF THE PRODUCT INCONVENIENCE OR DAMAGES OF ANY CHARACTER WHETHER DIRECT SPECIAL INCIDENTAL OR CONSEQUENTIAL INCLUDING BUT NOT LIMITED TO DAMAGES FOR LOSS OF GOODWILL LOSS OF REVENUE OR PROFIT WORK STOPPAGE COMPUTER FAILURE OR MALFUNCTION FAILURE OF OTHER EQUIPMENT OR COMPUTER PROGRAMS TO WHICH D LINK S PRODUCT IS CONNECTED WITH LOSS OF INFORMATION OR DATA CONTAINED IN STORED ON OR INTEGRATED WITH ANY PRODUCT RETURNED TO D LINK FOR WARRANTY SERVICE RESULTING FROM THE USE OF THE PRODUCT RELATING TO WARRANTY SERVICE OR ARISING OUT OF ANY BREACH OF TH
75. ot classified automatically GameFuel Setup This option is disabled by default Enable this option for better performance BERE Enable GameFuel Enable Gamefuel 7 and experience with online games and other interactive applications such as VoIP Automatic This option is enabled by default when the GameFuel option is enabled mane meets F Classification This option will allow your router to automatically determine which programs annet TEE A should have network priority AE Dynamic This option should be enabled when you have a slot Internet uplink Ithelps Fragmentation to reduce the impact that large low priority network packets can have on more urgent ones Advanced gt GameFuel Automatic Uplink This option is enabled by default when the GameFuel option is enabled Speed This option will allow your router to automatically determine the uplink speed of your Internet connection Measured Uplink Speed This displays the detected uplink speed Uplink Speed The speed at which data can be transferred from the router to your ISP This is determined by your ISP ISP s often speed as a download upload pair For example 1 5Mbits 284Kbits Using this example you would enter 284 Alternatively you can test your uplink speed with a service such as www dslreports com Connection Type By default the router automatically determines whether the underlying connection is an xDSL Frame relay network or some other connection type s
76. oute vinn Re DE ee ER Ee EE Re Re 36 ME ee IE EO N DE EL OP EO OE NE EE 36 MN 37 ep ie se 37 Add Edit Access Control Rule ese ee ee ee ee ee Re ee RE 37 Access Control Rules List ee ee ee ee ee ee ee ee ee ee ee ee ee Ee ee 38 MT 38 Add Edit Web Site sansene es os ee Pl 38 Allowed Web Site List ee ee ee MED 38 Table of Contents D Link Systems Inc Eg AE EE 39 El ES ig OE N GE EE base aaenautasonsucectenmatancteancie 39 Add MAL AN SG 39 MAG Address LS ve 39 TT EE TE EE 40 EE LT NE AE EE N N 40 Inbound SR OE AE Ed OR 41 Add Edit Inbound Filter Rule sscssccssssessssssessesssessesssessesaeeaes 41 Inbound Filter Rules LIST Ese ERA ek es ee sk Ee ee KEER Se 41 Configuring an Inbound Filter Rule ee ee ee ee ee ee ee ee ee ee ee ee 42 Advanced JER 43 Advanced Wireless SettingS cscsscssssssssessssssessesssessesseessesseeaes 43 Te 44 TREE NE EE E 44 SE SEE oes aa Ee Ge oe Ge ak ea 44 Administration Vase 44 Save and Restore Configuration r roresrrrnrrnrorrrrnrorrrrnvrnvornrrnvervornvennenn 44 Me 45 Time Se Mel ia oi OE RR EO EN 45 Set the Date and Time unne Mee seedet ee ee Ee ee 45 Schedules EE RE ER N 46 Add Edit Schedule Rule ese ee se ee Re Re Re AA RA AE AR RR AR RR AR Re Ee 46 Schedule Rules SE ese ee ee eo n ee ed 46 EA ES ES A EE GR EN a 47 EET EEE EE NE AA N OE EN 47 Email Settings RE EE RT 47 Email Log When Full or on Schedule ee ee ee ee ee e
77. ovided to create the security key om EN EN SETUP COMPLETE Below is a detailed summary of your wireless security settings Please print this page out or write the information on a piece of paper so you can configure the correct settings on your wireless client adapters Wireless Network Name SSID default Encryption WPA PSK TKIP also known as WPA Personal Pre SharedKey qLQK22dvxC mH EY EY SETUP COMPLETE Below is a detailed summary of your wireless security settings Please print this page out or write the information on a piece of paper so you can configure the correct settings on your wireless client adapters Wireless Network Name SSID default Encryption WPA PSK TKIP also known as WPA Personal Pre Shared Key nlOK22dvxC SETUP COMPLETE Below is a detailed summary of your wireless security settings Please print this page out or write the information on a piece of paper so you can configure the correct settings on your wireless client adapters Wireless Network Name SSID Wep Key Length 128 bits Default WEP Key toUse 1 Authentication Open Wep Key ASBB3 99449 6D1F2 BED29 01466 0 EA KEN EN default SETUP COMPLETE Below b a detailed summary of your wireless securty settings Please print this page out or write the information on piece of paper 0 you can Configure the correct settings on your wireless chent adapters Wireless Network Name ut y ssp U
78. r the duration of the warranty period on this product U S and Canadian customers can contact D Link technical support through our web site or by phone Tech Support for customers within the United States D Link Technical Support over the Telephone 877 453 5465 24 hours a day seven days a week D Link Technical Support over the Internet http support dlink com email support dlink com Tech Support for customers within Canada D Link Technical Support over the Telephone 800 361 5265 Monday to Friday 7 30am to 12 00am EST D Link Technical Support over the Internet http support dlink ca email support dlink ca When contacting technical support please provide the following information m Serial number of the unit Mm Model number or product name m Software type and version number 69 Appendix D Link Systems Inc Appendix Warranty Subject to the terms and conditions set forth herein D Link Systems Inc D Link provides this Limited warranty for its product only to the person or entity that originally purchased the product from C D Link or its authorized reseller or distributor and Products purchased and delivered within the fifty states of the United States the District of Columbia U S Possessions or Protectorates U S Military Installations addresses with an APO or FPO Limited Warranty D Link warrants that the hardware portion of the D Link products described below will be free fr
79. r Line Advanced Encryption Standard AES Government encryption standard Alphanumeric Characters A Z and 0 9 Antenna Used to transmit and receive RF signals AppleTalk A set of Local Area Network protocols developed by Apple for their computer systems AppleTalk Address Resolution Protocol AARP Used to map the MAC addresses of Apple computers to their AppleTalk network addresses so that conversions can be made in both directions Application layer 7th Layer of the OSI model Provides services to applications to ensure that they can communicate properly with other applications on a network ASCII American Standard Code for Information Interchange This system of characters is most commonly used for text files Attenuation The loss in strength of digital an analog signals The loss is greater when the signal is being transmitted over long distances Authentication To provide credentials like a Password in order to verify that the person or device is really who they are claiming to be Automatic Private IP Addressing APIPA An IP address that a Windows computer will assign itself when it is configured to obtain an IP address automatically but no DHCP server is available on the network 57 Appendix D Link Systems Inc Backward Compatible The ability for new devices to communicate and interact with older legacy devices to guarantee interoperability Bandwidth The maximum amount of bytes or b
80. rd drive of your computer that holds your preferences to the site that gave your computer the cookie CSMA CA Carrier Sense Multiple Access Collision Avoidance CSMA CD Carrier Sense Multiple Access Collision Detection 58 Appendix D Link Systems Inc D Data Information that has been translated into binary do that it can be processed or moved to another device Data Encryption Standard Uses a randomly selected 56 bit key that must be known by both the sender and the receiver when information is exchanged Data Link layer The second layer of the OSI model Controls the movement of data on the physical link of a network Database Organizes information so that it can be managed updated as well as easily accessed by users or applications DB 25 A 25 ping male connector for attaching External modems or RS 232 serial devices DB 9 A 9 pin connector for RS 232 connections dBd decibels related to dipole antenna dBi decibels relative to isotropic radiator dBm decibels relative to one milliwatt Decrypt To unscramble an encrypted message back into plain text Default A predetermined value or setting that is used by a program when no user input has been entered for this value or setting Demilitarized zone DMZ A single computer or group of computers that can be accessed by both users on the Internet as well as users on the Local Network but that is not protected by the same security as the Local Ne
81. rea network 51 Using the Configuration Interface Time Saturday Firmware Version 1 Connection Type OHC gt MAC Address 00 11 95 08 0 02 IP Address 0 0 Subnet Mask 0 0 Default Gateway 000 Primary DNS Server 0 0 Secondary DNS Server Bigpond Server Dsabled MAC Addresss 00 11 95 88 68 0 IP Address Subnet Mask 255 255 255 DHCP Server Enabled WIRELESS LAN Wireless Radio MAG Address 00 0F A3 1A 05 P9 Network Name SSID detst Channel lt Turbo Mode Enabled Security Type WER Persons Status gt Device Info D Link Systems Inc Wireless LAN Wireless Radio Indicates whether wireless networking is on or off MAC Address The MAC address displayed for your wireless network Network Name SSID The Network Name also referred to as SSID of your wireless network Channel The channel being used by the router for broadcasting on the wireless network Turbo Mode Indicates whether Turbo Mode is enabled or disabled Security Type Indicates the type of wireless security being used Wireless This screen displays the number of wireless clients that are connected to the router the MAC address of each system connecting wirelessly and the IP address of each system connecting wirelessly Routing This page displays the routing details configured for the router A gateway value of 0 0 0 0 means there is no next hop The IP address is directly connected to the router on the in
82. responding local D Link office FCC Caution The manufacturer is not responsible for any radio or TV interference caused by unauthorized modifications to this equipment such modifications could void the user s authority to operate the equipment 1 The devices are restricted to indoor operations within the 5 15 to 5 25GHz range 2 For this device to operate in the 5 15 to 5 25GHz range the devices must use integral antennas This device complies with Part 15 of the FCC Rules Operation is subject to the following two conditions 1 This device may not cause harmful intl IMPORTANT NOTE FCC Radiation Exposure Statement This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment The antenna s used for this equipment must be installed to provide a separation distance of at least eight inches 20 cm from all persons This equipment must not be operated in conjunction with any other antenna 73 D Link Systems Inc Appendix Registration Bester your product online at http support dlink com register Product registration is entirely voluntary and failure to complete or return this form will not diminish your warranty rights 74 D Link Systems Inc
83. ressing the Reset Button computers restores the router to its original factory default The Auto MDI MDIX WAN settings port is the connection for the Ethernet cable to the Cable or DSL modem 9 D Link Systems Inc Hardware Overview LEDs LOCAL NETWORK LEDs A solid light indicates a connection to an Ethernet enabled computer on ports 1 4 This LED blinks during data WLAN LED This LED will blink to indicate activity on the wireless network POWER LED WAN LED A solid light indicates a proper A solid light indicates connection on the WAN connection to the power supply port This LED blinks during data transmission 10 D Link Systems Inc Wireless Basics D Link wireless products are based on industry standards to provide easy to use and compatible high speed wireless connectivity within your home business or on public access wireless networks D Link wireless products will allow you access to the data you want when and where you want it You will be able to enjoy the freedom that wireless networking brings A WLAN is a cellular computer network that transmits and receives data with radio signals instead of wires WLANS are used increasingly in both home and office environments and public areas such as airports coffee shops and universities Innovative ways to utilize WLAN technology are helping people to work and communicate more efficiently Increased mobility and the absence of cabling and other fixed in
84. rface that allows for secure connections to remote computers 92 SID Service Set Identifier is a name for a wireless network Stateful inspection A feature of a firewall that monitors outgoing and incoming traffic to make sure that only valid responses to outgoing requests for incoming packets are allowed to pass though the firewall Subnet mask Determines what portion of an IP address designates the Network and which part designates the Host T TCP Transmission Control Protocol TCP IP Transmission Control Protocol Internet Protocol TFTP Trivial File Transfer Protocol is a utility used for transferring files that is simpler to use than FTP but with less features Throughput The amount of data that can be transferred in a given time period Traceroute A utility displays the routes between you computer and specific destination U UDP User Datagram Protocol UNC Universal Naming Convention allows for shares on computers to be identified without having to know what storage device it s on 65 Appendix D Link Systems Inc Unicast Communication between a single sender and receiver Universal Plug and Play A standard that allows network devices to discover each other and configure themselves to be a part of the network UPnP Universal Plug and Play URL Uniform Resource Locator is a unique address for files accessible on the Internet UTP Unshielded Twisted Pair V
85. s The pass phrase is used to generate session keys that are unique for each wireless client The encryption algorithm used to secure the data communication TKIP Temporal Key Integrity Protocol provides per packet key generation and is based on WEP AES Advanced Encryption Standard is a very secure block based encryption The amount of time before the group key used for broadcast and multicast data is changed This option works with a RADIUS server to authenticate wireless clients Wireless clients should have established the necessary credentials before attempting to authenticate to the Server through the Gateway Furthermore the RADIUS Server may need to be configured to allow this Gateway to authenticate users Gipher Type Group Key Update Interval Authentication Timeout RADIUS Server IP Address RADIUS Server Port RADIUS Server Shared Secret MAC Address Authentication The method in which the pre shared key is changed The amount of time before the group key used for broadcast and multicast data is changed Amount of time before a client is required to re authenticate The IP address of the authentication server The port number used to connect to the authentication server A passphrase that must much with the authentication server If this is selected then the user will need to connect from the same computer whenever logging into the wireless network 28 Using the Configuration Interface
86. sing through a router from one network to another If there is only one router between your network and the Destination network then the Metric value would be 1 Save Saves the new rule or modified existing rule to the Rules list When you are done editing the settings you must click the Save Settings button at the top of the page to make the changes effective and permanent Route List This section shows the current routing table entries Certain required routes are predefined and cannot be changed Entries on this list that can modified can be enabled disabled by toggling the Enable checkbox Editable entries can be modified by clicking on the paper and pencil icon To delete an editable entry click on the trash can icon After you ve completed all modifications or deletions you must click the Save Settings button at the top of the page to save your changes The router must reboot before new settings will take effect You will be prompted to Reboot the Device or Continue If you need to make additional settings changes click Continue If you are finished with your configuration settings click the Reboot the Device button 36 D Link Systems Inc Access Control The Access Control section allows you to control access in and out of your network Use this feature as Parental Controls to only grant access to approved sites limit web access based on time or dates and or block access from applications like P2P utilities or games Enabled
87. ss Range 100 to 199 addresses within the LAN subnet DHCP Lease Time 1440 minutes D Link Systems Inc Add Static DHCP Client Static DHCP Clients receive the same IP address all the time This is almost the same as if a device has a static IP address except that it must still actually request an IP address from the D Link Router The D Link Router will provide the device the same IP address all the time Servers on your network should either use a static IP address or this option To input the MAC address of your system enter it in manually or connect to the D Link Router s Web Management interface from the system and click the Copy Your PC s MAC Address button A MAC address is usually located on a sticker on the bottom of a network device The MAC address is comprised of twelve digits Each pair of hexadecimal digits are usually separated by dashes or colons such as 00 0D 88 11 22 33 or 00 0D 88 11 22 33 If your network device is a computer and the network card is already located inside the computer you can connect to the D Link Router from the computer and use the Copy Your PC s MAC Address option to enter the MAC address Example You have an FTP server that you want to share files over the Internet You can connect to the D Link Router from the computer designated as the FTP server 1 Enter a designated IP address somewhere between the Starting IP and Ending IP addresses 2 Click the Copy Your PC s MAC Address button and the
88. ssword Verify Password Km EE KEN STEP 2 SELECT YOUR TIME ZONE Select the appropriate time zone for your location This information is required to configure the time based options for the router GMT 08 00 Pacific Time US Canada Tijuana vil EA KE EN STEP 3 COMFIGURE YOUR INTERNET CONNECTION Your Internet Connection could mot be detected please select your Internet Service Provider TSP trom the ist below If your ISP is not isted select the Not Listed or Don t Know option to manualy configur If your Internet Service Provider was not isted or you don t know who It is please select the Internet connection type below Adelphia Power Link ALLTEL DSL ATAT DSL Service Bell Sympatico Bellsouth Charter High Speed Comcast Covad Cox Communications Earthlink Cable Earthlink DSL FrontierNet Optimum Online REN Road Runner Rogers Yahoo SBC Yahoo DSL Shaw Speakeasy Sprint FastConnect Telus Time Warner Cable US West Qwest Verizon Online DSL XO Communications D Link Systems Inc Depending upon your Internet Service Provider or the type of connection you selected in the previous step one of five screens will appear If you are unsure of any of the information please contact your Internet Service Provider ISP for details m DHCP Connection Dynamic IP Address requires you to enter the MAC address of the computer that was originally connected to your bro
89. sually requires more than one rule to be entered Example You have configured a game server using the Advanced Gaming page to play HALO Combat Evolved with some friends You would like to limit the access to your network and server to specific times of the day and only to your friends Enable Name IP Address TCP UDP Schedule Ports Ports Halo Combat 192 168 0 20 2302 Always Next you would define a schedule on the Tools gt Schedule page called Gametime which specifies evolved 2303 a schedule of Friday and Saturday between 7PM and 11PM All of your friends use the same service provider and have IP addresses 67 150 220 117 67 150 231 43 and 67 150 231 75 You have an option of defining a set of rules to match each one of these addresses individually or you may just decide that using an IP range that covers all of them is sufficient for your needs The first rule is to configure a DENY rule that will catch all of the traffic that arrives on these ports but does not match data from the sources you want to have access to your network It is important to enter the DENY rule first since all subsequent rules will be added higher in the list and will be Enable Name Action Source IP Protocol Schedule Log checked first It should look similar to the figure on the right i E HALO Deny 0 0 0 0 UDP Always Yes CE 255 255 255 255 1 65535 DENY 2302 2303 Notice that it covers all Source IP Address Source Ports and Times Alw
90. t Ethernet WAN Port e D Link 108G Wireless Technology Software Features e GameFuel Priority Technology e Up to 256 Firewall Port Configurations Access Control Policies Parental Controls Internal and External System Logging e Static Dynamic Routing e Oversized NAT table e Email Alerts e Wireless Distribution System WDS Dimensions L 7 5 inches 190 5mm e W 4 6 inches 116 84mm e H 1 375 inches 35mm Security e WPA Enterprise e WPA Personal e 64 128 bit WEP e MAC Filtering External Antenna Type 67 Appendix D Link Systems Inc e 1 5dBi detachable antenna Standards e IEEE 802 11 e IEEE 802 11b e IEEE 802 3 e IEEE 802 3u LEDs e Power e WAN e WLAN Wireless Connection e LAN Wireless Signal Rates with Automatic Fallback e D Link 108G 108Mbps e 54Mbps e 36Mbps e 18Mbps 11Mbps 48Mbps 24Mbps 12Mbps 9Mbps e 6Mbps 5 5Mbps e 2Mbps 1Mbps Power Input e External Power Supply DC 5V 2 5A Warranty e 1 Year Maximum wireless signal rate derived from IEEE Standard 802 11g specifications Actual data throughput will vary Network conditions and environmental factors lower actual data throughput rate Appendix D Link Systems Inc Contacting Technical Support You can find software updates and user documentation on the D Link website D Link provides free technical support for customers within the United States and within Canada fo
91. t cannot keeps its clock running and will not have the correct time when it is started again To maintain the correct time for schedules and logs either you must enter the correct time after you restart the router or you must enable the NTP Server option 45 Using the Configuration Interface TIME CONFIGURATION Time Zone GMT 08 00 Pacific Time US Canada Tijuana v Daylight Saving Enable Daylight Saving offset Enable NTP server NTP Server Used lt lt SET THE DATE AND TIME Current Gateway Time Monday October 11 2004 9 20 14 PM Year 2004 v Month ot Day u vw Hour 9 w Minute 20 w Second 13 vw PM ov NET Copy Your Computer s Time Settings Tools gt Time D Link Systems Inc Schedules Schedules can be created for use with enforcing rules For example if you want to restrict web access to Mon Fri from 3pm to 8pm You could create a schedule selecting Mon Tue Wed Thu and Fri and enter a Start Time of 3pm and End Time of 8pm Add Edit Schedule Rule Schedule Name Day s All Day Start Time End Time Save Name the schedule such as Weekday rule Place a checkmark in the boxes for the desired days or select the All Week radio button to select all seven days of the week Select this option if you want this schedule in effect all day for the selected day s If you don t use the All Day option then you enter in the time here The start tim
92. terface specified LAN or WAN A value of 0 0 0 0 in both the destination IP and netmask means that this is the default route 52 ROUTING TABLE Destination IP 192 168 0 2 192 168 0 255 192 168 0 1 192 168 0 0 Using the Configuration Interface Netmask Gateway Metric Interface 255 255 255 255 0 0 0 0 1 LAN 255 255 255 255 0 0 0 0 1 LAN 255 255 255 255 0 0 0 0 1 LAN 255 255 255 0 0 0 0 0 1 LAN Status gt Routing D Link Systems Inc Logs The router automatically logs records events of possible interest in it s internal memory If there isn t enough internal memory for all events logs of older events are deleted but logs of the latest events are retained The Logs option allows you to view the router logs You can define what types of events you want to view and the level of the events to view This router also has external Syslog Server support so you can send the log files to a computer on your network that is running a Syslog utility Log Options What to View View Levels Apply Log Settings Now Log Details Refresh Clear Email Now Save Log Statistics You can select the types of messages that you want to display from the log Firewall amp Security System and Router Status messages can be selected There are three levels of message importance Informational Warning and Critical Select the levels that you want displayed in the log Will filter the log results so that only the
93. ters support BEST Select thes por f your mres adapte s SUPPORT BETTER t een yo 6000 7 MONE Set Ve GEE For information on which security features your wireless adapters support pisase refer to the adapters documestation Mote Al O Link wireless adapters currently support WPA oo E3 D Link Systems Inc Depending upon your selection in Step 3 you will see one of the following screens m Step 4 Set Your Wireless Security Password prompts you to enter a wireless security password between 2 and 20 characters in length E f you selected Best security in step 3 this screen will appear providing you your pre shared key information m f you selected Better security in step 3 this screen will appear providing you your pre shared key information m If you selected Good security in step 3 this screen will appear providing you your WEP key information E f you selected None security in step 3 this screen will appear providing you your wireless network name 17 Using the Configuration Interface STEP 4 SET YOUR WIRELESS SECURITY PASSWORD Once you have selected your security level you will need to set a wireless security password With this password a unique security key will be generated Wireless Security Password 2 to 20 characters Note You will need to enter the unique security key generated into your wireless clients enable proper wireless communication not the password you pr
94. to schedule Schedule This option is enabled when On Schedule is selected You can select a schedule from the list of defined schedules To create a schedule go to Tools gt Schedules 47 Using the Configuration Interface Enable Logging To Syslog Server SYSLOG SETTINGS Syslog Server IP Address 0 0 0 0 Tools gt Syslog Enable Email Notification EMAIL SETTINGS From Emal Address To Email Address Password 1 Verify Password i EMAIL LOG WHEN FULL OR ON SCHEDULE On Log Ful On Schedule Schedule Tools gt Email D Link Systems Inc Using the Configuration Interface System The System Settings section allows you to reboot the device or restore the router to the factory SEER default settings Restoring the unit to the factory default settings will erase all settings including any rules that you ve created System Commands Tools gt System Reboot the Device This will restart the router Useful for restarting when you are not near the device Restore all Settings to This option will restore all configuration settings back to the factory defaults the Factory Defaults Any settings that have not been saved will be lost If you want to save your router configuration settings you can do so from the Admin page 48 D Link Systems Inc Firmware The Firmware Upgrade section can be used to update your router to the latest firmware code to improve functionality a
95. ttp 192 168 0 1 in the address field and press Enter The Configuration Interface login screen will appear By default there is no password Click on the Log In button to access the Configuration main screen Note If you are online you will see status Basic The Basic settings tab contains the Setup Wizards Internet connection and network setting options Wizard The Wizard screen contains two wizards that assist you with the configuration of your D Link Gaming Router The D urk Wireless Gaming Router powered by GameFud technology meets the demands of ndviduss tho demand powerhul and rekable pertermance for the timate onine gaming experience The folesang Web based Setup Wizard ts designed to assist you n connecting your new D Lrk Reuter to the Internet Thn Senay Weard vel gade you through sep by shep instructions on how to get your Internet connection up and running Click the button balons to bagn 4 RE d z WIRELESS SECURITY SETUP WIZARD The foliering Web based Setup Wizard ts designed to assist you I your wireless network setup This Setup Wizard wll gade you through step by step natructiors on how to set up your wadiess netwerk and how to mae tere Copyright 2004 D Link Sytenns be Basic gt Wizard 13 D Link Systems Inc Internet Connection Setup Wizard The Internet Connection Setup Wizard will assist you with connecting your D Link Gaming Router to the
96. twork DHCP Dynamic Host Configuration Protocol Used to automatically assign IP addresses from a predefined pool of addresses to computers or devices that requests them Digital certificate An electronic method of providing credentials to a server in order to have access to it or a network Direct Sequence Spread Spectrum DSSS Modulation technique used by 802 11b wireless devices DNS Domain Name System Translates Domain Names to IP addresses DOCSIS Data Over Cable Service Interface Specifications The standard interface for cable modems Domain name name that is associated with an IP address Download To send a request from one computer to another and have the file transmitted back to the requesting computer DSL Digital Subscriber Line High bandwidth Internet connection over telephone lines Duplex Sending and Receiving data transmissions at the sane time Dynamic DNS service DDNS is provided by companies to allow users with Dynamic IP addresses to obtain a Domain Name that will always by linked to their changing IP address The IP address is updated by either client software running on a computer or by a router that supports DDNS whenever the IP address changes 59 Appendix D Link Systems Inc Dynamic IP address IP address that is assigned by a DHCP server and that may change Cable Internet providers usually use this method to assign IP addresses to their customers E EAP
97. uch as cable modem or Ethernet and it displays the result as Detected xDSL or Frame Relay Network If you have an unusual network connection in which you are actually connected via xDSL but for which you configure either Static or DHCP in the WAN settings setting this option to xDSL or Other Frame Relay Network ensures that the router will recognize that it needs to shape traffic slightly differently in order to give the best performance Choosing xDSL or Other Frame Relay Network causes the measured uplink speed to be reported slightly lower than before on such connections but gives much better results Detected XDSLor When Connection Type is set to automatic the automatically detected other Frame Relay connection type is displayed here Network 34 D Link Systems Inc Add Edit GameFuel Rule Automatic classification should be adequate for most applications GameFuel rules identify a specific message flow and assign priority to that flow Name Priority Protocol Source IP Range Source Port Range Destination IP Range Destination Port Range Save Create a name for the rule that is meaningful to you The priority of the message flow is entered here O receives the highest priority most urgent and 255 receives the lowest priority The protocol used by the messages The rule applies to a flow of messages whose LAN side IP address is within the range set here The rule applies to a f
98. umber of Dynamic DHCP Clients rrrrrnrrrrornrenrervrrnrrsvervrrrvervrrnvrrvennr 24 Add Static DHCP Client ee ee ee ee ee er 25 Table of Contents D Link Systems Inc Static DHCP Client List ee ee ee ee ee ee ee ee ee 25 VE eee EE OE GO N 26 Basic Wireless SettingS esse esse RES KERR RS RR EE REK EN SEEK EE eN RE 26 Wireless Security MOCG sccssccscsssssscsssssscsssssscsnesssnssessssscsessncaessssenensas 27 MP GN 27 WPA Personal EE OR OE N EO EO EN EN 28 VPA 28 PNG NC RE EEE ONE OO EN OE 29 Virtual Server remrvrrnnvrernorennvrannvvensavensvrensvvenssvennnvensvvenssvenssvensvvenssvressvensvvvene 29 Add Edit Virtual Server ou ee ee ee ee ee ee ee ee ee ee ee ee 30 Virtual Servers LE egna ee Ee EE Re ee Ee 30 Special AppilcaHONS sesse es ere Ee ge Eg ee aged 31 Application Level Gateway ALG Configurations ee ese ee se ee ee 31 Add Edit Special Applications Rule neranronvravranvnvranranvrnranennvranensvranranennnrnn 32 Special Applications Rules LISt c ccccccccecesscsseesscsscescesseescessesscessesssessesseesens 32 EG ERE EEE RE N EE N 33 Add Edit Game Rule ves SERE SES GR GO GEE SEER RO GE Oe so ee ED Ee des 33 Game Rules List ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee ee 33 TT SG EG EE ED GE GE 34 EL EEE ER ME ES 34 Add Edit GameFuel Rule ee ee ee ee ee ee ee ee ee ee ee 35 GameFuel Rules LiSt ce cece ee ee ee ee ee ee ee ee ee ee ee 35 ROUINO EE NE 36 Add Edit R
99. ust pass through may limit the range Typical ranges vary depending on the types of materials and background RF radio frequency noise in your home or business The key to maximizing wireless range is to follow these basic guidelines m Keep the number of walls and ceilings between the DGL 4300 and other network devices to a minimum each wall or ceiling can reduce your D Link wireless product s range from 3 90 feet 1 30 meters Position your devices so that the number of walls or ceilings is minimized Mm Be aware of the direct line between network devices A wall that is 1 5 feet thick 5 meters at a 45 degree angle appears to be almost 3 feet 1 meter thick At a 2 degree angle it looks over 42 feet 14 meters thick Position devices so that the signal will travel straight through a wall or ceiling instead of at an angle for better reception m Building Materials can impede the wireless signal solid metal door or aluminum studs may have a negative effect on range Try to position wireless devices and computers with wireless adapters so that the signal passes through drywall or open doorways and not other materials m Keep your product away at least 3 6 feet or 1 2 meters from electrical devices or appliances 12 Wireless Basics D Link Systems Inc Using the Configuration Interface Using the Configuration Interface The Configuration Interface can be accessed from your Web browser Open up your Web browser and type h
100. uter senses data sent to the Internet on a trigger port or port range Special Applications rules apply to all computers on your internal network Application Level Gateway ALG Configurations Here you can enable or disable ALG s Some protocols and applications reguire special handling of the IP payload to make them work with network address translation NAT Each ALG provides special handling for a specific protocol or application A number of ALGs for common applications are enabled by default PPTP IPSec VPN RTSP FTP NetMeeting SIP MMS L2TP Windows Messenger Allows multiple machines on the LAN to connect to their corporate network using PPTP protocol Allows multiple VPN clients to connect to their corporate network using IPSec Some VPN clients support traversal of IPSec through NAT This ALG may interfere with the operation of such VPN clients If you are having trouble connecting with your corporate network try turning this ALG off Please check with the system adminstrator of your corporate network whether your VPN client supports NAT traversal Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet QuickTime and Real Player are some of the common applications using this protocol Allows FTP clients and servers to transfer data across NAT Refer to the Advanced gt Virtual Server page if you want to host an FTP server Allows Microsoft NetMeetin
101. ver each other and be connected without the need to configure any settings Repeater Retransmits the signal of an Access Point in order to extend it s coverage RIP Routing Information Protocol is used to synchronize the routing table of all the routers on a network RJ 11 The most commonly used connection method for telephones RJ 45 The most commonly used connection method for Ethernet RS 232C The interface for serial communication between computers and other related devices RSA Algorithm used for encryption and authentication 64 Appendix D Link Systems Inc S Samba A freeware program that allows for resources to be shared on a network Mainly used in Unix based Operating Systems Server A computer on a network that provides services and resources to other computers on the network Session key An encryption and decryption key that is generated for every communication session between two computers Session layer The fifth layer of the OSI model which coordinates the connection and communication between applications on both ends Simple Mail Transfer Protocol Used for sending and receiving email Simple Network Management Protocol Governs the management and monitoring of network devices SMTP Simple Mail Transfer Protocol SNMP Simple Network Management Protocol SOHO Small Office Home Office SPI Stateful Packet Inspection SSH Secure Shell is a command line inte
102. verification Service Name If your ISP requires a service name enter it here Reconnect Mode Typically PPPoE connections are not always on The D Link Router allows you to set the connection mode e Always on A connection to the Internet is always maintained e On demand A connection to the Internet is made as needed e Manual You have to open up the Web based management interface and click the Connect button manually any time that you wish to connect to the Internet Maximum Idle Time Defines how long the machine can be idle before the PPPoE connection is disconnected PPPoE Connection The Disconnect button will immediately terminate any active connection Note These buttons become enabled after the router has been rebooted with the PPPoE mode selected 21 Using the Configuration Interface Choose the mode to be used by the router to connect to the Internet WAN Mode Use these DNS Servers Primary DNS Server Secondary DNS Server HEER Prot wan woo Enter the Information provided by voer Internet Service Provider 159 wamane Password lessee Verily Password lessee Service Name Reconnect Mode Aas on On demand Manus povot connection MA HE Maximum Idle Time attempt an mmed te connection t These buttons wif be enabled after the router reboots with this configuration Basic gt WAN gt PPPoE D Link Systems Inc PPTP WAN Mode A method of connection that requires you
103. y choose the best channel Select the channel with the clearest signal By default the transmission rate will automatically select the fastest rate You have the option of selecting the speed if necessary If all of your devices can connect in 802 119 Mode then leave the setting at 802 119 only If you have some devices that are 802 11b than you can change the mode to Mixed Super G Turbo Modes must use channel 6 for transmission and 802 11 Mode must be set to 802 119 e Super G without Turbo Performance enhancing features such as Packet Bursting FastFrames and Compression Super G with Static Turbo Mode is not backwards compatible with non Turbo legacy devices Static turbo mode is always on and is only enabled when all devices on the wireless network are Super G with Static Turbo enabled Super G with Dynamic Turbo Mode is backwards compatible with non Turbo legacy devices Dynamic Turbo mode is only enabled when all devices on the wireless network are Super G with Dynamic Turbo enabled 26 Using the Configuration Interface p Basic gt Wireless D Link Systems Inc Wireless Security Mode To protect your privacy use the wireless security mode to configure the wireless security features This device supports three wireless security modes including WEP WPA Personal and WPA Enterprise WEP is the original wireless encryption standard WPA provides a higher level of security WPA Personal does not require
104. you need in the list of schedules go to the Tools gt Schedules screen and create a new schedule Saves the new rule or modified existing rule to the Rules list When you are done editing the settings you must click the Save Settings button at the top of the page to make the changes effective and permanent enabled disabled by toggling the Enable checkbox Entries can be modified by clicking on the paper and pencil icon To delete an entry click on the trash can icon After you ve completed all modifications or deletions you must click the Save Settings button at the top of the page to save your changes The router must reboot before new settings will take effect You will be prompted to Reboot the Device or Continue If you need to make additional settings changes click Continue If you are finished with your configuration settings click the Reboot the Device button 33 Using the Configuration Interface ADD GAME RULE Enable Name IP Address TCP Ports to Open UDP Ports to Open Schedule v lt lt Select Game v 0 0 0 0 Always Ea ca Enable GAME RULES LIST Name IP Address TCP Ports UDP Ports Schedule Advanced gt Gaming D Link Systems Inc Using the Configuration Interface GameFuel The GameFuel option helps improve your network gaming performance by prioritizing applications By default the GameFuel settings are disabled and application priority is n
Download Pdf Manuals
Related Search
Related Contents
dcs user manual 2014.qxp IPAdminTool User`s Manual HP EliteBook 820 G1/CT Notebook PC(PDF形式、1850kバイト) JVC GZ-MS130 Camcorder User Manual LG 230 - Solo Mobile Product Manual QuickBooks® - QuickBooks Support Operator`s Manual Copyright © All rights reserved.
Failed to retrieve file