Manual d link 524




















Pressing the Reset Button restores the router to its original factory This LED blinks Page 7: Features Features Fully compatible with the Page 8 D-Link wireless products will allow you access to the data you want, when and where you want it. You will be able to enjoy the freedom that wireless networking brings. The DI is backwards compatible with This means that if you have an existing Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range.

Page 13 WLAN. Select Enabled or Disabled. Disabled is the default setting. Note: If you enable encryption on the DI make sure to also enable encryption on all the wireless clients or wireless connection will not be established.

Your ISP will provide you with a username and pass- word. This is considered your internal network. These settings may be referred to as Private settings. Enter the name referencing the virtual service. The DI provides some predefined applications in the table on the bottom of the web page. Select the application you want to use and enable it. The DI can also block users from accessing restricted web sites.

A URL is a specially formatted text string that defines a location on the Internet. If any part of the URL contains the blocked word, the site will not be accessible and the web page will not display. Domain blocking will deny all requests to a specific domain such as http and ftp. It can also allow computers to access specific sites and deny all other sites. Page 27 Firewall Rules is an advanced feature used to deny or allow traffic from passing through the DI It works in the same way as IP Filters with additional settings.

You can create more detailed access rules for the DI When virtual services are created and enabled, it will also display in Firewall Rules. Page 28 If you have a client PC that cannot run Internet applications properly from behind the DI, then you can set the client up for unrestricted Internet access.

It allows a computer to be exposed to the Internet. This feature is useful for gaming purposes. They are admin and user. User can only view the settings but cannot make any changes. NTP synchronizes com- puter clock times in a network of computers. This field is optional. The saved file or any other saved setting file can be loaded back on the Broadband Router. To reload a system settings file, click on Browse to browse the local hard drive and locate the system file to be used.

Page 33 Click on Browse to browse the local hard drive and locate the firmware to be used for the update.

You can download firmware up- grades to your hard drive from the D-Link support site. Page 34 IP Security. Once VPN pass-through is enabled, there is no need to open up virtual services. If the device is rebooted, the logs are automatically cleared. You may save the log files under Log Settings.

View Log- First Page - The first page of the log. Email Address - The email address to which the logs will be sent. The traffic counter will reset if the device is rebooted. Page 40 Networking Basics Please follow all the instructions in this window: Click Next In the following window, select the best description of your computer.

Click Next Click Next Enter a Workgroup name. All computers on your network should have the same Workgroup name. When the changes are complete, click Next. Please wait while the Network Setup Wizard configures the computer. This may take a few minutes. Page 43 Networking Basics In the window below, select the option that fits your needs. In this example, Create a Network Setup Disk has been selected.

You will run this disk on each of the computers on your network. Click Next. Insert a disk into the Floppy Disk Drive, in this case drive A. The new settings will take effect when you restart the computer. Click Yes to restart the computer. You have completed configuring this computer. Next, you will need to run the Network Setup Disk on all the other computers on your network. Page Getting Started Naming your Computer In this window, enter the Computer name Select Workgroup and enter the name of the Workgroup All computers on your network must have the same Workgroup name.

To check on the IP Address of the adapter, please do the following: Right-click on the The IP Addresses on your network must be within the same range. For example, if one computer has an IP Address of A window similar to this one will appear. Type ping xxx. The computer used to configure the DI cannot access the Configuration menu. Each device must have a unique IP Address; Page 56 Troubleshooting 3. Check that the drivers for the network adapters are installed properly.

You may be using different network adapters than those illustrated here, but this procedure will remain the same, regardless of the type of network adapters you are using. Click OK. Page 58 RF noise, like microwaves, Monitors, electric motors, etc. If you have enabled Encryption on the DI, you must also enable encryption on all wireless clients in order to establish a wireless connection. Page 59 6. Turn the DI back on again, and then turn on the client. The This means that you do not need to change your entire network to maintain connectivity.

You may sacrifice some of. You may choose to slowly change your network by gradually replacing the. In addition to offering faster data transfer speeds when used with other When used with other WPA: Wi-Fi Protected Access authorizes and identifies users based on a secret key that changes automatically at a regular interval.

This insures much greater security than the standard WEP security. By contrast, the older WEP encryption required the keys to be changed manually.

In theAuthentication process the server verifies the identity of the client attempting to connect to the network. Unfamiliar clients would be denied access. You only need to input your encryption information once in the configuration menu. No longer will you have to manually input a new WEP key frequently to ensure security, with the DI, you will automatically receive a new key every time you connect, vastly increasing the safety of your communications.

Reset Button restores the router to its original factory default settings. A solid light indicates connection on the WAN port. This LED blinks during data transmission. A solid light indicates that the wireless segment is ready. This LED blinks during wireless data transmission. A solid light indicates a connection to an Ethernet-enabled computer on ports This LED.

D-Link wireless products are based on industry standards to provide easy-to-use and compatible high-speed wireless connectivity within your home, business or public access wireless networks. D-Link wireless products will allow you access to the data you want, when and where you want it.

You will be able to enjoy the freedom that wireless networking brings. A WLAN is a cellular computer network that transmits and receives data with radio signals instead of wires. WLANs are used increasingly in both home and office environments, and public areas such as airports, coffee shops and universities. Innovative ways to utilize WLAN technology are helping people to work and communicate more efficiently. Increased mobility and the absence of cabling and other fixed infrastructure have proven.

Wireless users can use the same applications they use on a wired network. Wireless adapter cards used on laptop and desktop systems support the same protocols as Ethernet adapter cards. Mobility - P roductivity increases when people have access to data in any location within the operating range of the WLAN. Management decisions based on real-time information can significantly improve worker efficiency.

Networks that frequently change can benefit from WLANs ease of implementation. WLANs can operate in locations where installation of wiring may be impractical. Installation and Network Expansion - Installing a WLAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings.

Wireless technology allows the network to go where wires cannot go - even outside the home or office. Scalability — WLANs can be configured in a variety of topologies to meet the needs of specific applications and installations. Configurations are easily changed and range from peer-to-peer networks suitable for a small number of users to larger infrastructure networks to accommodate hundreds or thousands of users, depending on the number.

Inexpensive Solution - Wireless network devices are as competitively priced as conventional Ethernet network devices. The IEEE It increases the data rate up to 54 Mbps within the 2. This means that in most environments, within the specified range of this device, you will be able to transfer large files quickly or even watch a movie in MPEG format over your network without noticeable delays. This technology works by transmitting highspeed digital data over a radio wave utilizing OFDM O rthogonal F requency D ivision M ultiplexing technology.

OFDM works by splitting the radio signal into multiple smaller sub-signals that are then transmitted simultaneously at different frequencies to the receiver. OFDM reduces the amount of crosstalk interference in signal transmissions. The DI is backwards compatible with This means that if you have an existing The D-Link Air Plus G DI lets you access your network, using a wireless connection, from virtually anywhere within its operating range.

Keep in mind, however, that the number, thickness and location of walls, ceilings, or other objects that the wireless signals must pass through, may limit the range. Typical ranges vary depending on the types of materials and background RF radio frequency noise in your home or business. Please remember that D-Link AirPlus G wireless devices are pre-configured to connect together, right out of the box, with their default settings.

Consult with your Cable or DSL provider for proper installation of the modem. Quick Installation Guide for more information regarding the Setup Wizard. These buttons appear on most of the configuration screens in this section. The SSID can be easily changed to connect to an existing wireless network or to establish a new wireless network.

All devices on the network must share the same channel. Note: The wireless adapters will automatically scan and match the wireless setting. Select None, WEP, None is the default setting. Note: if you enable encryption on the DI, please make sure that you also enable encryption on all the wireless clients, or wireless connection will not be established.

This option is commonly used for Cable modem services. The default host name is the device name of the Router and may be changed. Otherwise, leave it a the default setting. Select Enabled or Disabled. Each IP address entered in the fields must be in the appropriate IP form, which are four octets separated by a dot x.

The Router will not accept the IP address if. Your ISP will provide you with a username and password. This option is typically used for DSL services. The default IP address is: The subnet mask of the LAN interface. The default subnet mask is You must specify the starting and ending. The default setting is Enabled.

The DI can be configured as a virtual server so that remote users accessing Web or. The DI firewall feature filters out unrecognized packets to protect your LAN network so all computers networked with the DI are invisible to the outside world.

Depending on the requested service, the DI redirects the external service. The DI is also capable of port-redirection meaning incoming traffic to a particular port may be redirected to a different port on the server computer. Each virtual service that is created will be listed at the bottom of the screen in the.

Virtual Servers List. There are pre-defined virtual services already in the table. You may use them by enabling them and assigning the server IP to use that particular. The schedule of time when the virtual service will be enabled.

The schedule may be set to Always , which will allow the particular service to always be enabled. If it is set to Time , select the time frame for the service to be enabled.

If the system time is outside of the scheduled time, the service will. Example 1: If you have a Web server that you wanted Internet users to access at all times, you would need to enable it. If you have an FTP server that you wanted Internet users to access by WAN port and only during the weekends, you would need to enable it as such. This is an example of port redirection and can be useful in cases where there are many of the same servers on the LAN network. Some applications require multiple connections, such as Internet gaming, video conferencing, Internet telephony and others.

Special Applications makes some of these applications work with the DI The DI provides some predefined applications in the table on the bottom of the web page.

Select the application you want to use and enable it. Only one PC can use each Special Application tunnel. Name: This is the name referencing the special application. Trigger Port: This is the port used to trigger the application.

It can be either a single port or a range of ports. Trigger Type: This is the protocol used to trigger the special application. You may define a single port or a. Public Type: This is the protocol used for the special application. The DI can also block users from accessing restricted web sites. You can deny specific port numbers or all ports. Port Range: The single port or port range that will be denied access to the Internet. Schedule: This is the schedule of time when the IP Filter will be enabled.

A URL is a specially formatted text string that defines a location on the Internet. If any part of the URL contains the blocked word, the site will not be accessible and the web page will not display. To use this feature, enter the text string to be blocked and click Apply.

The text to be blocked will appear in the list. To delete the text, just. Select the filter you wish to use; in this case, URL Blocking. Select the filter you wish to use; in this case, MAC filters was chosen.

Domain blocking will deny all requests to a specific domain such as http and ftp. It can also allow computers to access specific.



0コメント

  • 1000 / 1000