submitted | available | document details (if available) | source link |
---|---|---|---|
July 05 2009 | July 05 2009 | Adobe PDF Library 7.0 |
various | Manual part 2 | Users Manual | 2.80 MiB | July 05 2009 |
Using the Configuration Menu (continued) Advanced > Virtual Server continued Click on this icon to edit the virtual service Click on this icon to delete the virtual service Example #2:
If you have an FTP server that you wanted Internet users to access by WAN port
100 and only during the weekends, you would need to enable it as such. FTP server is on LAN computer 19.168.0.30. FTP uses port 1, TCP. Name: FTP Server Private IP: 19.168.0.30 Protocol Type: TCP Private Port: 1 Public Port: 100 Schedule: From: 01:00AM to 01:00AM, Sat to Sun All Internet users who want to access this FTP Server must connect to it from port 100. This is an example of port redirection and can be useful in cases where there are many of the same servers on the LAN network.
1 Using the Configuration Menu (continued) Advanced > Applications Some applications require multiple connections, such as Internet gaming, video conferencing, Internet telephony and others. These applications have difficulties working through NAT (Network Address Translation). Special Applications makes some of these applications work with the DI-54. If you need to run applications that require multiple connections, specify the port normally associated with an application in the Trigger Port field, select the protocol type as TCP or UDP, then enter the public ports associated with the trigger port to open them for inbound traffic. The DI-524 provides some predefined applications in the table on the bottom of the web page. Select the application you want to use and enable it. Note! Only one PC can use each Special Application tunnel. Name:
Trigger Port:
This is the name referencing the special application. This is the port used to trigger the application. It can be either a single port or a range of ports. This is the protocol used to trigger the special application. Trigger Type:
Public Port:
Public Type:
This is the port number on the WAN side that will be used to access the application. You may define a single port or a range of ports. You can use a comma to add multiple ports or port ranges. This is the protocol used for the special application.
Using the Configuration Menu (continued) Advanced > Filters > IP Filters Filters are used to deny or allow LAN (Local Area Network) computers from accessing the Internet. The DI-54 can be setup to deny internal computers by their IP or MAC addresses. The DI-54 can also block users from accessing restricted web sites. IP Filters:
IP Filter is used to deny LAN IP addresses from accessing the Internet. You can deny specific port numbers or all ports for the specific IP address. The IP address of the LAN computer that will be denied access to the Internet. The single port or port range that will be denied access to the Internet. Select the protocol type This is the schedule of time when the IP Filter will be enabled. IP Address:
Port Range:
Protocol Type:
Schedule:
3 Using the Configuration Menu (continued) Advanced > Filters > URL Blocking URL Blocking is used to deny LAN computers from accessing specific web sites by the URL. A URL is a specially formatted text string that defines a location on the Internet. If any part of the URL contains the blocked word, the site will not be accessible and the web page will not display. To use this feature, enter the text string to be blocked and click Apply. The text to be blocked will appear in the list. To delete the text, just highlight it and click Delete. Filters-
URL Blocking-
Keywords-
Select the filter you wish to use; in this case, URL Blocking was chosen. Select Enabled or Disabled. Enter the keywords in this field. Block URLs which contain keywords listed below.
4 Using the Configuration Menu Advanced > Filters > MAC Filters
(continued) Use MAC (Media Access Control) Filters to allow or deny LAN (Local Area Network) computers by their MAC addresses from accessing the Network. You can either manually add a MAC address or select the MAC address from the list of clients that are currently connected to the Broadband Router. Filters-
MAC Filters-
Name-
MAC Address-
DHCP Client-
Select the filter you wish to use; in this case, MAC filters was chosen. Choose Disable MAC filters; allow MAC addresses listed below; or deny MAC addresses listed below. Enter the name here. Select a DHCP client from the pull-down list; click Clone to copy that MAC Address. Enter the MAC Address.
5 Using the Configuration Menu Advanced > Filters > Domain Blocking
(continued) Domain Blocking is used to allow or deny LAN (Local Area Network) computers from accessing specific domains on the Internet. Domain blocking will deny all requests to a specific domain such as http and ftp. It can also allow computers to access specific sites and deny all other sites. Filters-
Domain Blocking-
Disabled-
Allow-
Deny-
Blocked Domains-
Permitted Domains-
Select the filter you wish to use; in this case, Domain Block-
ing was chosen. Select Disabled to disable Domain Blocking Allows users to access all domains except Blocked Domains Denies users access to all domains except Permitted Domains Enter the Blocked Domains in this field Enter the Permitted Domains in this field
6 Using the Configuration Menu (continued) Advanced > Firewall Firewall Rules is an advanced feature used to deny or allow traffic from passing through the DI-54. It works in the same way as IP Filters with additional settings. You can create more detailed access rules for the DI-54. When virtual services are created and enabled, it will also display in Firewall Rules. Firewall Rules contain all network firewall rules pertaining to IP (Internet Protocol). In the Firewall Rules List at the bottom of the screen, the priorities of the rules are from top (highest priority) to bottom (lowest priority.) Enable or disable the Firewall Enter the name Note:
The DI-524 MAC Address filtering rules have precedence over the Firewall Rules. Firewall Rules-
Name-
Action-
Source-
Destination-
Allow or Deny Enter the IP Address range Enter the IP Address range; the Protocol;
and the Port Range Schedule-
Select Always or enter the Time Range.
7 Using the Configuration Menu (continued) Advanced > DDNS Select from the list of DDNS servers available. Users who have a Dynamic DDNS account may use this feature on the DI-54. Provider-
Host Name-
Enter your DDNS account host name. Username/Email- Enter your DDNS account username. Password/Key-
Enter your DDNS account password.
8 Using the Configuration Menu (continued) Advanced > DMZ If you have a client PC that cannot run Internet applications properly from behind the DI-
54, then you can set the client up for unrestricted Internet access. It allows a computer to be exposed to the Internet. This feature is useful for gaming purposes. Enter the IP address of the internal computer that will be the DMZ host. Adding a client to the DMZ
(Demilitarized Zone) may expose your local network to a variety of security risks, so only use this option as a last resort. DMZ-
Enable or Disable the DMZ. The DMZ (Demilitarized Zone) allows a single computer to be exposed to the internet. By default the DMZ is disabled. IP Address-
Enter the IP Address of the computer to be in the DMZ
9 Using the Configuration Menu (continued) Advanced > Performance Beacon Interval-
RTS Threshold-
Fragmentation-
DTIM Interval-
Wireless Mode-
TX Rates-
SSID Broadcast-
Beacons are packets sent by an Access Point to synchronize a wireless network. Specify a value. 100 is the default setting and is recommended. This value should remain at its default setting of 43. If incon-
sistent data flow is a problem, only a minor modification should be made. The fragmentation threshold, which is specified in bytes, deter-
mines whether packets will be fragmented. Packets exceeding the 346 byte setting will be fragmented before transmis-
sion.346 is the default setting
(Delivery Traffic Indication Message) 3 is the default setting. A DTIM is a countdown informing clients of the next window for listening to broadcast and multicast messages. Select Short or Long Preamble. The Preamble defines the length of the CRC block (Cyclic Redundancy Check is a com-
mon technique for detecting data transmission errors) for communication between the wireless router and the roaming wireless network adapters. Note: High network traffic areas should use the shorter preamble type. Auto is the default selection. Selct from the drop down menu. Choose Enabled to broadcast the SSID across the network. All devices on a network must share the same SSID (Service Set Identifier) to establish communication. Choose Disabled if you do not wish to broadcast the SSID over the network. 30 Using the Configuration Menu (continued) Tools> Admin admin is the Administrator login name Enter the password and enter again to confirm user is the User login name Enter the password and enter again to confirm At this page, the DI-54 administrator can change the system password. There are two accounts that can access the Broadband Routers Web-Management interface. They are admin and user. Admin has read/write access while user has read-only access. User can only view the settings but cannot make any changes. Administrator-
Password-
User-
Password-
Remote Management- Remote management allows the DI-524 to be configured from the Internet by a web browser. A username and password is still required to ac-
cess the Web-Management interface. In general, only a member of your network can browse the built-in web pages to perform Administrator tasks. This feature enables you to perform Administrator tasks from the remote (Internet) host. IP Address- The Internet IP address of the computer that has access to the Broad-
band Router. If you input an asterisk (*) into this field, then any computer will be able to access the Router. Putting an asterisk (*) into this field would present a security risk and is not recommended. Port- The port number used to access the Broadband Router. Example- http://x.x.x.x:8080 where x.x.x.x is the WAN IP address of the Broadband Router and 8080 is the port used for the Web-Mangement interface. 31 Using the Configuration Menu (continued) Tools > Time Default NTP Server-
Time Zone-
NTP is short for Network Time Protocol. NTP synchronizes computer clock times in a network of computers. This field is optional. Set Device Date and Time: To manually input the time. Enter the values in these fields for the Year, Month, Day, Hour, Minute, and Second. Set the Time-
To manually input the time, enter the values in these fields for the Year, Month, Day, Hour, Minute, and Second. Click Set Time. Daylight Saving-
To select Daylight Saving time manually, select enabled or disabled, and enter a start date and an end date for daylight saving time. 3
Using the Configuration Menu (continued) Tools > System The current system settings can be saved as a file onto the local hard drive. The saved file or any other saved setting file can be loaded back on the Broadband Router. To reload a system settings file, click on Browse to browse the local hard drive and locate the system file to be used. You may also reset the Broadband Router back to factory settings by clicking on Restore. Save Settings to Local Hard Drive-
Click Save to save the current settings to the local Hard Drive Load Settings from Local Hard Drive-
Click Browse to find the settings, then click Load Restore to Factory Default Settings- Click Restore to restore the factory default settings 33 Using the Configuration Menu (continued) Tools > Firmware You can upgrade the firmware of the Router here. Make sure the firmware you want to use is on the local hard drive of the computer. Click on Browse to browse the local hard drive and locate the firmware to be used for the update. Please check the D-Link support site for firmware updates at http://support.dlink.com. You can download firmware upgrades to your hard drive from the D-Link support site. Firmware Upgrade-
Click on the link in this screen to find out if there is an up-
dated firmware; if so, download the new firmware to your hard Browse-
After you have downloaded the new firmware, click Browse in this window to locate the firmware update on your hard drive. Click Apply to complete the firmware upgrade. 34
This product uses the FCC Data API but is not endorsed or certified by the FCC