Home > D-Link > Router > D-Link Router DGL-4300 User Manual

D-Link Router DGL-4300 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual D-Link Router DGL-4300 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Using the Configuration Interface
    51 D-Link Systems, Inc. Refresh Statistics:
    Clear Statistics:Refresh:
    Clear:
    Email Now:
    Save Log:
    Logs
    The router automatically logs (records) events of possible interest in it’s internal memory. If there isn’t
    enough internal memory for all events, logs of older events are deleted but logs of the latest events
    are retained. The Logs option allows you to view the router logs. You can define what types of events
    you want to view and the level of the events to view. This router also has external Syslog Server
    support so you can send the log files to a computer on your network that is running a Syslog utility.
    Log Options
    You can select the types of messages that you want to display from the log.
    Firewall & Security, System, and Router Status messages can be selected.
    There are three levels of message importance: Informational, Warning, and
    Critical. Select the levels that you want displayed in the log.
    Will filter the log results so that only the selected options appear.
    Log Details
    Updates the log details on the screen so it displays any recent activity.
    Clears all of the log contents.
    This option will send a copy of the router log to the email address configured
    in the Tools > Email screen.
    This option will save the router to a log file on your computer.
    Statistics
    Network Traffic Stats
    Updates the screen with the latest router statistics.
    Clears all of the values on the screen. What to View:
    View Levels:
    Apply Log Settings
    Now:
    Status > Logs 
    						
    							Using the Configuration Interface
    52 D-Link Systems, Inc. Sent:
    Received:
    TX Packets Dropped:
    RX Packets Dropped:
    Collisions:
    Errors:
    Sent:
    Received:
    TX Packets Dropped:
    RX Packets Dropped:
    Collisions:
    Errors:
    Sent:
    Received:
    TX Packets Dropped:
    Errors:
    LAN Statistics
    The number of packets transmitted to the local area network.
    The number of packets received from the local area network.
    The number of transmit packets dropped on the local area network.
    The number of receive packets dropped on the local area network.
    The number of collisions on the local area network.
    The number of errors occuring on the local area network.
    WAN Statistics
    The number of packets transmitted to the Internet.
    The number of packets received from the Internet.
    The number of transmit packets sent to the WAN port that were dropped.
    The number of receive packets sent to the WAN port that were dropped.
    The number of collisions involving packets intended for the WAN port.
    The number of errors occuring with packets intended for the WAN port.
    Wireless Statistics
    The number of packets sent to the wireless network.
    The number of packets received from the wireless network.
    The amount of transmit packets dropped.
    The number of errors relating to packets to/from the wireless network.
    Active Sessions
    The Active Session page displays the full details of active sessions to your router. 
    						
    							Using the Configuration Interface
    53 D-Link Systems, Inc.
    Appendix
    Securing Your Network
    1. Change Admin Password
    Changing the password to access your new router is the first step in securing your network.  This can
    done through the Wizard or on the Admin Page of the Tools tab.  There is no password by default and
    hackers will know this when trying to access your network.  Make sure that the password you choose
    is not commonly known or something that is easy to guess such as your last name or your pet’s
    name. Try using a combination of letters and numbers to deter intruders from hacking into your
    network. Your private information should be kept private.
    2. Disable DHCP and use Static IP addresses or Use Static DHCP and limit scope to the
    amount of users on your network.
    In the event that an intruder manages to gain access to your network, having DHCP enabled makes
    it easier for the intruder to access other computers on your network. There are two methods for
    getting around this. One is to disable DHCP and use static IP addressing on all the devices connected
    to your network. This would mean that the intruder would have to know what IP network your devices
    are on in order to access them. The second way is to change the scope of the DHCP server to only
    include enough IP addresses for the devices in your network. You can then use the Static DHCP
    feature of the router to assign an IP address to each device on your network. Static DHCP still
    dynamically assigns an IP address to your network devices but only allows for those defined devices
    to obtain an IP address.
    3. Change the default LAN IP address
    Change the default LAN IP address from 192.168.0.1 to an alternate IP address. There are 3 ranges
    of IP addresses that have been reserved for use on Private Networks.
    10.0.0.0 -    10.255.255.255 (10.0.0.0/8)
    172.16.0.0 -    172.31.255.255 (172.16.0.0/12)
    192.168.0.0 -    192.168.255.255 (192.168.0.0/16)
    D-Link routers use 192.168.0.1 as their default LAN IP address. Choosing an alternate IP address
    lessens the probabilty of an intruders knowing what IP network your devices are on. 
    						
    							Using the Configuration Interface
    54 D-Link Systems, Inc. 4. Changing the Wireless Network Name (SSID - used for wireless devices only)
    It is always a good idea to change the wireless network name (SSID) from the default value.  Leaving
    it in the default state is usually a good indication to intruders that all settings (including security) are
    probably defaults. This setting identifies your wireless network. Make sure that the name you choose
    is not commonly known or something that is easy to guess. Try using a combination of letters and
    numbers to add complexity to it.
    5. Set the Visibility Status to Invisible
    Wireless routers typically broadcast the wireless network name (SSID) to users attempting to connect
    to a wireless network. By setting the Visibility Status to Invisible, all devices attempting to connect to
    the router will need to know the wireless network name (SSID) in order to connect.
    6. Enable WPA Personal or Enterprise
    Along with changing the wireless network name and setting the visibility status to invisible, we highly
    recommended that you enable some sort of encryption feature. There are different methods of securing
    wireless transmissions, but the most effective is WPA-Personal and WPA-Enterprise.  WPA-Personal
    is easier to configure but does not offer the extensive level of security that WPA Enterprise does. If
    you have the infrastructure to support WPA Enterprise, we recommend that you use this method. If
    not, then WPA-Personal will suffice.
    7. Set up MAC Filtering
    Each networking device (router, access point, wireless card, etc.) on a network contains a unique
    hexadecimal number that identifies that specific product.  This number is referred to as a MAC address.
    MAC filtering allows you to create a list of the MAC address of each device on your network and only
    allows these specific devices to associate with your network. With this feature enabled, devices
    attempting to connect to your network with a MAC address that is not in the list you created, will be
    denied access. 
    						
    							Appendix
    55 D-Link Systems, Inc.
    Glossary
    A
    Access Control List - ACL.  Database of network devices that are allowed to access resources on the network.
    Access Point - AP. Device that allows wireless clients to connect to it and access the network
    Ad-hoc network - Peer-to-Peer network between wireless clients
    Address Resolution Protocol - ARP. Used to map MAC addresses to IP addresses so that conversions can
    be made in both directions.
    ADSL - Asymmetric Digital Subscriber Line
    Advanced Encryption Standard - AES. Government encryption standard
    Alphanumeric - Characters A-Z and 0-9
    Antenna - Used to transmit and receive RF signals.
    AppleTalk – A set of Local Area Network protocols developed by Apple for their computer systems
    AppleTalk Address Resolution Protocol – AARP. Used to map the MAC addresses of Apple computers to
    their AppleTalk network addresses, so that conversions can be made in both directions.
    Application layer - 7th Layer of the OSI model. Provides services to applications to ensure that they can
    communicate properly with other applications on a network.
    ASCII - American Standard Code for Information Interchange. This system of characters is most commonly
    used for text files
    Attenuation – The loss in strength of digital an analog signals. The loss is greater when the signal is being
    transmitted over long distances.
    Authentication –To provide credentials, like a Password, in order to verify that the person or device is really
    who they are claiming to be
    Automatic Private IP Addressing - APIPA. An IP address that a Windows computer will assign itself when it
    is configured to obtain an IP address automatically but no DHCP server is available on the network 
    						
    							Appendix
    56 D-Link Systems, Inc.
    B
    Backward Compatible - The ability for new devices to communicate and interact with older legacy devices to
    guarantee interoperability
    Bandwidth - The maximum amount of bytes or bits per second that can be transmitted to and from a network
    device
    Basic Input/Output System – BIOS. A program that the processor of a computer uses to startup the system
    once it is turned on
    Baud – Data transmission speed
    Bit rate – The amount of bits that pass in given amount of time
    bit/sec – bits per second
    BOOTP – Bootstrap Protocol.  Allows for computers to be booted up and given an IP address with no user
    intervention
    Bottleneck – A time during processes when something causes the process to slowdown or stop all together
    Broadband – A wide band of frequencies available for transmitting data
    Broadcast – Transmitting data in all directions at once
    Browser – A program that allows you to access resources on the web and provides them to you graphically
    C
    Cable modem – A device that allows you to connect a computer up to a coaxial cable and receive Internet
    access from your Cable provider
    CardBus – A newer version of the PC Card or PCMCIA interface.  It supports a 32-bit data path, DMA, and
    consumes less voltage
    Carrier Sense Multiple Access/Collision Avoidance – CSMA/CA
    Carrier Sense Multiple Access/Collision Detect – CSMA/CD
    CAT 5 – Category 5. Used for 10/100 Mbps or 1Gbps Ethernet connections
    Client – A program or user that requests data from a server
    Collision – When do two devices on the same Ethernet network try and transmit data at the exact same time.
    Cookie – Information that is stored on the hard drive of your computer that holds your preferences to the site
    that gave your computer the cookie
    CSMA/CA – Carrier Sense Multiple Access/Collision Avoidance
    CSMA/CD – Carrier Sense Multiple Access/Collision Detection 
    						
    							Appendix
    57 D-Link Systems, Inc.
    D
    Data – Information that has been translated into binary do that it can be processed or moved to another device
    Data Encryption Standard – Uses a randomly selected 56-bit key that must be known by both the sender and
    the receiver when information is exchanged
    Data-Link layer – The second layer of the OSI model.  Controls the movement of data on the physical link of
    a network
    Database – Organizes information so that it can be managed updated, as well as easily accessed by users or
    applications.
    DB-25 – A 25 ping male connector for attaching External modems or RS-232 serial devices
    DB-9 – A 9 pin connector for RS-232 connections
    dBd - decibels related to dipole antenna
    dBi - decibels relative to isotropic radiator
    dBm - decibels relative to one milliwatt
    Decrypt – To unscramble an encrypted message back into plain text
    Default – A predetermined value or setting that is used by a program when no user input has been entered for
    this value or setting
    Demilitarized zone – DMZ.  A single computer or group of computers that can be accessed by both users on
    the Internet as well as users on the Local Network, but that is not protected by the same security as the Local
    Network.
    DHCP – Dynamic Host Configuration Protocol.  Used to automatically assign IP addresses from a predefined
    pool of addresses to computers or devices that requests them
    Digital certificate – An electronic method of providing credentials to a server in order to have access to it or
    a network
    Direct Sequence Spread Spectrum – DSSS. Modulation technique used by 802.11b wireless devices
    DNS – Domain Name System.  Translates Domain Names to IP addresses
    DOCSIS – Data Over Cable Service Interface Specifications.  The standard interface for cable modems
    Domain name – A name that is associated with an IP address
    Download – To send a request from one computer to another and have the file transmitted back to the requesting
    computer
    DSL – Digital Subscriber Line.  High bandwidth Internet connection over telephone lines
    Duplex – Sending and Receiving data transmissions at the sane time
    Dynamic DNS service – DDNS is provided by companies to allow users with Dynamic IP addresses to obtain
    a Domain Name that will always by linked to their changing IP address.  The IP address is updated by either
    client software running on a computer or by a router that supports DDNS, whenever the IP address changes 
    						
    							Appendix
    58 D-Link Systems, Inc.
    Dynamic IP address – IP address that is assigned by a DHCP server and that may change.  Cable Internet
    providers usually use this method to assign IP addresses to their customers.
    E
    EAP – Extensible Authentication Protocol
    Email – Electronic Mail is a computer-stored message that is transmitted over the Internet
    Encryption – Converting data into cyphertext so that it cannot be easily read
    Enterprise – Large organizations that use computers
    Ethernet – The most widely used technology for Local Area Networks.
    F
    Fiber optic – A way of sending data through light impulses over glass or plastic wire or fiber
    File server – A computer on a network that stores data so that the other computers on the network can all
    access it
    File sharing – Allowing data from computers on a network to be accessed by other computers on the network
    will different levels of access rights
    Firewall – A device that protects resources of the Local Area Network from unauthorized users outside of the
    local network
    Firmware – Programming that is inserted into a hardware device that tells it how to function
    Fragmentation – Breaking up data into smaller pieces to make it easier to store
    FTP – File Transfer Protocol.  Easiest way to transfer files between computers on the Internet
    Full-duplex – Sending and Receiving data at the same time
    G
    Gain – The amount an amplifier boosts the wireless signal
    Gateway – A device that connects your network to another, like the internet
    Gbps – Gigabits per second
    Gigabit Ethernet – Transmission technology that provides a data rate of 1 billion bits per second
    Graphical user interface – GUI
    H
    H.323 – A standard that provides consistency of voice and video transmissions and compatibility for
    videoconferencing devices 
    						
    							Appendix
    59 D-Link Systems, Inc.
    Half-duplex – Data cannot be transmitted and received at the same time
    Hashing – Transforming a string of characters into a shorter string with a predefined length
    Hexadecimal – Characters 0-9 and A-F
    HomePNA – Networking over telephone lines
    HomeRF – Networking standard that combines 802.11b and DECT (Digital Enhanced Cordless
    Telecommunication) that provides speeds up to 1.6 Mbps and a distance of 150 ft using a Frequency Hopping
    transmission method
    Hop – The action of data packets being transmitted from one router to another
    Host – Computer on a network
    HTTP – Hypertext Transfer Protocol is used to transfer files from HTTP servers (web servers) to HTTP clients
    (web browsers)
    HTTPS – HTTP over SSL is used to encrypt and decrypt HTTP transmissions
    Hub – A networking device that connects multiple devices together
    I
    ICMP – Internet Control Message Protocol
    IEEE – Institute of Electrical and Electronics Engineers
    IETF – Internet Engineering Task Force
    IGMP – Internet Group Management Protocol is used to make sure that computers can report their multicast
    group membership to adjacent routers
    IIS – Internet Information Server is a WEB server and FTP server provided by Microsoft
    IKE – Internet Key Exchange is used to ensure security for VPN connections
    Infrastructure – In terms of a wireless network, this is when wireless clients use an Access Point to gain
    access to the network
    Internet – A system of worldwide networks which use TCP/IP to allow for resources to be accessed from
    computers around the world
    Internet Explorer – A World Wide Web browser created and provided by Microsoft
    Internet Protocol – The method of transferring data from one computer to another on the Internet
    Internet Protocol Security – IPsec provides security at the packet processing layer of network communication
    Internet Service Provider – An ISP provides access to the Internet to individuals or companies
    Interoperability – The ability for products to interact with other products without much customer interaction
    Intranet – A private network 
    						
    							Appendix
    60 D-Link Systems, Inc.
    Intrusion Detection – A type of security that scans a network to detect attacks coming from inside and
    outside of the network
    IP – Internet Protocol
    IP address – A 32-bit number, when talking about Internet Protocol Version 4, that identifies each computer
    that transmits data on the Internet or on an Intranet
    IPsec – Internet Protocol Security
    IPv6 – Internet Protocol Version 6 uses 128-bit addresses and was developed to solve the problem that we
    face of running our of IP version 4 addresses
    IPX – Internetwork Packet Exchange is a networking protocol developed by Novel to enable their Netware
    clients and servers to communicate
    ISP – Internet Service Provider
    J
    Java – A programming language used to create programs and applets for web pages
    K
    Kbps – Kilobits per second
    Kbyte - Kilobyte
    Kerberos – A method of securing and authenticating requests for services on a network
    L
    LAN – Local Area Network
    Latency – The amount of time that it takes a packet to get from the one point to another on a network.  Also
    referred to as delay
    LED  - Light Emitting Diode
    Legacy – Older devices or technology
    Local Area Network – A group of computers in a building that usually access files from a server
    M
    MAC address – A unique hardware address for devices on a Local Area Network
    MDI – Medium Dependent Interface is an Ethernet port for a connection to a straight-through cable
    MDIX - Medium Dependent Interface Crossover, is an Ethernet port for a connection to a crossover cable
    Megabit - Mb 
    						
    All D-Link manuals Comments (0)

    Related Manuals for D-Link Router DGL-4300 User Manual