Home > D-Link > Router > D-Link Router DIR-615 User Manual

D-Link Router DIR-615 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual D-Link Router DIR-615 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 48 D-Link manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							
    41D-Link DIR-615 User Manual
    Section 3 - Configuration
    Access Control
    Check the Enable Access Control check box 
    and  click  the Add  Policy  button  to  start  the 
    Access Control Wizard. 
    Add Policy:
    The  Access  Control  section  allows  you  to  control  access  in  and  out  of  your  network.  Use  this  feature  as  Parental 
    Controls to only grant access to approved sites, limit web access based on time or dates, and/or block access from 
    applications like PP utilities or games.
    Click Next to continue with the wizard.
    Access Control Wizard 
    						
    							
    4D-Link DIR-615 User Manual
    Section 3 - Configuration
    Enter a name for the policy and then click Next to continue.
    Access Control Wizard (continued)
    Select  a  schedule  (I.E.  Always)  from  the  drop-down  menu 
    and then click Next to continue.
    Enter  the  following  information  and  then  click Next  to 
    continue.
    • Address Type - Select IP address, MAC address, or 
    Other Machines.
    •  IP  Address  -  Enter  the  IP  address  of  the  computer 
    you want to apply the rule to. 
    						
    							
    43D-Link DIR-615 User Manual
    Section 3 - Configuration
    Select the filtering method and then click Next to continue.
    Access Control Wizard (continued)
    Enter the rule:
     Enable - Check to enable the rule.
     Name - Enter a name for your rule.
     Dest IP Start - Enter the starting IP address.
     Dest IP End - Enter the ending IP address.
     Protocol - Select the protocol.
     Dest Port Start - Enter the starting port number.
     Dest Port End - Enter the ending port number.
    To enable web logging, click Enable.
    Click Save to save the access control rule. 
    						
    							
    44D-Link DIR-615 User Manual
    Section 3 - Configuration
    Enter  the  keywords  or  URLs  that  you  want  to 
    allow.  Any  URL  with  the  keyword  in  it  will  be 
    allowed.
    Website URL/
    Domain:
    Website Filters are used to allow LAN computers from accessing specific web sites by the URL or domain. A URL is 
    a specially formatted text string that defines a location on the Internet. If any part of the URL contains the listed word, 
    the site will be accessible. To use this feature, enter the text string to be blocked  and click Save Settings. The text to 
    be blocked will appear in the list. To delete the text, click Clear the List Below.
    Website Filters 
    						
    							
    45D-Link DIR-615 User Manual
    Section 3 - Configuration
    Enter a name for the inbound filter rule.
    Select Allow or Deny.
    Check to enable rule.
    Enter the starting IP address. Enter 0.0.0.0 if 
    you do not want to specify an IP range.
    E n t e r   t h e   e n d i n g   I P   a d d r e s s .   E n t e r 
    55.55.55.55 if you do not want to specify 
    and IP range.
    Click the Save button to apply your settings. 
    You  must  click  Save  Settings  at  the  top  to 
    save the settings.
    This section will list any rules that are created. 
    You  may  click  the Edit  icon  to  change  the 
    settings or enable/disable the rule, or click the 
    Delete icon to remove the rule.
    Name:
    Action:
    Enable:
    Source IP Start:
    Source IP End:
    Save:
    Inbound Filter 
    Rules List:
    The Inbound Filter option is an advanced method of controlling data received from the Internet. With this feature you 
    can configure inbound data filtering rules that control data based on an IP address range.  Inbound Filters can be used 
    with Virtual Server, Port Forwarding, or Remote Administration features.\
    Inbound Filters 
    						
    							
    46D-Link DIR-615 User Manual
    Section 3 - Configuration
    SPI (Stateful Packet Inspection, also known as dynamic packet filtering) helps to prevent cyber attacks by tracking more 
    state per session. It validates that the traffic passing through the session 
    conforms to the protocol.
    Select one of the following for TCP and UDP ports:
    Endpoint Independent - Any incoming traffic sent to an open port will 
    be forwarded to the application that opened the port. The port will close 
    if idle for 5 minutes.
    Address  Restricted  -  Incoming  traffic  must  match  the  IP  address  of 
    the outgoing connection.
    Address  +  Port  Restriction  -  Incoming  traffic  must  match  the  IP 
    address and port of the outgoing connection.
    Enable this option to provide protection from certain kinds of “spoofing” 
    attacks.
    If  an  application  has  trouble  working  from  behind  the  router,  you  can 
    expose  one  computer  to  the  Internet  and  run  the  application  on  that 
    computer.
    Note: Placing a computer in the DMZ may expose that computer to a 
    variety of security risks. Use of this option is only recommended as a 
    last resort.
    Specify  the  IP  address  of  the  computer  on  the  LAN  that  you  want  to 
    have unrestricted Internet communication. If this computer obtains it’s IP 
    address automatically using DHCP, be sure to make a static reservation 
    on the System > Network Settings page so that the IP address of the 
    DMZ machine does not change.
    Enable SPI:
    NAT Endpoint 
    Filtering:
    Enable Anti-Spoof 
    Checking:
    Enable DMZ Host:
    IP Address:
    Firewall Settings
    A  firewall  protects  your  network  from  the  outside  world.  The  D-Link  DIR-615  offers  a  firewall  type  functionality.  The  SPI  feature  helps 
    prevent cyber attacks. Sometimes you may want a computer exposed to the outside world for certain types of applications. If you choose 
    to expose a computer, you can enable DMZ. DMZ is short for Demilitarized Zone. This option will expose the chosen computer completely 
    to the outside world. 
    						
    							
    47D-Link DIR-615 User Manual
    Section 3 - ConfigurationVPN Passthrough
    RTSP
    H.323
    SIP (VoIP)
    MMS
    Application Level Gateway (ALG) Configuration
    Here you can enable or disable ALG’s. Some protocols and applications require special handling of the IP payload to 
    make them work with network address translation (NAT). Each ALG provides special handling for a specific protocol 
    or application. A number of ALGs for common applications are enabled by \
    default.
    Allows multiple machines on the LAN to connect to their corporate networ\
    k using PPTP protocol. 
    Allows multiple VPN clients to connect to their corporate network using IPSec. Some VPN clients support traversal of IPSec 
    through NAT. This ALG may interfere with the operation of such VPN clients. If you are having trouble connecting with your 
    corporate network, try turning this ALG off. Please check with the system administrator of your corporate network whether 
    your VPN client supports NAT traversal.
    Allows applications that use Real Time Streaming Protocol to receive streaming media from the internet. QuickTime and 
    Real Player are some of the common applications using this protocol. 
    Allows all of the Windows/MSN Messenger functions to work properly throu\
    gh the router.
    Allows FTP clients and servers to transfer data across NAT. Refer to the Advanced > Virtual Server page if you want to 
    host an FTP server. 
    Allows Microsoft NetMeeting clients to communicate across NAT. Note that if you want your buddies to call you, you should 
    also set up a virtual server for NetMeeting. Refer to the Advanced > Virtual Server page for information on how to set up 
    a virtual server. 
    Allows  devices  and  applications  using  VoIP  (Voice  over  IP)  to  communicate  across  NAT.  Some  VoIP  applications  and 
    devices have the ability to discover NAT devices and work around them. This ALG may interfere with the operation of such 
    devices. If you are having trouble making VoIP calls, try turning this A\
    LG off. 
    Allows Ethernet network adapters with Wake-On-LAN (WOL) to function.
    Allows Windows Media Player, using MMS protocol, to receive streaming me\
    dia from the Internet. 
    PPTP:
    IPSec (VPN):
    RTSP:
    MSN Messenger:
    FTP:
    H.323 
    (Netmeeting):
    SIP:
    Wake-On-LAN:
    MMS: 
    						
    							
    48D-Link DIR-615 User Manual
    Section 3 - Configuration
    Set the transmit power of the antennas.
    Beacons are packets sent by an 
    Access Point to synchronize a wireless 
    network. Specify a value. 100 is the 
    default setting and is recommended. 
    This value should remain at its default setting 
    of 2432. If inconsistent data flow is a problem, 
    only a minor modification should be made.
    The fragmentation threshold, which is 
    specified in bytes, determines whether packets 
    will be fragmented. Packets exceeding the 
    346 byte setting will be fragmented before 
    transmission. 346 is the default setting. 
    (Delivery Traffic Indication Message) 3 is 
    the default setting. A DTIM is a countdown 
    informing clients of the next window for 
    listening to broadcast and multicast messages.
    This enables 80.11d operation. 
    802.11d is a wireless specification developed to allow implementation of wireless networks in countries that 
    cannot use the 80.11 standard. This feature should only be enabled if you are in a countr\
    y that requires it.
    WMM is QoS for your wireless network. This will improve the quality of video and voice applications for your wireless clients.
    Check this box to reduce the guard interval time therefore increasing th\
    e data 
    capacity.  However, it’s less reliable and may create higher data los\
    s.
    Transmit Power:
    Beacon Period:
    RTS Threshold:
    Fragmentation 
    Threshold:
    DTIM Interval:
    802.11d:
    WMM Function:
    Short GI:
    Advanced Wireless Settings 
    						
    							
    49D-Link DIR-615 User Manual
    Section 3 - Configuration
    Enable the Wi-Fi Protected Setup feature. 
    Locking the wireless security settings prevents 
    the  settings  from  being  changed  by  the  Wi-Fi 
    Protected Setup feature of the router. Devices 
    can  still  be  added  to  the  network  using  Wi-Fi 
    Protected Setup. However, the settings of the 
    network  will  not  change  once  this  option  is 
    checked.
    A  PIN  is  a  unique  number  that  can  be  used 
    to  add  the  router  to  an  existing  network  or  to 
    create a new network. The default PIN may be 
    printed  on  the  bottom  of  the  router.  For  extra 
    security, a new PIN can be generated. You can 
    restore  the  default  PIN  at  any  time.  Only  the 
    Administrator (“admin” account) can change or 
    reset the PIN. 
    Shows the current value of the router’s PIN. 
    Restore the default PIN of the router. 
    Create a random number that is a valid PIN. This becomes the router’s PIN. You can then copy this PIN to the user interface 
    of the registrar. 
    Enable:
    Lock Wireless 
    Security Settings:
    PIN Settings:
    Current PIN:
    Reset PIN to 
    Default:
    Generate New PIN:
    Wi-Fi Protected Setup
    Wi-Fi Protected Setup (WPS) System is a simplified method for securing your wireless network during the “Initial setup” 
    as well as the “Add New Device” processes. The Wi-Fi Alliance (WFA) has certified it across different products as well 
    as manufactures. The process is just as easy, as depressing a button for the Push-Button Method or correctly entering 
    the 8-digit code for the Pin-Code Method.  The time reduction in setup and ease of use are quite beneficial, while the 
    highest wireless Security setting of WPA is automatically used. 
    						
    							
    50D-Link DIR-615 User Manual
    Section 3 - Configuration
    This Wizard helps you add wireless devices to the wireless network.
    The wizard will either display the wireless network settings to guide you through manual configuration, prompt you to enter the 
    PIN for the device, or ask you to press the configuration button on the device. If the device supports Wi-Fi Protected Setup 
    and has a configuration button, you can add it to the network by pressing the configuration button on the device and then 
    the on the router within 60 seconds. The status LED on the router will flash three times if the device has been successfully 
    added to the network.
    There are several ways to add a wireless device to your network. A “registrar” controls access to the wireless network. A 
    registrar only allows devices onto the wireless network if you have entered the PIN, or pressed a special Wi-Fi Protected 
    Setup button on the device. The router acts as a registrar for the network, although other devices may act as a registrar as 
    well.
    Click to add a wireless client to your network. Please refer to page 79 \
    for more informa
    Add Wireless 
    Station:
    Add Wireless 
    Device Wizard: 
    						
    All D-Link manuals Comments (0)

    Related Manuals for D-Link Router DIR-615 User Manual